Abstract:
The prepaid transaction tracking system allows, for example, entities, such as businesses, individuals, or the like, to have the ability to identify, track and maintain information about prepaid transactions
Abstract:
An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the enterprises services from third parties. In the first layer, an implementation of the Secure Sockets Layer (SSL) version of HTTPS provides communications security, including authentication of the enterprise web server and the security of the transmitted data. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user's copper wire connection to a legacy system and a user's remote connection to the enterprise system over a nullstatelessnull public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems. Security for the enterprise network and security for the data maintained by the various enterprise applications is also described.
Abstract:
A call processing network performance verification and validation system and test methodology. The call processing network implements Internet Protocol (IP) subnet topology, ATM WAN configuration, equipment placement, and device configuration to provide partitioning of a call processing application across multiple sites. The partitioning reduces latency for mission critical messages, while providing for necessary provisioning traffic needs. Further, the overall topology provides the redundancy and resiliency necessary for mission critical call processing application, utilizing the IP subnets, ATM permanent virtual circuits, network device configuration, and server segregation to achieve Quality of Service (QoS). The validation testing method and system proves out the various segregated routes, verifies subnet integrity and measures total latency and data path traversal in a verifiable manner.
Abstract:
A method of and system for controlling access to the Internet by members of an organization that includes at least one supervisor and at least one non-supervisor for which limited Internet access is desired. The system maintains for each member of the organization a session identifier. When the system establishes an Internet session between a member of the organization and the Internet, the system initially sets a user session identifier for said Internet session to a default session identifier, which is the session identifier for the lowers access level member of the organization. When the member requests a resource, the system determines if an access level rating for requested source is greater than the value of the access level field of the user session identifier. If so, the system blocks the resource and presents member with choices of logging on to the system as a specific member of the organization with a higher access level, or appealing the blocking to a supervisor.
Abstract:
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from unauthorized third parties. A first router directs all connection requests to one or more secure web servers, which may utilize a load balancer to efficiently distribute the session connection load among a high number of authorized client users. On the network side of the web servers, a second router directs all connection requests to a dispatcher server, which routes application server calls to a proxy server for the application requested. A plurality of data security protocols are also employed. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user's copper wire connection to a legacy system and a user's remote connection to the enterprise system over a nullstatelessnull public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems.
Abstract:
The present invention relates to a method for detecting dropped packets in a network that includes a packet switched network. The method includes establishing a telephonic connection between a first network location and a second network location. A set of N waveforms are transmitted from the first network location. Each transmitted waveform includes a waveform characteristic operative to assign a predetermined value relative to other waveforms in the at least one set, such that a predetermined sequence of values are assigned to packets carrying the N transmitted waveforms. A telephonic signal is received at the second network location via the communications channel. The telephonic signal is processed to obtain a received sequence of values. The received sequence of values is compared to the predetermined sequence of transmitted values to detect dropped packets without having access to packet switched network control data.
Abstract:
A technique is disclosed in the context of a communications system whereby parties accessible through the system may be referenced by multiple alternative symbolic names. User profile information for a given party may be maintained in the system to control features and routing behavior in response to session request involing the party. By virtue of a mapping capability, one or more symbolic names may be associated with the same user profile information. A session request involving any of the alternative names for a party will evoke the same user profile.
Abstract:
An approach for providing telephony and other services over a data network is disclosed. A communications system includes a location server that generates a first subset from the set of all addresses relating to a called party. A proxy server obtains a first subset of addresses from the location server and attempts to establish a session with the called party based on the subset of addresses. In response to whether the first subset of addresses results in session establishment, the proxy server may then request a second subset from the location server. Context information provided by the location server with the first subset may be returned to the location server as part of the request for the second subset.
Abstract:
A resource management system for an intelligent communications network having one or more distributed service nodes, each service node for providing services relating to an event received at a network resource associated with a service node. The system comprising a first processing tier comprising one or more local execution environments located at a node, each execution environment including a mechanism for instantiating one or more service objects capable of performing event services at a first local execution environment, and, for generating status information relating to executing service objects; and, a second processing tier associated with a service node and including a system processor for tracking status and availability of service objects and local execution environments. Upon receipt of service requests, the system processor communicates with the first processing tier for receiving the status information and initiating service object instantiation in the one or more local execution environments in the first processing tier at the node based upon the status and availability information of the requested service object.