Method to implement e911 services in ims (ip multimedia subsystem)

ABSTRACT

Efficient processing and/or routing of emergency calls in an IMS (IP Multimedia Subsystem) for VoIP (Voice over IP) subscribers can be enabled. In one aspect, an E911 profile is generated, for example, by an application server, for each VoIP subscriber based in part on current location information associated with the subscriber, such as, the subscriber&#39;s IP address. The E911 profile is pushed to the HSS (Home Subscriber Server) of the IMS. The E911 profile can then be stored in the HSS and can be queried by an E-CSCF (Emergency Call Session Control Function) during emergency call processing. Moreover, when an emergency call is received from the subscriber, the E-CSCF can retrieve the E911 profile associated with the subscriber from the HSS and route the call to an appropriate PSAP (Public Safety Answering Point) based on an analysis of the information in the E911 profile.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims the benefit ofpriority to, U.S. patent application Ser. No. 13/762,513, entitled“METHOD TO IMPLEMENT E911 SERVICES IN IMS (IP MULTIMEDIA SUBSYSTEM),”and filed Feb. 8, 2013, which is a continuation of, and claims thebenefit of priority to U.S. patent application Ser. No. 12/484,514,filed on Jun. 15, 2009, and entitled “METHOD TO IMPLEMENT E911 SERVICESIN IMS (IP MULTIMEDIA SUBSYSTEM),” (now U.S. Pat. No. 8,396,445, issuedon Mar. 12, 2013) which claims the benefit of priority to U.S.Provisional Patent Application No. 61/159,522, filed on Mar. 12, 2009,and entitled “METHOD TO IMPLEMENT E911 SERVICES IN IMS (IP MULTIMEDIASUBSYSTEM).” The entireties of each of the above noted applications areincorporated herein by reference.

TECHNICAL FIELD

The subject application relates to wireline communications and, moreparticularly, a system and methodology that enables E911 capability tobe supported on an architecture defined by 3GPP (3^(rd) GenerationPartnership Project) IMS (IP Multimedia Subsystem) standards for E911(Enhanced 911).

BACKGROUND

Technological advances have provided various sectors of society likegovernment, industry, commerce and entertainment with access tonetworked information in order to increase operational and commercialefficiencies. Mobile data communications is evolving quickly because ofglobal communication networks and devices such as the Internet,intranets, laptops, PDAs (personal digital assistants) and increasedrequirements of workforce mobility. Moreover, third generation mobilesystem (3G) technologies (e.g., UMTS-Universal Mobile TelecommunicationsSystem) are being developed and are considered enhancements to GSM(Global System for Mobile telecommunications) cellular standards.

3GPP (Third generation partnership project) standards define an IMS (IPMultimedia Subsystem) architecture that provides a horizontal layeredarchitecture with a common IP (Internet Protocol)-based connectivity forservices. The IMS architecture enables convergence of data, speech andmobile network technology over an IP-based infrastructure and enhancesreal time, multimedia mobile services such as rich voice services, videotelephony, messaging services, conferencing, and push services.Specifically, the IMS standard defines a generic architecture foroffering Voice over IP (VoIP) and multimedia services for both wirelessand wireline access. VoIP services provide increased mobility, forexample, subscribers can log on with their chosen device at differentlocations and their calls can be routed to them. However, the increasedmobility increases the complexity involved with determination ofaccurate location information, employed during emergency calls.

A fixed line telephone has a direct relationship between its telephonenumber and a physical location and thus the physical location foremergency calls originating from that number is known. Accordingly, theemergency call can be routed to PSAP (Public Safety Answering Point)that is closest to the physical location, such that, emergency crew canrespond in the shortest possible time. With VoIP services, users can bemobile and determination of a current physical address when an emergencycall is received can be tedious, complex and/or inaccurate. Someconventional systems collect location information and/or contactinformation from subscribers. The onus is on the subscriber to providethe location information, but the VoIP provider must provide thecustomer with a means of updating this information. However, for nomadicwireline users, the overhead of constantly having to update locationinformation can be time consuming and tedious. Another shortcoming ofVoIP E911 is that the emergency system is based on a static tablelookup. Unlike in cellular phones, where the location of an E911 callcan be traced using GPS, cellular triangulation, or other methods, theVoIP E911 information is only accurate so long as subscribers arediligent in keeping their emergency address information up-to-date.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example system that can be employed to facilitatestoring and utilizing current user location data in a 3GPP IMS that isutilized for emergency call routing in accordance with an aspect of thesubject specification.

FIG. 2 illustrates an example system that can be employed to facilitaterouting of emergency calls in an IMS (IP multimedia subsystem),according to an aspect of the subject innovation.

FIG. 3 illustrates an example system that can be employed to generate anE911 (Enhanced 911) profile for a VoIP subscriber and deliver the E911profile to the IMS in accordance with the subject disclosure.

FIG. 4 illustrates an example E911 profile that facilitates optimalrouting of emergency calls in an IMS in accordance with an aspect of thesubject specification.

FIG. 5 illustrates an example architecture that facilitates emergencycall processing and routing in an IMS, according to an aspect to thesubject specification.

FIG. 6 illustrates an example system that facilitates automating one ormore features by employing machine learning techniques in accordancewith the subject innovation.

FIG. 7 illustrates an example call flow that depicts processing of anemergency call from a subscriber that has moved to a visiting tenantlocation, according to an aspect of the subject innovation.

FIG. 8 illustrates an example call flow that depicts processing of anemergency call from a nomadic subscriber, according to an aspect of thesubject disclosure.

FIG. 9 illustrates an example methodology that facilitates storingcurrent user location information in a HSS of an IMS, according to anaspect of the subject innovation.

FIG. 10 illustrates an example methodology for routing emergency callsfrom a VoIP subscriber in accordance with an aspect of the subjectdisclosure.

FIG. 11 illustrates an example methodology that facilitates storing anE911 profile within an IMS, according to an aspect of the subjectinnovation.

FIG. 12 illustrates an example methodology that can be employed tofacilitate E911 profile generation for a subscriber in accordance withan aspect of the subject disclosure.

FIG. 13 illustrates an example methodology that can be employed toutilize an E911 profile, stored in a data store within the IMS, tofacilitate emergency call processing, according to an aspect of thesubject disclosure.

FIG. 14 illustrates a block diagram of a computer operable to executethe disclosed architecture.

DETAILED DESCRIPTION

The claimed subject matter is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the claimed subject matter. It may beevident, however, that the claimed subject matter may be practicedwithout these specific details. In other instances, well-knownstructures and devices are shown in block diagram form in order tofacilitate describing the claimed subject matter.

As used in this application, the terms “component,” “module,” “system”,“interface”, or the like are generally intended to refer to acomputer-related entity, either hardware, a combination of hardware andsoftware, software, or software in execution. For example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration, both an application runningon a controller and the controller can be a component. One or morecomponents may reside within a process and/or thread of execution and acomponent may be localized on one computer and/or distributed betweentwo or more computers. As another example, an interface can include I/Ocomponents as well as associated processor, application, and/or APIcomponents.

Furthermore, the claimed subject matter may be implemented as a method,apparatus, or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. For example, computerreadable media can include but are not limited to magnetic storagedevices (e.g., hard disk, floppy disk, magnetic strips . . . ), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ),smart cards, and flash memory devices (e.g., card, stick, key drive . .. ). Additionally it should be appreciated that a carrier wave can beemployed to carry computer-readable electronic data such as those usedin transmitting and receiving electronic mail or in accessing a networksuch as the Internet or a local area network (LAN). Of course, thoseskilled in the art will recognize many modifications may be made to thisconfiguration without departing from the scope or spirit of the claimedsubject matter.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

Moreover, terms like “user equipment,” “phone,” “mobile station,”“mobile,” subscriber station,” “access terminal,” “terminal,”“handset,”, and similar terminology, refer to a wireless and/or wireddevice utilized by a subscriber or user of a wireless and/or wiredcommunication service to receive or convey data, control, voice, video,sound, gaming, or substantially any data-stream or signaling-stream. Theforegoing terms are utilized interchangeably in the subjectspecification and related drawings. Data and signaling streams can bepacketized or frame-based flows.

Furthermore, the terms “user,” “subscriber,”, “operator”, “customer,”“consumer,” and the like are employed interchangeably throughout thesubject specification, unless context warrants particular distinction(s)among the terms. It should be appreciated that such terms can refer tohuman entities or automated components supported through artificialintelligence (e.g., a capacity to make inference based on complexmathematical formalisms) which can provide simulated vision, soundrecognition and so forth. In addition, the terms “wireless network” and“network” are used interchangeable in the subject application, whencontext wherein the term is utilized warrants distinction for claritypurposes such distinction is made explicit. It can be appreciated thatthe IMS standards can be the technical specification defined by the 3rdGeneration Partnership Project's (3GPP's) Technical Specification GroupServices and System Aspects entitled “IP Multimedia Subsystem (IMS)emergency sessions (Release 7)” and identified as “TS 23.167 V7.2.0(2006-09)”, which is incorporated herein by reference in its entirety.

The systems and methods disclosed herein, in one aspect thereof, canfacilitate handling emergency calls on an architecture defined by 3GPPIMS standards for E911. Specifically, the method comprises pushingupdated E911 profile parameters to an HSS (Home Subscriber Server), suchthat, the HSS contains a current E911 profile associated with eachsubscriber. When the E-CSCF in the IMS receives an emergency call from asubscriber, the E-CSCF retrieves the appropriate E911 profile parametersof the subscriber from the HSS. Moreover, the E-CSCF employs the E911profile parameters to determine a route for the received emergency call.

Business VOIP service can include capabilities to automaticallydetermine a subscriber's location when the subscriber is placing a 911call from any location associated with a business customer that hasmultiple locations, and then route/send the 911 call to the PSAP (PublicSafety Answering Point) that serves the location, in a mannertransparent to the user. The service logic supporting this capabilitycan reside in an Application Server (AS) or most any network element.The disclosed innovation, relates to interfacing the application logicto the IMS network by pushing user information (e.g., location data) toan HSS in the IMS. It can be appreciated that the subject disclosure isnot limited to 911 calls and can be used for most any emergency callsand/or can comply with FCC E911 requirements for VoIP service.

In accordance with another aspect of the system, a call receivingcomponent can be employed to receive an emergency call from a VoIPsubscriber. A profile fetching component can query a data store (e.g.,HSS) in the IMS to retrieve an E911 profile for the subscriber stored inthe data store. It can be appreciated that an E911 profile can becreated for each VoIP subscriber, for example, by an application serverand the profile data can be pushed to a data store (e.g., HSS) withinthe IMS. Further, a profile analysis component can perform an analysisof the retrieved E911 profile to facilitate processing of the receivedemergency call. In one aspect, the profile analysis component canutilize E911 profile information to determine an optimal route for theemergency call. Furthermore, a routing component can route the receivedemergency call to a PSAP, which can be selected based in part on theanalysis.

Another aspect of the subject innovation comprises a monitoringcomponent that facilitates monitoring changes in a VoIP subscriber'slocation based in part on registration information, such as, but notlimited to, an IP address employed during registration with the network.A location determination component can be utilized to determine and/orclassify the VoIP subscriber's location, when a change in location isidentified by the monitoring component. In one example, the locationdetermination component can determine that the subscriber is at a homelocation, a disparate tenant location or is nomadic. Based in part onthe determined subscriber location, a profile generation component canpopulate parameters in an E911 profile associated with the subscriber,such as, but not limited to, a Temporary Telephone Number (TTN), anEmergency Services Routing Number (ESRN), a LRF (Location RoutingFunction) indicator, etc. The generated/updated E911 profile can then bepushed to a data store (e.g., HSS) in the IMS by a profile pushingcomponent, wherein the E911 profile can be stored and utilized forrouting an emergency call received in the IMS from the VoIP subscriber.

Yet another aspect of the disclosed subject matter relates to a methodthat can facilitate storing information associated with a subscriber'scurrent location in a data store within an IMS. Specifically,subscriber's location information can be received, for example, duringregistration. According to an aspect, the subscriber's IP address can beemployed to identify the subscriber's current location (e.g., thesubscriber is located at the subscriber's home location, the subscriberis visiting a tenant location, or the subscriber is nomadic). The methodcomprises generating an E911 profile for the subscriber based in part onthe subscriber's identified location, for example, by populatingparameters, such as, the TTN, ESRN, and/or LRF indicator. The E911profile can then be pushed to and stored in a data store, such as, theHSS and can be queried by an E-CSCF during emergency call processing.

Still another aspect of the system comprises a method for routingemergency calls from a VoIP subscriber. The method comprises receivingan emergency call from the subscriber, retrieving an E911 profileassociated with the subscriber from an HSS (or most any data store) inthe IMS, and analyzing the retrieved E911 profile. Further, theemergency call can be routed to an appropriate PSAP based on an analysisof the E911 profile.

Referring initially to FIG. 1, there illustrated is an example system100 that can be employed to facilitate storing and utilizing currentuser location data in a 3GPP IMS that is utilized for emergency callrouting in accordance with an aspect of the subject specification. VoIPservices enable a subscriber to communicate by employing an Internetconnection, for example, a high-speed (broadband) Internet connection,such as Digital Subscriber Line (DSL), cable modem, or wirelessbroadband. Moreover, VoIP service provides subscribers with a portablephone service that can be used from any location with internet access.System 100 can typically include an Application Server (AS) 102 that canbe employed to determine a subscriber's current location and accordinglyupdate location parameters in a data store 104 in the IMS 106.

The location parameters can be employed to determine an optimal route totransfer an emergency call placed by the subscriber. For example,emergency calls can be directed to a PSAP (Public Safety AnsweringPoint) located closest to the current location of the subscriber. Inanother example, an emergency call can be directed to a PSAP that hasmost available resources to help the subscriber. It can be appreciatedthat the emergency call can be placed by a subscriber by dialing apredefined number, such as, “911” in the United States, “999” in theUnited Kingdom, etc. on the UE (user equipment).

According to an embodiment, the AS 102 can detect registration of asubscriber and determine location information for the subscriber basedon the registration information. In an aspect, the AS 102 can identifythe IP address of the subscriber on registration and determine whetherthe subscriber is at a home location, a disparate tenant location or isnomadic. Moreover, a home location can be a location associated with thesubscriber during provisioning, while a tenant location can be most anydisparate location associated with the service provider. In one aspect,the AS 102 can include a list of IP addresses associated with thetenant. The list can be stored on an internal database of can beaccessed remotely.

During registration, the AS 102 can detect if the subscriber has movedto a new location and accordingly update parameters in an E911 profileassociated with the subscriber. Based in part on the identified IPaddress, the AS 102 can determine the location of the subscriber. Forexample, the AS 102 can determine an IP address of the home locationassociated with the subscriber, and can determine that the subscriber isnot at the home location when the identified IP address is not the sameas the home IP address. Further, the AS 102 can determine if thesubscriber has registered with one of the IP addresses in the list. Ifdetermined that the identified IP address is in the list, the AS 102 candetermine that the subscriber is visiting a tenant location, else the AS102 can determine that the user is nomadic.

Once the current location information for the subscriber is determined,the AS 102 can generate and/or update an E911 profile associated withthe subscriber. The E911 profile can typically include parameters suchas, but not limited to, a Temporary Telephone Number (TTN), an EmergencyServices Routing Number (ESRN), a LRF (Location Routing Function)indicator, etc. Further, the AS 102 can push the generated profile datato a data store 104 (e.g., HSS) in the IMS 106. It can be appreciatedthat the data store can be a dedicated database for emergency callhandling or can be an existing database within the IMS 106, such as, butnot limited to the HSS (Home Subscriber Server).

The data store 104 can store the E911 profiles for multiple subscribersand can be accessed by the IMS when an emergency call is received from asubscriber. Moreover, during emergency call processing, a profilefetching component 108, for example, an E-CSCF (Emergency Call SessionControl Function), in the IMS 106 can query the data store 104 for E911profile information associated with the calling subscriber. The E911profile information can be analyzed and a route for directing the callcan be determined based on the analysis, as explained in detail infra.

It can be appreciated that the data store 104 described herein caninclude volatile memory or nonvolatile memory, or can include bothvolatile and nonvolatile memory. By way of illustration, and notlimitation, nonvolatile memory can include read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable PROM (EEPROM), or flash memory. Volatile memorycan include random access memory (RAM), which acts as external cachememory. By way of illustration and not limitation, RAM is available inmany forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronousDRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM(ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). Thememory (e.g., data stores, databases) of the subject systems and methodsis intended to comprise, without being limited to, these and any othersuitable types of memory.

FIG. 2 illustrates an example system 200 that can be employed tofacilitate routing of emergency calls in an IMS, according to an aspectof the subject innovation. The system 200 can typically be employed formost any emergency or special calls placed by a subscriber, whereinrouting of the call utilizes location information associated with thesubscriber. In one aspect, system 200 can be employed in VoIP (Voiceover IP) services, for example, for a business customer. As an example,system 200 can be utilized within the E-CSCF (Emergency Call SessionControl Function) in the IMS.

Typically, system 200 can include a call receiving component 202 thatcan be employed to receive a call from a user. The call receivingcomponent 202 can determine whether the received call is an emergencycall or a high priority or special call (e.g., a call that employs userlocation information). Further, a profile fetching component 204 canquery a data store in the IMS, for example, data store 104 (FIG. 1). Itcan be appreciated that profile fetching component 204 and profilefetching component 108 can be substantially similar and can includefunctionality described with respect to systems 100 and 200.

The profile fetching component 204 can retrieve profile informationassociated with the calling party (e.g., subscriber) for the receivedcall from the data store (e.g., HSS). In an aspect, the profileinformation can include, but is not limited to, an E911 profile, thatcan comprise routing information, current user location information,user call back numbers, etc. According to an aspect, the E911 profilefor the user includes up-to-date or current routing information based onthe current location of the user. For example, an application server canbe employed to generate an E911 profile for each user and push theprofile to the data store (e.g., HSS) in the IMS.

Further, a profile analysis component 206 can analyze the informationwithin the retrieved profile and accordingly determine a routing pathfor the received emergency call. The routing path can be optimal basedon the available resources or can utilize minimum number of resources.In one aspect, the profile analysis component 206 can utilize E911profile information to select a trunk to an SR (selective router), whichserves a PSAP (Public Safety Answering Point) that serves the caller'slocation. For example, a PSAP closest to the location of the user can beselected. In another example, a PSAP that has a maximum number ofavailable resources can be selected. Moreover, the profile analysiscomponent 206 can dynamically determine an optimal PSAP that can serviceand/or attend to the received emergency call for the user.

The system 200 can further include a routing component 208 that can beemployed to route the received emergency call to the selected PSAP basedin part on the analysis. In one example, the routing component 208 canutilize E911 profile information to route the received emergency call toan appropriate BGCF (Breakout Gateway Control Function) and/or ESGW(Emergency Services Gateway). Accordingly the call can be routed to anoptimal PSAP and can be serviced by the emergency personnel (e.g.,police, firefighters, paramedics, etc.).

Referring now to FIG. 3, there illustrated is an example system 300 thatcan be employed to generate an E911 profile for a subscriber and deliverthe E911 profile to the IMS in accordance with the subject disclosure.In one example, system 300 can be utilized within an application server(AS) (not shown) external to the IMS. Moreover, system 300 can gatherand/or aggregate current user information, update or generate a userE911 profile and push the updated or generated E911 profile to a datastore within the IMS.

The system 300 can typically include a monitoring component 302 that canmonitor a user's current location and/or identify a change in a user'slocation. The monitoring component can receive user related information,for example, a user's IP address, when a user's phone is relocated. Inone example, the monitoring component 302 can monitor and identify whena user registers to the network (e.g. VoIP network). Specifically, themonitoring component 302 can determine an IP address utilized duringregistration. If the IP address has changed or is new, the monitoringcomponent 302 can determine that the user has moved to a new location.

When determined that the user location has changed (e.g. by themonitoring component 302), a location determination component 304 can beemployed to identify the new/changed location of the user. For example,the location determination component 304 can identify whether the useris at a home location, a disparate tenant location or is nomadic. Asdiscussed previously, a home location can be a location associated withthe user during provisioning, while a tenant location can be most anydisparate location associated with the service provider. Specifically,business VoIP (BVoIP) customers can have multiple business locationswith multiple users residing at each location. These locations can bereferred to as tenant locations. Each user can be associated with a hometenant location and can freely visit other tenant locations. BVoIP userscan utilize their handsets from the home tenant location, any visitingtenant location, and/or any location that has broadband access. When auser is not located at a tenant location or home location, the user issaid to be nomadic. The location determination component 304 can beemployed to determine the user's current location, for example, hometenant location, visiting tenant location, other location that hasbroadband access, nomadic, etc.

In one aspect, the location determination component 304 can compare theidentified IP address with a list of IP addresses associated with thetenant to determine the location of the user. The list can be stored onan internal database or can be accessed remotely. If the identified IPaddress matches a home IP address associated with the user, the locationdetermination component 304 can determine that the user is at a homelocation. Further, if the identified address does not match the home IPaddress, but matches most any IP address within the tenant IP addresslist, the location determination component 304 can determine that theuser is visiting the associated tenant location. Furthermore, when theidentified IP address does not match addresses in the list or the homeIP address for the user, the location determination component 304 candetermine that the user is nomadic.

Based in part on the determined user location, a profile generationcomponent 306 can be utilized to populate an E911 profile associatedwith the user. The profile generation component 306 can generate a newprofile and/or update an existing profile for the user based in part onthe change in user location. Typically, the profile generation component306 can update parameters in the E911 profile, such as, but not limiteda call back number, routing information, etc. Population of the E911profile is discussed in detail with respect to FIG. 4, infra. In oneexample, the E911 profile associated with a user, can includeparameters, such as, but not limited to, a Temporary Telephone Number(TTN), an Emergency Services Routing Number (ESRN), a LRF (LocationRouting Function) indicator, etc.

The system 300 can further include profile pushing component 308 thatcan be employed to push the generated E911 profile to a data store (e.g.HSS) in the IMS, where the profile can be stored for future use by theIMS. In one example, the profile pushing component 308 can utilize a Shinterface for delivering information to the HSS. Moreover, an E-CSCF inthe IMS can retrieve and process the stored profile associated with aparticular subscriber, when an emergency call is received from thesubscriber to determine routing information for the received call.

FIG. 4 illustrates an example E911 profile 400 that facilitates optimalrouting of emergency calls in an IMS in accordance with an aspect of thesubject specification. The E911 profile can be generated (e.g., by theprofile generation component 306 in FIG. 3) for each subscriberassociated with the service provider and be utilized to store currentsubscriber information. In one example, the current subscriberinformation can be based in part on a subscriber's current location,which can be determined (e.g., by the location determination component304 in FIG. 3) by monitoring subscriber registration (e.g., by themonitoring component 302 in FIG. 3).

According to an embodiment, the E911 profile for each subscriber can begenerated and stored in a data store, such as, but not limited to, anHSS in the IMS. In one example, the E911 profile 400 can include variousparameters that can be populated based in part on the current subscriberlocation. For example, the parameters can include, but are not limitedto, a Temporary Telephone Number (TTN) 402, an Emergency ServicesRouting Number (ESRN) 404, and/or a LRF (Location Routing Function)indicator 406.

The TTN 402 can be employed as an ANI (Automatic Number Identification)for an emergency call, when a subscriber is located at a visiting tenantlocation. Typically, one TTN value can be predefined for each tenantlocation during an initial setup and can be predefined in the911/emergency system. It can be appreciated however, that the predefinedTTNs can be updated and/or modified at most any time, for example, by anetwork operator or service provider. Moreover, the TTN 402 can beemployed by a selective router to route an emergency call to a PSAPserving the visiting tenant location and as a call back number, in theevent the PSAP needs to contact the subscriber after the emergency callhas ended. Further, the ESRN 404 can be utilized by the IMS network(e.g., by an Emergency Services Gateway) to select a trunk to theselective router that serves the PSAP that serves the caller's location.Furthermore, the LRF indicator 406 can be employed to identify when theE-CSCF should query an LRF for additional routing information.Typically, the LRF query is performed when a subscriber is nomadic.However, it can be appreciated that the LRF can also be queried when asubscriber is located at a tenant location.

In one aspect, the parameters in the E911 profile can be populated(e.g., by the profile generation component 306 in FIG. 3) based on thelocation of the subscriber, as described infra. For example, whendetermined (e.g., by the location determination component 304 in FIG. 3)that the subscriber is at its home location, the TTN parameter can bepopulated as null and it can be determined whether an LRF query isrequired. If the query is not needed, a predefined ESRN can be assignedand the LRF indicator can be set to “No”. However, if determined that anLRF query is required, the LRF indicator can be set to “Yes” and theESRN can be assigned as null. In another example, when determined thatthe subscriber is located at a visiting tenant location (e.g., by thelocation determination component 304 in FIG. 3), a TTN can be assignedto the subscriber's profile and it can be determined whether an LRFquery is required. If the LRF query is not required, a predefined ESRNcan be assigned and the LRF indicator can be set to “No”. Alternately,if a query is required, the LRF indicator can be set to “Yes” and theESRN can be populated as null. In yet another example, when determinedthat the subscriber is nomadic (e.g., by the location determinationcomponent 304 in FIG. 3), the LRF indicator can be set to “Yes” and boththe ESRN and TTN parameters can be populated as null. It can beappreciated that population of parameters as discussed supra can beperformed, for example, by the profile generation component 306 in FIG.3, the AS 102 in FIG. 1, etc. The E911 profile for each subscriber canbe pushed to a data store in the IMS, such that, during emergency callprocessing, the E911 profile can be accessed by components of the IMS.In particular, the E-CSCF can analyze the parameters in the subscriber'sE911 profile to process and route the emergency call from thatsubscriber.

Referring now to FIG. 5, there illustrated is an example architecture500 that facilitates emergency call processing and routing in an IMS502, according to an aspect to the subject specification. In one aspect,system 500 can include an application server (AS) 504 that can includecomponents of system 300 (not shown), an HSS 508 and an E-CSCF 510 thatcan include component of system 200 (not shown). It can be appreciatedthat AS 504 can be substantially similar to AS 102 (FIG. 1) and caninclude functionality, as more fully described herein, for example, withregard to system 100.

According to an aspect, when a subscriber 506 relocates, thesubscriber's phone can reboot and register with the network 502. Thereboot procedure and new registration can be detected by the network 502and the AS 504 can be notified. In one example, the notificationprovided to an AS 504 can include the phone's current IP address.Typically, the AS 504 can maintain a list of the IP addresses associatedwith each tenant location (home and visiting). Upon receiving thenotification, the AS 504 can employ the IP address provided in thenotification to determine whether the subscriber is located at thesubscriber's home tenant location or at a visiting tenant location, orif the subscriber is nomadic (e.g., by the location determinationcomponent 304).

According to one embodiment, when the IP address provided in thenotification to the AS 504 indicates the subscriber is located at thehome tenant location, the AS 504 can populate the TTN parameter as nulland determine whether an LRF query is required. If determined that thequery is not needed, the AS 504 can assign an ESRN (Emergency ServiceRouting Key) and set the LRF indicator to “No”. If a query is required,the AS 504 can set the LRF indicator to “Yes” and populate the ESRN asnull. It can be appreciated that the population of profile parameterscan be facilitated by the profile generation component (306 in FIG. 3).The AS 504 can then push the newly created or updated E911 profile tothe HSS 508 (e.g., by the profile pushing component 308), for example,via a Sh interface.

Continuing with the example when the subscriber 506 is at the homelocation, the subscriber 506 can initiate an emergency call at most anytime, for example, by dialing 911 from the phone. The call can flow to aP-CSCF (Proxy-Call Session Control Function) 512, which can determinethat the call is an emergency call and route the call to E-CSCF 510. Onreceiving the emergency call, the E-CSCF 510 can query the HSS 508 toreceive the E911 profile associated with the subscriber 506. The E911profile indicates that the subscriber is at their home location, andaccordingly, the E-CSCF 510 can receive the ESRN. Specifically, when theLRF indicator is set to “No”, the ESRN is received from the HSS 508 andwhen the LRF indicator is set to “Yes”, an LRF/RDF (Location RoutingFunction or Routing Determination Function) 514 can be queried toreceive the ERSN. The E-CSCF 510 employs the ESRN to route the call tothe appropriate BGCF (Breakout Gateway Control Function) 516 whichtransfers the call to an ESGW (Emergency Services Gateway) 518.Generally, the ESGW 518 can comprises a media gateway controllerfunction (MGCF) 520 coupled with a media gateway (MGW) 522. The MGCF 520can employ the ESRN to determine which trunks it can deliver the callover. The trunks are connected to the appropriate SR (selective router)524. The MGCF 520 can deliver the call over the determined trunks, andcan replace the ESRN with the digits 911. The SR 524 can receive thecall and determine a PSAP 526 that the call should be delivered to,based in part on a table/database lookup. The call can then be deliveredto the determined PSAP 526, which can query an ALI DB (AutomaticLocation Identification database) 528 to pull up an ALI record for thecall. Accordingly, the PSAP 526 can receive the emergency call alongwith most any essential data to respond to the call.

According to another embodiment, when the IP address provided in thenotification to the AS 504 indicates the subscriber 506 is located at avisiting tenant location (e.g., identified by the location determinationcomponent 304), the AS 504 (e.g., by employing the profile generationcomponent 306) can assign a TTN to the subscriber's profile anddetermine whether an LRF query is required. It can be appreciated thatthe assigned TTN value can be predefined and associated with the tenantlocation. If the LRF query is not needed, the AS 504 can assign an ESRNassociated with the TTN and set the LRF indicator to “No”. If a query isrequired, the AS 504 can set the LRF indicator to “Yes” and populate theESRN as null. The AS 504 can then push the updated E911 profile to theHSS 508 (e.g., by the profile pushing component 308).

Continuing with the example when the subscriber 506 is at a tenantlocation, the subscriber 506 can make an emergency call from the tenantlocation, for example, by dialing 911 from the phone. The call can thenflow through the P-CSCF 512, which can determine that the received callis an emergency call and route the call to E-CSCF 510, which thenqueries HSS 508 to fetch an appropriate E911 profile for the subscriber506. The E911 profile comprises the TTN and ESRN associated with theTTN. In one example, when the LRF indicator is set to “Yes”, the ESRNcan be retrieved from the LRF/RDF 514. The E-CSCF 510 can utilize theESRN as the call-in number and the TTN as the calling party number.Further, the E-CSCF 510 can deliver the call to a BGCF 516, which candetermine an appropriate ESGW 518 for routing the call. In addition, theMGCF 520 can set up the call to the appropriate SR 524 by employing theESRN to select the appropriate trunks. Further, the MGCF 520 can replacethe ESRN with the digits 911 and send the TTN as the calling partynumber. When the SR 524 receives the call, the SR 524 can employ thecalling party number (TTN) to lookup a database (not shown) forselecting a PSAP 526 to service the call. The PSAP 526 can query the ALIDB 528 with the TTN and fetch the ALI record associated with the TTN.Moreover, the PSAP 526 can employ the ALI record and/or the call backnumber to attend to the emergency call.

In yet another embodiment, when the IP address indicates the subscriberis nomadic (e.g., identified by the location determination component304), the AS 504 can set the LRF indicator to “Yes” and populate theESRN and TTN parameters as null (e.g., by employing the profilegeneration component 306). The AS 504 can then push the updated E911profile to the HSS 508 (e.g., by the profile pushing component 308).When the nomadic subscriber initiates an emergency call (e.g. by dialing911 from the phone), the P-CSCF 512 can receive the call and route thecall to the E-CSCF 510. The E-CSCF 510 can then retrieve an E911 profilefor the subscriber 506 from the HSS 508. However, the E911 profile forthe nomadic subscriber comprises null values for the TTN and ESRN.Additionally the LRF indicator is set to “Yes”. Accordingly, the E-CSCF510 queries the LRF/RDF 514 with the calling party number to receive anESRN and an Emergency services query key (ESQK). The ESQK can beutilized as the calling party number. Further, the call can be routed tothe BGCF 516, which can employ the ESRN to determine an appropriate ESGW518 for routing the call. Similar to the previous examples, the MGCF 520can employ the ESRN to select the appropriate trunks and set up the callto an appropriate SR 524. In addition, the MGCF 520 can replace the ESRNwith the digits 911 and send the ESQK as the calling party number to theSR 524. The SR 524 employs the ESQK as a query key to determine a PSAP526 that can service the call. The call can then be routed to thedetermined PSAP 526 and the ESQK can be utilized as the ANI for thecall. The PSAP 526 can query the ALI DB 528 with the ESQK, which in turncan query the LRF/RDF 514 to obtain an address for the subscriber and/ora calling party number associated with the call. The PSAP 526 can employthe obtained information for responding to the received call.

Moreover, in each scenario, the 510 can perform at least the following,based on the E911 profile parameters:

-   -   1. Send the subscriber's telephone number as the ANI for the        emergency call when the TTN parameter is populated as null.    -   2. Send the contents of the TTN parameter as the ANI for the        emergency call when that parameter is populated with a value        other than a null value.    -   3. Query the LRF/RDF 514 when the LRF indicator is set to “Yes”.    -   4. Utilize the ESRN to route the call to the appropriate BGCF        516 and/or ESGW 518 when the ESRN parameter is populated with a        value other than null.

Referring now to FIG. 6, there illustrated is an example system 600 thatemploys an artificial intelligence (AI) component 602, which facilitatesautomating one or more features in accordance with the subjectinnovation. It can be appreciated that the AS 504, subscriber 506, HSS508, E-CSCF 510, PCSCF 512, LRF/RDF 514, BGCF 516, ESGW 518, MGCF 520,MGW 522, SR 524, PSAP 526 and ALI DB 528 can each include theirrespective functionality, as more fully described herein, for example,with regard to system 500. The subject innovation (e.g., in connectionwith E911 profile analysis, determination of current user location,determination of optimal PSAP, etc.) can employ various AI-based schemesfor carrying out various aspects thereof. For example, a process fordetermining current user location, optimal PSAP, emergency call routingetc. can be facilitated via an automatic classifier system and process.

A classifier is a function that maps an input attribute vector, x=(x1,x2, x3, x4, xn), to a confidence that the input belongs to a class, thatis, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action that auser desires to be automatically performed. A support vector machine(SVM) is an example of a classifier that can be employed. The SVMoperates by finding a hypersurface in the space of possible inputs,which the hypersurface attempts to split the triggering criteria fromthe non-triggering events. Intuitively, this makes the classificationcorrect for testing data that is near, but not identical to trainingdata. Other directed and undirected model classification approachesinclude, e.g., naïve Bayes, Bayesian networks, decision trees, neuralnetworks, fuzzy logic models, and probabilistic classification modelsproviding different patterns of independence can be employed.Classification as used herein also is inclusive of statisticalregression that is utilized to develop models of priority.

As will be readily appreciated from the subject specification, thesubject innovation can employ classifiers that are explicitly trained(e.g., via a generic training data) as well as implicitly trained (e.g.,via observing user behavior, receiving extrinsic information). Forexample, SVM's are configured via a learning or training phase within aclassifier constructor and feature selection module. Thus, theclassifier(s) can be used to automatically learn and perform a number offunctions, including but not limited to determining according to apredetermined criteria current user location, E911 profile parameters,optimal PSAP, emergency call routing etc. can be facilitated via anautomatic classifier system and process.

FIG. 7 illustrates an example call flow 700 that depicts processing ofan emergency call from a subscriber that has moved to a visiting tenantlocation, according to an aspect of the subject innovation. It can beappreciated that the subscriber 506, HSS 508, E-CSCF 510, PCSCF 512,BGCF 516, and PSAP 526 can each include their respective functionality,as more fully described herein, for example, with regard to system 500.

According to an aspect, the subscriber 506 can make an emergency call(e.g., by dialing 911 from a handset). At 1, the call establishmentsignaling (SIP INVITE) can be sent to the P-CSCF 512. Further, at 2, theP-CSCF 512 can select an E-CSCF 510 to process the call and send theINVITE to the selected E-CSCF 510. On receiving the INVITE, at 3, theE-CSCF 510 can query the HSS 508 to retrieve the subscriber's E911profile. In this example, since the subscriber 506 is at a visitingtenant location, the subscriber's E911 profile can include a TTN and anESRN and the LRF indicator can be set to “No”. At 4, the HSS 508 canprovide the subscriber's E911 profile to the E-CSCF 510. At 5, theE-CSCF 510 can employ the ESRN from the E911 profile to route the callto the appropriate BGCF 516 (and/or ESGW 518), which can route the callto a selective router (SR) (not shown). The SR can employ the TTN toroute the call to the PSAP.

FIG. 8 illustrates an example call flow 800 that depicts processing ofan emergency call from a nomadic subscriber, according to an aspect ofthe subject disclosure. It can be appreciated that the subscriber 506,HSS 508, E-CSCF 510, PCSCF 512, LRF/RDF 514, BGCF 516, PSAP 526 and ALIDB 528 can each include their respective functionality, as more fullydescribed herein, for example, with regard to system 500.

In accordance with an embodiment, the nomadic subscriber 506 can make anemergency call (e.g., by dialing 911 from a handset). At 1, the callestablishment signaling (SIP INVITE) can be sent to the P-CSCF 512. At2, the P-CSCF 512 can select an E-CSCF 510 to process the call and sendthe INVITE to the selected E-CSCF 510. On receiving the INVITE, at 3,the E-CSCF 510 can query the HSS 508 to fetch the subscriber's E911profile. In this example, the E911 profile associated with thesubscriber comprises an LRF indicator that is set to “Yes” and null ESRNand TTN parameters. At 4, the E-CSCF 510 receives the subscriber's E911profile from the HSS 508. The E-CSCF 510 determines that the LRFindicator in the E911 profile is set to “Yes” and accordingly at 5, theE-CSCF 510 queries the LRF/RDF 514 to retrieve an ESRN and an ESQKassociated with the call. Based on the received information, at 6, theE-CSCF 510 can route the call to the appropriate BGCF 516 (and/or ESGW518) by sending the INVITE. Further, the BGCF 516 can employ the ESRN todetermine an appropriate ESGW 518 for routing the call (not shown).Moreover, the ESGW 518 can employ the ESRN to select the appropriatetrunks and set up the call to an appropriate SR (not shown), which canemploy the ESQK to select a PSAP 526 that can service the call. As shownat 7, the call set up can continue to the selected PSAP 526. At 8, thePSAP 526 can query the ALI DB 528 with the ESQK. At 9, the ALI DB 528can query the LRF/RDF 514 to obtain an address for the subscriber and/ora calling party number associated with the call. Accordingly, at 10, theALI DB 528 can return information such as, but not limited to, anaddress for the subscriber and/or a calling party number associated withthe call, to the PSAP 526.

FIGS. 9-13 illustrate methodologies and/or flow diagrams in accordancewith the disclosed subject matter. For simplicity of explanation, themethodologies are depicted and described as a series of acts. It is tobe understood and appreciated that the subject innovation is not limitedby the acts illustrated and/or by the order of acts, for example actscan occur in various orders and/or concurrently, and with other acts notpresented and described herein. Furthermore, not all illustrated actsmay be required to implement the methodologies in accordance with thedisclosed subject matter. In addition, those skilled in the art willunderstand and appreciate that the methodologies could alternatively berepresented as a series of interrelated states via a state diagram orevents. Additionally, it should be further appreciated that themethodologies disclosed hereinafter and throughout this specificationare capable of being stored on an article of manufacture to facilitatetransporting and transferring such methodologies to computers. The termarticle of manufacture, as used herein, is intended to encompass acomputer program accessible from any computer-readable device, carrier,or media.

Referring now to FIG. 9, there illustrated is an example methodology 900that facilitates storing current user location information in a HSS (ormost any disparate data store) of an IMS, according to an aspect of thesubject innovation. At 902, subscriber information can be received. Inone example, subscriber information can include, but is not limited to,subscriber's IP address. Moreover, when the subscriber registers with aVoIP network, the registration IP address can be identified and a changein registration IP address can be detected. At 904, a current subscriberlocation is determined by utilizing the received information. Accordingto an aspect, the subscriber's IP address can be employed to classifythe subscriber's location (e.g., the subscriber is located at thesubscriber's home location, the subscriber is located at a location thatknown to an AS (different from the home location), or the subscriber islocated at a location that is unknown to the AS). For example, theregistration IP address can be compared with a list of predefined tenantIP addresses and/or a home IP address associated with the subscriber todetermine the subscriber's current location.

At 906, an E911 profile is generated for the subscriber. It can beappreciated that a new E911 profile can be created or an existing E911profile can be updated and/or modified. Typically, the E911 profile caninclude parameters, such as but not limited to, TTN, ESRN, LRFindicator, etc. Typically, the E911 profile parameters can facilitaterouting of an emergency call to an optimal PSAP and can provideinformation such as, but not limited to, a call back number, subscriberlocation, etc. At 908, the E911 profile is pushed to the HSS (or mostany disparate data store) of the IMS. The E911 profile can then bestored in the HSS and can be queried by an E-CSCF during emergency callprocessing.

FIG. 10 illustrates an example methodology 1000 for routing emergencycalls from a VoIP subscriber in accordance with an aspect of the subjectdisclosure. At 1002, an emergency call can be received from thesubscriber. For example, a subscriber in the United States of Americacan dial the digits 911 on the VoIP phone to initiate the call.Typically, components of the IMS can receive the call and identify thatthe call is an emergency call. At 1004, an E911 profile associated withthe subscriber can be retrieved from an HSS (or most any data store) inthe IMS. Typically, an AS can generate and/or update E911 profiles foreach subscriber and push the current E911 profiles to the HSS (or mostany data store) in the IMS. Further, at 1006, the call can be routed toa PSAP that is selected based on an analysis of the information in theE911 profile. The analysis can facilitate selection of an optimal PSAPthat can be closest to the subscriber's location, and/or can have amaximum number of available resources to attend to the emergency call.

FIG. 11 illustrates an example methodology 1100 that facilitatescreating an E911 profile for a VoIP subscriber and storing the E911profile within an IMS, according to an aspect of the subject innovation.Service logic that supports automatic and seamless determination ofsubscriber location can resides in an Application Server (AS). However,3GPP IMS standards do not include an AS in the standard call flow for anemergency call. Thus, the AS can generate an E911 profile and push theE911 profile to a data store within the IMS. At 1102, registrationinformation associated with a subscriber can be received. Typically,when a subscriber registers with the network (at most any location), theregistration IP address can be identified based on the registrationinformation. At 1104, it can be determined whether the registration IPaddress is the same as an IP address associated with the subscriber'shome location (home IP address), which can be predefined during networkprovisioning and/or initial setup. When the registration IP address isthe same as the home IP address for the subscriber, it can be determinedthat the subscriber is at the home location, as shown at 1106. When theregistration IP address is not equivalent to the home IP address for thesubscriber, the registration IP address can be compared to a list of IPaddresses associated with a service provider. At 1108, it can bedetermined whether the registration IP address is the same as an IPaddress from the list (disparate tenant IP address). Moreover, whendetermined that the registration IP address is a disparate tenant IPaddress, at 1110, it can be determined that the subscriber is visiting atenant location. Alternately, when determined that the registration IPaddress is not in the list, it can be determined that the subscriber isnomadic, as shown at 1112.

At 1114, it can be determined whether an E911 profile exists for thesubscriber. At 1116, a new E911 profile can be generated for thesubscriber, based in part on the subscriber's location, when determinedthat the E911 profile for the subscriber does not already exist in theHSS (or most any data store). Further at 1118, the generated profile canbe pushed to a HSS (or most any data store) within the IMS. Alternately,when an E911 profile exists for the subscriber, at 1120, it can bedetermined whether the subscriber's location has changed, for example,by comparing the determined location with the location associated withthe existing E911 profile. When the subscriber location is unchanged,methodology 1100 can be repeated when new registration information isreceived. However, when the subscriber location changes, the E911profile can be updated based in part on the new location as shown at1122. At 1118, the updated E911 profile can be pushed to a HSS (or mostany data store) within the IMS. Thereafter, the methodology 1100 can berepeated each time new registration information is received.

Referring to FIG. 12, there illustrated is an example methodology 1200that can be employed to facilitate E911 profile generation for asubscriber in accordance with an aspect of the subject disclosure.According to an aspect, the E911 profile can be pushed to a data storewithin the IMS, for example the HSS, such that, the HSS stores a currentand up-to-date E911 profile associated with each subscriber. Duringemergency call processing, an E-CSCF in the IMS can retrieve theappropriate E911 profile parameters associated with the subscriber fromthe HSS and employ the E911 profile parameters to determine a route forthe received emergency call.

At 1202, the subscriber's current location can be determined In oneexample, the IP address employed by the subscriber during registrationcan be utilized for determining the subscriber's location. Specifically,the subscriber can be classified as, at a home location, visiting at atenant location, or nomadic. At 1204, it can be determined whether thesubscriber is at the home location. Moreover, at 1206, when thesubscriber is at the home location, the TTN can be populated as null, anESRN can be assigned and the LRF indicator can be set as “No”. It can beappreciated that a flag can be employed as the LRF indicator. At 1208,it can be determined whether the subscriber is visiting at a tenantlocation. At 1210, a TTN and ERSN can be assigned and the LRF indicatorcan be set as “No”, when determined that subscriber is visiting a tenantlocation. Alternately, at 1212, both the TTN and ERSN can be populatedas null and the LRF indicator can be set as “Yes”, when determined thatsubscriber is nomadic (neither at home location nor at a tenantlocation).

FIG. 13 illustrates an example methodology 1300 that can be employed toutilize an E911 profile stored in a data store within the IMS tofacilitate emergency call processing, according to an aspect of thesubject disclosure. In one embodiment, when an emergency call isreceived by the IMS from a subscriber, methodology 1300 can be employedto optimally process and/or route the call. Specifically, at 1302, anE911 profile associated with the calling subscriber can be fetched froma data store within the IMS, such as, the HSS. In one aspect, an AS cangenerate and/or update E911 profiles associated with each subscriberbased on the current subscriber location and push the profileinformation to the data store (e.g., HSS). As an example, the E911profile can include parameters, such as, but not limited to, a TTN, anESRN, and/or an LRF indicator.

At 1304, the LRF indicator included in the E911 profile can be checked.Typically, the LRF indicator is set to “Yes” when the subscriber isnomadic. Accordingly, at 1360, when the LRF indicator is set to “Yes”,an LRF/RDF can be queried to retrieve an ESRN and an ESQK. Further, at1308, the ESQK can be utilized as the ANI for the emergency call.Alternately, at 1310, when the LRF indicator is set to “No”, it can bedetermined if the TTN is populated as a null value. In one example, whenthe subscriber is at the home location, the TTN is populated as a nullvalue. Accordingly, at 1312, when the TTN is a null, the subscriber'scalling telephone number can be utilized as the ANI. In contrast, at1314, the TTN can be employed as the ANI when the TTN is not a nullvalue (e.g., subscriber is visiting a tenant location). At 1316, theESRN can be utilized to select an appropriate and/or optimal BGCF and/orESGW to route the call. Specifically, when the subscriber is at a homeor tenant location, the ESRN value is assigned and can be obtained fromthe E911 profile of the subscriber. However, when the subscriber isnomadic, the ESRN can be queried from the LRF/RDF (as shown at 1360).

Referring now to FIG. 14, there is illustrated a block diagram of acomputer operable to execute the disclosed architecture that facilitatesprocessing emergency calls in a 3GPP IMS. In order to provide additionalcontext for various aspects of the subject specification, FIG. 14 andthe following discussion are intended to provide a brief, generaldescription of a suitable computing environment 1400 in which thevarious aspects of the specification can be implemented. While thespecification has been described above in the general context ofcomputer-executable instructions that may run on one or more computers,those skilled in the art will recognize that the specification also canbe implemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the specification may also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and nonvolatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer-readableinstructions, data structures, program modules or other data. Computerstorage media includes, but is not limited to, RAM, ROM, EEPROM, flashmemory or other memory technology, CD-ROM, digital versatile disk (DVD)or other optical disk storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canbe accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 14, the example environment 1400 forimplementing various aspects of the specification includes a computer1402, the computer 1402 including a processing unit 1404, a systemmemory 1406 and a system bus 1408. The system bus 1408 couples systemcomponents including, but not limited to, the system memory 1406 to theprocessing unit 1404. The processing unit 1404 can be any of variouscommercially available processors. Dual microprocessors and othermulti-processor architectures may also be employed as the processingunit 1404.

The system bus 1408 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1406includes read-only memory (ROM) 1410 and random access memory (RAM)1412. A basic input/output system (BIOS) is stored in a non-volatilememory 1410 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1402, such as during start-up. The RAM 1412 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1402 further includes an internal hard disk drive (HDD)1414 (e.g., EIDE, SATA), which internal hard disk drive 1414 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1416, (e.g., to read from or write to aremovable diskette 1418) and an optical disk drive 1420, (e.g., readinga CD-ROM disk 1422 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1414, magnetic diskdrive 1416 and optical disk drive 1420 can be connected to the systembus 1408 by a hard disk drive interface 1424, a magnetic disk driveinterface 1426 and an optical drive interface 1428, respectively. Theinterface 1424 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject specification.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1402, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the example operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the specification.

A number of program modules can be stored in the drives and RAM 1412,including an operating system 1430, one or more application programs1432, other program modules 1434 and program data 1436. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1412. It is appreciated that the specification can beimplemented with various commercially available operating systems orcombinations of operating systems.

A user can enter commands and information into the computer 1402 throughone or more wired/wireless input devices, e.g., a keyboard 1438 and apointing device, such as a mouse 1440. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1404 through an input deviceinterface 1442 that is coupled to the system bus 1408, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1444 or other type of display device is also connected to thesystem bus 1408 via an interface, such as a video adapter 1446. Inaddition to the monitor 1444, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1402 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1448. The remotecomputer(s) 1448 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1402, although, for purposes of brevity, only a memory/storage device1450 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1452 and/orlarger networks, e.g., a wide area network (WAN) 1454. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich may connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1402 isconnected to the local network 1452 through a wired and/or wirelesscommunication network interface or adapter 1456. The adapter 1456 mayfacilitate wired or wireless communication to the LAN 1452, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1456.

When used in a WAN networking environment, the computer 1402 can includea modem 1458, or is connected to a communications server on the WAN1454, or has other means for establishing communications over the WAN1454, such as by way of the Internet. The modem 1458, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1408 via the serial port interface 1442. In a networkedenvironment, program modules depicted relative to the computer 1402, orportions thereof, can be stored in the remote memory/storage device1450. It will be appreciated that the network connections shown areexample and other means of establishing a communications link betweenthe computers can be used.

The computer 1402 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, atan 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, orwith products that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic 10 BaseT wiredEthernet networks used in many offices.

It is to be noted that aspects, features, or advantages of the subjectinnovation described in the subject specification can be exploited insubstantially any wired and/or wireless communication technology. Forinstance, 4G, Enhanced GPRS, 3GPP LTE, 3GPP2 UMB, 3GPP UMTS, HSPA, orZigbee. Additionally, substantially all aspects of the subjectinnovation as disclosed in the subject specification can be exploited inlegacy telecommunication technologies.

What has been described above includes examples of the presentspecification. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the present specification, but one of ordinary skill in theart may recognize that many further combinations and permutations of thepresent specification are possible. Accordingly, the presentspecification is intended to embrace all such alterations, modificationsand variations that fall within the spirit and scope of the appendedclaims. Furthermore, to the extent that the term “includes” is used ineither the detailed description or the claims, such term is intended tobe inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

What is claimed is:
 1. A system, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: based onregistration data received from a user equipment during a coupling ofthe user equipment to a communication network device, determiningaddress data representing an internet protocol address of the userequipment, based on the address data, verifying that the user equipmentis not located at a home location associated with the user equipment andthat the user equipment is not located at a tenant location associatedwith a business account to which the user equipment has an authorizedsubscription, and in response to the verifying, populating emergencyservice profile data of the user equipment, wherein the populatingcomprises assigning null values to a temporary telephone number and anemergency services routing number, and assigning a value to a locationrouting functionality indicator, and wherein the value indicates that alocation routing function device is to be queried for routing data inresponse to determining that an emergency call has been received fromthe user equipment.
 2. The system of claim 1, wherein the operationsfurther comprise: directing the emergency service profile data to anetwork data store that is employable to store subscriber information.3. The system of claim 1, wherein the address data is first addressdata, the internet protocol address is a first internet protocoladdress, and the verifying comprises comparing the first address datawith second address data representing a second internet protocol addressassociated with the home location.
 4. The system of claim 3, wherein theverifying comprises determining, based on the comparing, that the firstaddress data does not match the second address data.
 5. The system ofclaim 1, wherein the address data is first address data, the internetprotocol address is a first internet protocol address, and the verifyingcomprises comparing the first address data with second address datarepresenting a second internet protocol addresses associated with thetenant location.
 6. The system of claim 5, wherein the verifyingcomprises determining, based on the comparing, that the first addressdata does not match the second address data.
 7. The system of claim 1,wherein the routing data comprises information indicative of a non-nullvalue for the emergency services routing number.
 8. The system of claim7, wherein the emergency services routing number is employable to routethe emergency call via a selected router device.
 9. The system of claim1, wherein the routing data comprises information indicative of anemergency services query key that is employable by an emergency servicedevice as a calling party number for the user equipment.
 10. The systemof claim 9, wherein the emergency services query key is employable toselect a public safety answering point device that is utilized toservice the emergency call.
 11. The system of claim 1, wherein theemergency call is a voice over internet protocol call.
 12. A method,comprising: during a registration of a user equipment with acommunication network device, receiving, by a system comprising aprocessor, address data representing an internet protocol address of theuser equipment; based on the address data, determining, by the system,that the user equipment is not located at a home location associatedwith the user equipment and that the user equipment is not located at atenant location associated with a business account to which an identityassociated with the user equipment has subscribed; and in response tothe determining, updating, by the system, emergency service profile dataassociated with the user equipment that is employable to facilitate arouting of an emergency call has been received from the user equipment,wherein the updating comprises assigning null values to a temporarytelephone number associated with the user equipment and an emergencyservices routing number associated with the user equipment, andassigning a value to a location routing functionality indicator, andwherein the value indicates that routing data that facilitates therouting is to be requested from a location routing function device. 13.The method of claim 12, further comprising: facilitating, by the system,a transmission of the emergency service profile data to a network datastore that stores subscriber information.
 14. The method of claim 12,wherein the address data is first address data, the internet protocoladdress is a first internet protocol address, and the determiningcomprises determining that the first address data does not match secondaddress data representing a second internet protocol address associatedwith the home location.
 15. The method of claim 12, wherein the addressdata is first address data, the internet protocol address is a firstinternet protocol address, and the determining comprises determiningthat the first address data does not match second address datarepresenting a second internet protocol address associated with thetenant location.
 16. The method of claim 12, wherein the assigning thevalue facilitates receiving, from the location routing function device,information indicative of a non-null value for the emergency servicesrouting number that is employable to select a router device forfacilitating the routing.
 17. The method of claim 12, wherein theassigning the value facilitates receiving, from the location routingfunction device, information indicative of an emergency services querykey that is employable to select a public safety answering point devicethat is utilized to service the emergency call.
 18. A computer-readablestorage device comprising computer-executable instructions that, inresponse to execution, cause a system comprising a processor to performoperations, comprising: based on address data representing an internetprotocol address of a user equipment that is received during aregistration of the user equipment with a communication network device,verifying that the user equipment is not located at a first locationassigned to the user equipment and that the user equipment is notlocated at a second location assigned to a business account to which theuser equipment is subscribed; and in response to the verifying,assigning null values to a temporary telephone number and an emergencyservices routing number associated with the user equipment, wherein thetemporary telephone number and the emergency services routing number areutilized to facilitate a routing of an emergency call received from theuser equipment; and in response to the verifying, assigning a value to alocation routing functionality indicator, wherein the value indicatesthat routing data that facilitates the routing is to be received from alocation routing function device.
 19. The computer-readable storagedevice of claim 18, wherein the routing data is indicative of a non-nullvalue for the emergency services routing number that is employable toselect a router device for facilitating the routing.
 20. Thecomputer-readable storage device of claim 18, wherein the routing datais indicative of an emergency services query key that is employable toselect a public safety answering point device that is utilized toservice the emergency call.