摘要:
A system for providing two-way Web services is disclosed that enables the client (121) and server (122) to be in different enterprise domains (110) - behind firewalls (111) - with few or no changes to the firewalls. In accordance with the illustrative embodiment, a "tunnel hub" (112) is deployed in the public domain and "tunnel gateways" (113) are deployed behind the firewalls where the clients request two-way services and the servers provide two-way services. Each tunnel gateway initiates a secure tunnel (131) out through the firewall to the target hub. Thereafter, a request for service enters the tunnel gateway, travels to the tunnel hub and to the appropriate tunnel gateway where the server is that provides the service. When the server provides the service, it enters the tunnel gateway, travels to the tunnel hub and to the appropriate tunnel gateway where the client is that requested the service.
摘要:
A method, apparatus and computer program product for providing communications including an extended protocol header is presented. A message is provided in a communication protocol, the message having a header. An extension is included in the header, the extension including additional information. The message is transmitted to a recipient, wherein the recipient is capable of utilizing the additional information contained in the extension to the header to provide additional functionality.
摘要:
The proposed invention provides a user-friendly way for people to turn a traditional in-progress voice-only telephone call into a multi-media call. This may be accomplished using various technologies that can be provided over the Internet or some other multi-media computing/networking platform. The multi-media aspect of the invention may be used to facilitate the sharing of additional information between the call participants as well as dynamically update security aspects (e.g., encryption keys) associated with call.
摘要:
An apparatus and methods are disclosed for use by organizations that have PBXs at a plurality of sites. The invention pertains to cell phone calls from an affiliated terminal to her "home" private branch exchange. For example, an employee who works at the Chicago branch office might call the Chicago office's PBX to invoke a feature such as setting up call forwarding, retrieving voice mail, etc. Such calls might be automatically and transparently directed to another PBX when it is advantageous to do so. In the illustrative embodiment, the need or desirability to redirect such calls to another PBX is ascertained while the caller is still in the process of entering all of the required calling information. The effect of assessing whether to redirect the call in parallel with the caller entering the information is to reduce the delays otherwise experienced by the caller when placing calls outside of the enterprise area served by the home private branch exchange.
摘要:
A context sensitive filter method and apparatus is provided. In particular, information regarding the context in which a request for content is made is gathered, and is used to select filter parameters for application to content returned in response to the request. Context information can include information from a calendar application, location information, user preferences or other inputs.
摘要:
Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience.
摘要:
Echo detection and monitoring systems and methods are provided. According to the invention, the outgoing and incoming voice bearer channels of a voice communication are monitored. The outgoing and incoming signals are time aligned, and measures are then taken to determine whether echo is present in the signal. In accordance with an embodiment of the present invention, the outgoing signal is fed through an adaptive filter.
摘要:
Information is identified as sensitive and a lapsed time job (Chron Job) is created that will allow the deletion of sensitive information after a period of time. The interval could be set to be longer than vacation or other planned use, and yet short enough to limit the period where risk to the organization or individual is incurred. The Chron Job could be integrated with the user's calendar, such that the Chron Job considers holiday time as a means of delaying execution of the Chron Job which would allow a shorter interval to be selected. In addition to deletion of the information identified as sensitive, additional steps could also be taken, such as the purging of the recycle bin, modification of the FAT, and optionally the deletion of related information. Once information is identified as sensitive, the information and derivative works are tracked and managed.
摘要:
A method for estimating the network-layer topology of a telecommunications network is described. In particular, the illustrative embodiment of the present invention estimates the existence and connectivity of nodes in the topology based on the detection of network-wide end-to-end path intersections. This is based on the assumption that pairs of streams of packets that share a common node will interfere and that the interference can be detected in the received streams. In general, this interference is manifested as jitter. By transmitting streams on each pair of end-to-end paths in the network, and detecting interference (or a lack of interference) a matrix of path intersections for the network can be created (201). Using logic and supposition, the topology of the network can be estimated using the matrix of path intersections (202). Once the estimate of the topology is complete, the maintenance and operation of the network can proceed based on the topology (203).
摘要:
The present invention provides a new network topology. More specifically, a peer-to-peer network is defined on a virtual private network. The peer-to-peer network comprises a set of specified users within a virtual private network that are allowed to communicate according to predetermined rules enforced by the peer-to-peer network itself. This affords secure communication between the specified users of the peer-to-peer network independent of the virtual private network.