摘要:
A method and system are disclosed that enable performance improvements by reallocating to client endpoints at least some of the feature functionality of a server. Each logical user in the system is represented by his own private domain of endpoint entities, from which an endpoint is selected to serve as a super peer to represent the user to the centralized server. Furthermore, one or more endpoints in the private domain of endpoints handle some of the telecommunications features that the server otherwise would have handled. An endpoint that needs to access a particular feature determines the best endpoint to handle the feature, in part by querying the other endpoints in the private domain. If the querying endpoint wants to subscribe to a feature that is located at an endpoint in the private domain, the querying endpoint interacts with the relevant endpoint without requiring the further assistance of a server.
摘要:
A method is disclosed that enables the implementation of an embedded firewall at a telecommunications endpoint. In particular, the illustrative embodiment of the present invention addresses the relationship between the application, firewall engine, and packet-classification rules database that are all resident at the endpoint. In the variations of the illustrative embodiment that are described herein, the application: (i) directly communicates with the co-resident firewall engine such as through local message passing, (ii) shares memory with the firewall engine, and (iii) makes socket calls to the operating system that are intercepted by a middleware layer that subsequently modifies the rules database, depending on the socket call. The common thread to these techniques is that the application, firewall engine, and rules database are co-resident at the endpoint, which is advantageous in the implementation of the embedded firewall.
摘要:
An apparatus and method are disclosed that enable a private branch exchange to determine that a voice mail system has answered a call, without some of the disadvantages in the prior art, The private branch exchange-or, generally-speaking, a data-processing system-infers that the voice mail system has answered a call by timing key events or by noting some of indications that are received from another system, or both. Subsequently, the private branch exchange drops the voice mail system from the call, thereby minimizing the non-enterprise voice mail system's handling of calls that are originated to an on-premises terminal.
摘要:
A method is disclosed that enables the avoidance of a processor overload of a telecommunications endpoint device that is susceptible to traffic floods. An enhanced network switch sets the speed on one of its data ports as a specific function of the speeds of the devices that are donnected to one or more of its other data ports. This behavior is different from that of network switches in the prior art, in which the data rate of a port in the prior art is auto-negotiated to the highest speed that can be supported by the network elements at either end of the port's connection, regardless of the other devices present. By considering the specific devices that are connected, the enhanced network switch is able to limit the amount of traffic that is directed by an upstream device, such as a router, towards a device with limited processor capability, such as a packet-based phone.
摘要:
A method is disclosed that breaks the "one line, one location" paradigm of teleconferencing in the prior art. The teleconference bridge in the illustrative embodiment is able to utilize more than one audio channel from each location, where there are multiple signal sources present in the room. As a result, the bridge is able to determine acoustically whether two are more endpoints are collocated with each another. During an initialization sequence, the bridge transmits special audio signals to one or more endpoints present in a particular sound field; those endpoints then play the signals out of their loudspeakers. Based on a characteristic (e.g., amount of correlation, signal strength, etc. ) of the signals received at each microphone present in the same sound field, the bridge determines whether to include or exclude signals that are received from a first endpoint when preparing a signal for transmission to a second endpoint during a conference call.
摘要:
A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as "watermarking." The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues.
摘要:
A network apparatus and method for managing power supplied to a network device (215). A plurality of power inputs (320,115,375) to the network device are scanned (350,355) to ascertain if a power signal is present and to identify an active power source (320,115,375). Available power is determined from the active power source (320,115,375) and required power (315) for the network device (215) and any operatively connected auxiliary devices is also determined. The required power is compared to available power to determine if available power is sufficient to power the network device. An operation of the network device is controlled (370) based upon the active power source and/or if available power is insufficient to power the network device.
摘要:
A method is disclosed that enables the implementation of an embedded firewall at a telecommunications endpoint. In particular, the illustrative embodiment of the present invention addresses the relationship between the application, firewall engine, and packet-classification rules database that are all resident at the endpoint. In the variations of the illustrative embodiment that are described herein, the application: (i) directly communicates with the co-resident firewall engine such as through local message passing, (ii) shares memory with the firewall engine, and (iii) makes socket calls to the operating system that are intercepted by a middleware layer that subsequently modifies the rules database, depending on the socket call. The common thread to these techniques is that the application, firewall engine, and rules database are co-resident at the endpoint, which is advantageous in the implementation of the embedded firewall.
摘要:
A method and system for resetting passwords in which an authenticated user who requests a new password is substantially immediately provided with one portion of the reset password while a second portion of the password is sent to a location to which the legitimate user for which the password is provided has access, such as a voice mailbox.