Acacia's Subsidiary Licenses TeleCommunication Systems Inter-Carrier Messaging Services
TeleCommunication Systems, Inc. (TCS), a world leader in highly reliable and secure mobile communication technology, recently announced that it has entered a patent licensing alliance with a subsidiary of Acacia Research Corporation, a leader in patent licensing. According to the terms of the agreement, the subsidiary of Acacia is now the exclusive licensor of TCS' inter-carrier messaging (ICM) patent portfolio.
A phone number only messaging experience is provided in an Inter-Carrier Short Messaging System (IC-SMS) service. Subscribers to subscriber messages are routed between carrier's networks using an Inter-Carrier messaging module with appropriate MIN/carrier/carrier routing look-up capabilities. Short messages may be sent to a subscriber in another carrier's network addressed only with a phone number. If the recipient is outside of the sender's carrier network, the Inter-Carrier messaging module of the Inter-Carrier service provider (ICSP) determines the appropriate carrier for the recipient, appends the appropriate syntax to the short message to allow internet protocol (IP) or other standardized communication techniques between SMSCs of the two carriers, and routes the short message to the destination carrier.
"This alliance is an important step in our plan to monetize the company's intellectual property," said Maurice B. Tose, TCS chairman, CEO and president, in a statement. "Acacia Research is a premiere patent licensing company; and we believe that their scale, specialized expertise, and track record indicate that this alliance will enable us to efficiently optimize our return on the company's investment in these patents."
Meanwhile, TeleCommunication Systems, Inc. recently announced the expansion of its Secure the Edge[TM] portfolio with the introduction of Security Broker and Secure Multimedia Communications, creating the industry's leading end-to-end suite of mobile broadband security applications and services for authentication, verification and notification. As commercial and government organizations encourage remote work, provide employees with mobile devices and introduce bring your own device (BYOD) policies into the workplace, the multitude of access points to the network increases the risk of data leakage. Despite steadily increasing threats, according to Juniper Research, today, fewer than 1 in 20 smartphones and tablets have third-party security installed.
Edited by Brooke Neuman