Unified Communications Featured Article

Acacia's Subsidiary Licenses TeleCommunication Systems Inter-Carrier Messaging Services

May 02, 2012

TeleCommunication Systems, Inc. (TCS), a world leader in highly reliable and secure mobile communication technology, recently announced that it has entered a patent licensing alliance with a subsidiary of Acacia Research Corporation, a leader in patent licensing. According to the terms of the agreement, the subsidiary of Acacia is now the exclusive licensor of TCS' inter-carrier messaging (ICM) patent portfolio.

A phone number only messaging experience is provided in an Inter-Carrier Short Messaging System (IC-SMS) service. Subscribers to subscriber messages are routed between carrier's networks using an Inter-Carrier messaging module with appropriate MIN/carrier/carrier routing look-up capabilities. Short messages may be sent to a subscriber in another carrier's network addressed only with a phone number. If the recipient is outside of the sender's carrier network, the Inter-Carrier messaging module of the Inter-Carrier service provider (ICSP) determines the appropriate carrier for the recipient, appends the appropriate syntax to the short message to allow internet protocol (IP) or other standardized communication techniques between SMSCs of the two carriers, and routes the short message to the destination carrier.

"This alliance is an important step in our plan to monetize the company's intellectual property," said Maurice B. Tose, TCS chairman, CEO and president, in a statement. "Acacia Research is a premiere patent licensing company; and we believe that their scale, specialized expertise, and track record indicate that this alliance will enable us to efficiently optimize our return on the company's investment in these patents."

Meanwhile, TeleCommunication Systems, Inc. recently announced the expansion of its Secure the Edge[TM] portfolio with the introduction of Security Broker and Secure Multimedia Communications, creating the industry's leading end-to-end suite of mobile broadband security applications and services for authentication, verification and notification.  As commercial and government organizations encourage remote work, provide employees with mobile devices and introduce bring your own device (BYOD) policies into the workplace, the multitude of access points to the network increases the risk of data leakage. Despite steadily increasing threats, according to Juniper Research, today, fewer than 1 in 20 smartphones and tablets have third-party security installed.

Edited by Brooke Neuman

Request a Quote
Become a Partner

Featured Blog

Millennials and Technology – "I want it now"

The millennial generation, also known as individuals born between the years of 1980 and 2000, are a group of highly collaborative adults estimated to account for roughly 75% of the global workforce by the year 2025...

4 Steps to safely enter 2016 with Fusion and leave your old provider behind

Enough is enough! You can't tolerate the dropped calls, the complaints from upper management, and the slow response time from customer service. You saw the signs of the breakup all along, and now it's time to move onto something new...

Practical Benefits of a Unified Communications System

The business world of is rapidly changing thanks to the technological advancements of recent years...