摘要:
A participant in a three dimensional computer-generated virtual environment can control a dispersion pattern of his Avatar's voice such that the Avatar's voice may be directionally enhanced using simple controls. The audio dispersion envelope is designed to extend further in front of the Avatar and less to the Avatar's sides and rear. The audio dispersion envelope may be static or controllable to enable the distance the Avatar's voice travels within the virtual environment to be adjusted. Thus, the Avatar can whisper or "shout" in the virtual environment such that other Avatars, normally outside of hearing range of the Avatar, may selectively receive audio generated by the user. Separate audio streams are mixed for each user, from audio generated by users with Avatars within their Avatar's dispersion envelope. The volume of a particular contribution depends on the separation of the Avatars within the virtual environment.
摘要:
The present invention is directed to a method and device for assigning a telephone number to a browsing session and for providing physical location information to a public safety answering point in association with a web-based chat or relay session.
摘要:
Methods, devices, and systems are provided for taking a pluggable extension and applying it to a unique set of a user population to handle their preferred and user-centric alerting relationships. More particularly, the pluggable extension allows a user to have their personalized contact resolution algorithm applied by a server to calls initiated by them or directed toward. The contact resolution algorithm is pluggable to any server and does not need to be built into the server itself. Moreover, multiple users can refer to and use the same pluggable contact resolution algorithm.
摘要:
A system and method are provided for detecting extension attacks made to a communication enterprise, and taking appropriate remedial action to prevent ongoing attacks and future attacks. One or more attributes (82) of a suspect call are analyzed, and a risk (88,86,90) is associated with each analyzed attribute. An overall risk or assessment is then made (127) of the analyzed attributes, attack attributes are logged, and one or more remedial actions may be triggered as a result of the analyzed call attributes. The remedial actions may include recording the call, notifying an administrator of a suspect call, or isolating the communication enterprise from the attack by terminating the call or shutting down selected communication endpoints to prevent calls being made to those extensions. Rules may be applied to the analyzed attributes in order to trigger the appropriate remedial action. The call attributes analyzed may include call destination (94), call direction (100), call type (98), time of day of the call (96), call duration (102), whether a call source is spoofed (92), call volume from a particular call source (91), and hash values created for a suspect media stream (104).
摘要:
A split-plane mobility network architecture separates control and data plane operations typically encapsulated in a conventional wireless controller. Configurations provide a unified split-plane mobility switch that separates the data transport and switching in a separate hardware element, and performs control plane operations via exchanges with a centralized topology, rather than simply by adjacent switches within range. In contrast to conventional switch deployment, in which the same switch handles processing demands of the control plane and the data plane, the disclosed approach separates the data plane processing base by employing a mobility agent to define adjacent switch visibility. Thus, the routing capabilities of the data plane may be enhanced, such as to handle increasingly bandwidth-hungry applications of the same user base, without uprooting the infrastructure defined by the control plane.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for presenting a contact manager associated with a communication session represented in a graphical user interface (GUI). The method includes grouping by context contacts associated with a user in the communication session, wherein the communication session is displayed as a set of connected graphical elements representing a structure of the communication session, presenting on the GUI a graphical representation of at least a part of the grouped contacts, receiving user input associated with one contact of the contacts and the communication session, and modifying the communication session based on information associated with the user input and the one contact. Grouping the contacts by context can include sorting the contacts as a cache, and grouping based on user preferences, user communications history, social networks, topic, project, and/or employer.
摘要:
A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as "watermarking." The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues.
摘要:
One exemplary aspect is advanced multimedia communications via OCAP using customer specific profiles resident in the STB for bill management. Aspects of the invention also relate to managing payment preferences, auto payment of bills or invoices, managing bill notification preferences, triggering a notification to be sent to one or more of an associated device and the STB upon receipt of a bill, analyzing an incoming bill with an intelligent agent and optionally initiating a communication to the vendor associated with a bill based on the analysis, acquiring additional information about the bill including an image of the bill and/or additional details, and forwarding invoice information to a destination associated with the STB.