摘要:
A platform (300) is disclosed that enables security monitoring and protection across a plurality of related telecommunications devices. The self-operating security platform of the present invention is based on a collection of security adapters (304) that are tied together and are coupled with an orchestration engine (303) that loads and executes workflow scripts. Workflow scripts have been used for business applications, but their usage in real-time telecommunications devices is relatively new. Each security adapter monitors a different aspect of the system for intrusions or other security threats. The specific security protection rules are taught to the security platform in a basic profile; as the security platform runs, it builds up the actual profile of how the telecommunications device performs in a normal state. In other words, the security platform "composes" new workflow scripts from basic workflow scripts. The self-expanding nature of the workflow enables the telecommunications device to learn the behavioral patterns of its users.
摘要:
A method for providing signals in a conference call among a plurality of participants, and a signal used in the method. The participants on the call are ordered in a sequential ring, and inputs, representing audio and/or video input, are taken from at least some of the participants in the ring during succeeding time intervals. The inputs are placed in a signal that contains header information specifying the location of inputs in the signal, and the participant from whom the input was taken. That signal is circulated about the ring during which each participant replaces its input in the signal from the prior cycle with a current input. The combined signal is then played to the participant.
摘要:
A method is disclosed that enables an improvement in the scalability of a centralized server by reallocating to the client endpoints some, but not all, of the feature functionality of the server. Each logical user in the system is represented by his own private domain of endpoint entities, from which an endpoint is selected to serve as a super peer to represent the user to the centralized server. Furthermore, a designated endpoint is selected, also from the private domain of devices; to handle some of the telecommunications features that the server otherwise would have handled. Each endpoint in the private domain is permitted to have limited direct access to the server, typically for the purposes of registering and subscribing to features, in addition to and in contrast with the indirect access through the super peer. During the subscribing process, the server redirects a subscribing endpoint to the designated endpoint that is handling the feature.
摘要:
A method and system are disclosed that enable performance improvements by reallocating to client endpoints at least some of the feature functionality of a server. Each logical user in the system is represented by his own private domain of endpoint entities, from which an endpoint is selected to serve as a super peer to represent the user to the centralized server. Furthermore, one or more endpoints in the private domain of endpoints handle some of the telecommunications features that the server otherwise would have handled. An endpoint that needs to access a particular feature determines the best endpoint to handle the feature, in part by querying the other endpoints in the private domain. If the querying endpoint wants to subscribe to a feature that is located at an endpoint in the private domain, the querying endpoint interacts with the relevant endpoint without requiring the further assistance of a server.
摘要:
In one embodiment, an enterprise network is provided that includes subscriber communication devices 120, 148, and 150, an archival server 128 to store representations of communications between subscribers and/or between subscribers and nonsubscribers, and a module 160, 168, and/or 174 that analyzes a communication by a subscriber for selected content and, when the selected content is present in the communication, determines a weighted value associated with the communication and/or subscriber. The value reflects timing information associated with the communication. The archival server subsequently uses the weighted value to locate the recorded communication and/or identify the subscriber as being fluent in the selected content.
摘要:
A method and an apparatus are disclosed that manage the held calls for an off-premises terminal at the system that extends calls to the terminal, such as a private branch exchange or other type of data-processing system, instead of at the system that is receiving the extended calls, such as a mobile switching center at which a cell phone is registered. The disclosed technique is based on the observation that the extending system knows of an incoming call to an off-premises terminal before the receiving system. As a result, the extending system can advantageously select the calls that it holds versus the calls that it sends to the receiving system. The extending system can control the routing costs and provide a consistent look-and-feel of call control to the off-premises terminal user.
摘要:
A method and apparatus are disclosed that enable a user who forgets one of his two passwords to securely recover the forgotten password. After a user logs in using one of his two passwords, the illustrative embodiment reveals the other password to the user. The passwords are stored in a persistent table in both hashed and encrypted forms, but not in their original forms. The illustrative embodiment is advantageous over the prior art, where forgotten passwords are reset to a default value, in two ways. First, it avoids the inconvenience of a user having to log in using the default password, think up a new string that would make a good password, and change the password from the default to the new string. Second, it avoids the use of default-value passwords that might compromise security.
摘要:
A method for preventing or limiting the effects of Denial-of-Service attacks in a communication appliance having a packet-classification rule base which allows all legitimate packets to be forwarded to the communication appliance includes monitoring incoming packets to the communication appliance to determine whether conditions indicating a Denial-of-Service attack are present. If a Denial-of-Service attack is present, a rule base subset of the packet-classification rule base is selected from a plurality of rule base subsets based on a current one of a plurality of operating states of the communication appliance.
摘要:
A method and apparatus are disclosed that enable a user who is on a call using a call appearance at a first terminal to continue the call on a call appearance at a second terminal, wherein the second terminal has been excluded from the call. In the illustrative embodiment of the present invention, a private branch exchange that handles both telecommunications terminals receives a first signal that indicates that the first terminal has disconnected from the call. The private branch exchange then receives a second signal that indicates that the second terminal has gone off-hook or otherwise indicates a request to be added to the call. If the private branch exchange has received the second signal within a predetermined time interval after having received the first signal, then it adds the second terminal to the call.
摘要:
A method and an apparatus are disclosed that manage the held calls for an off-premises terminal at the system that extends calls to the terminal, such as a private branch exchange or other type of data-processing system, instead of at the system that is receiving the extended calls, such as a mobile switching center at which a cell phone is registered. The disclosed technique is based on the observation that the extending system knows of an incoming call to an off-premises terminal before the receiving system. As a result, the extending system can advantageously select the calls that it holds versus the calls that it sends to the receiving system. The extending system can control the routing costs and provide a consistent look-and-feel of call control to the off-premises terminal user.