摘要:
A method for performing mode-agile communications during a communications session is disclosed. A communications terminal device supporting multiple modes of access is configured to determine when, during a session involving a first mode of access communications, a second mode of access is available and is to be used for subsequent communications for the session. The communications terminal device initiates or controls switchover from one mode of access to another.
摘要:
Systems, methods and program products are disclosed for determining billable usage of a communication system (10) wherein services are provided via instant communications (14). In some embodiments, the present invention provides for authorizing the fulfillment of service requests based upon information pertaining to a billable account.
摘要:
Systems, methods and program products are disclosed for determining billable usage of a communication system (10) wherein services are provided via instant communications (14). In some embodiments, the present invention provides for authorizing the fulfillment of service requests based upon information pertaining to a billable account.
摘要:
A method and apparatus for determining what level of performance must be maintained by a second communication service (910) so as to be perceived as being of equal quality to a first communication service, especially where the second communication service (910) is subject to additional impairments (972) not experienced by the first communication service. In one example embodiment, the present invention is applied to determining what combinations of packet loss rate (968) and packet delay are tolerable where a packet switched telephony service is desired to be perceived to be substantially equivalent to a traditional toll-quality non-packet switched telephone service. Empirically derived models (940) are used to relate user perception to objectively measurable characteristics, such as packet loss rate (968).
摘要:
An approach provides fraud detection in support of data communication services (100). A usage pattern associated with a particular account for remote access to a data network is monitored (101). The usage pattern is compared with a reference pattern specified for the account. A fraud alert is selectively generated based on the comparison (101).