摘要:
A presentity is used to represent and report states of an issue or a transaction. The issue or the transaction is an intangible (an incorporeal, non-physical) entity. The presentity for the issue or the transaction is created, a state of the issue or the transaction received from a handler of the issue or the transaction is registered in the presentity, and the registered state is reported to watchers of the presentity. Preferably, a handler registers with the presentity as a proxy for the issue or the transaction, and messages sent to the presentity are forwarded to the handler who is the registered proxy. If the issue or the transaction comprises a plurality of entities, preferably a separate presentity for each one of the entities, as well as for the issue or the transaction as a whole, is created and used.
摘要:
In one embodiment, an enterprise network is provided that includes a mobility module 150 associated with a first or second switch/server 100 or 104, respectively. On the second switch/server, the mobility agent manages a pool of mobility user station records 168a-j and creates visitor application records 172a-i associated with a external subscriber communication devices 136a-n. Each visitor application record is associated with a subscriber whose communication device is controlled by the first switch/server 100. In response to a selected stimulus, outgoing call processing for selected communication devices on the first switch/server is moved to the second switch/server 104 by associating, for each such device, a selected record 168 with a corresponding record 172.
摘要:
A platform (300) is disclosed that enables security monitoring and protection across a plurality of related telecommunications devices. The self-operating security platform of the present invention is based on a collection of security adapters (304) that are tied together and are coupled with an orchestration engine (303) that loads and executes workflow scripts. Workflow scripts have been used for business applications, but their usage in real-time telecommunications devices is relatively new. Each security adapter monitors a different aspect of the system for intrusions or other security threats. The specific security protection rules are taught to the security platform in a basic profile; as the security platform runs, it builds up the actual profile of how the telecommunications device performs in a normal state. In other words, the security platform "composes" new workflow scripts from basic workflow scripts. The self-expanding nature of the workflow enables the telecommunications device to learn the behavioral patterns of its users.
摘要:
The present invention is directed to a voice activity detector that uses the periodicity of amplitude peaks and valleys to identify signals of substantially fixed power or having periodicity.
摘要:
A computing system is provided that includes a display 124 for displaying , information and an audible locating agent 148 that, as a pointer moves over the display, plays audible locating signals to identify spatial locations of at least some of the displayed information.
摘要:
A method, apparatus and computer program product for providing communications including an extended protocol header is presented. A message is provided in a communication protocol, the message having a header. An extension is included in the header, the extension including additional information. The message is transmitted to a recipient, wherein the recipient is capable of utilizing the additional information contained in the extension to the header to provide additional functionality.
摘要:
A method and apparatus for distributing high-bandwidth and low-bandwidth voice channels is presented. An input signal is received and separated into a first low-band signal and a first high-band signal. The first low-band signal is compressed to provide a low-bandwidth channel and is used to carrying encoded voice signals (e.g. G.711). The high-band signal is also compressed to provide a high-bandwidth channel and is used to carry encoded voice signals (e.g. G.722).
摘要:
A method and system for resetting passwords in which an authenticated user who requests a new password is substantially immediately provided with one portion of the reset password while a second portion of the password is sent to a location to which the legitimate user for which the password is provided has access, such as a voice mailbox.
摘要:
Methods and apparatus are provided for dynamically adjusting the configuration of one or more resources in a resource allocation system. One or more capabilities of a resource managed by a resource allocation system can be dynamically updated. Once it is determined that the resource has become available, the resource can be assigned, in response to the determination, to the request based on the one or more updated capabilities. The capability updates can be received, for example, from an external system or can be based on one or more rules that are triggered based on predefined conditions.