Abstract:
In order to deal with multiple communication endpoints that use a single address of record (e.g., a telephone number), a list of friendly names is determined for the multiple communication endpoints. The friendly names identify individual communication endpoints. For example, a friendly name may be “Joe's Desktop.” When a Computer Telephone Integration (CTI) application is associated with a communication session, the list of friendly names is presented to a user. The user selects one of the friendly names. This results in a message being sent that indicates a communication endpoint associated with the selected friendly name. The message with the friendly name causes a new communication session to be automatically initiated from a communication endpoint associated with the selected friendly name or an answer of a forked communication session with the communication endpoint associated with the selected friendly name.
Abstract:
To provide better administrative access control for allowing access to network applications, an authorization framework is extended by dynamically adding administrative access control to the authorization framework. For example, the authorization framework can be extended by adding a plug-in to the authorization framework. The authorization framework manages the access control by generating tokens. For example, a token may be a digital certificate. The tokens define what access control an application, such as a client application has when accessing the network application. The tokens are based on the dynamically added administrative access control. When a request for a token is securely received, the authorization framework generates a token that identifies if the application (e.g., the client application) is allowed or not allowed to access the network application. The token is then used by the application to access the network application.
Abstract:
In order to deal with multiple communication endpoints that use a single address of record (e.g., a telephone number), a list of friendly names is determined for the multiple communication endpoints. The friendly names identify individual communication endpoints. For example, a friendly name may be “Joe's Desktop.” When a Computer Telephone Integration (CTI) application is associated with a communication session, the list of friendly names is presented to a user. The user selects one of the friendly names. This results in a message being sent that indicates a communication endpoint associated with the selected friendly name. The message with the friendly name causes a new communication session to be automatically initiated from a communication endpoint associated with the selected friendly name or an answer of a forked communication session with the communication endpoint associated with the selected friendly name.
Abstract:
An indication of a change in a right to use a service or feature is received. For example, this can be based on an administrator granting access to a previously installed service or feature. In response, a notification is sent to a user of the change of the right to use the service or feature. The notification requests the user to provide a credential to approve the change of the right to use the service or feature. For example, a link may be provided in an email or text message that the user can click on to provide a password/user name. The credential is received and verified. In response to validating the credential, access is allowed according to the change of the right to use the service or feature. The user then has access to the service/feature without the administrator having to know the user's credential.
Abstract:
System and method to revoke call-back requests, the method including: transmitting a plurality of communication requests from a caller to one or more callees; determining mootness of a request for a call-back from at least some of the callees; initiating, by use of a single command, a plurality of call-back cancellation requests to the at least some of the callees; and transmitting one or more call-back cancellation requests to the at least some of the callees. The method may further include determining a characteristic shared by the communication requests to the at least some of the callees. Determining a characteristic may include determining subject matter from message content, metadata, or sending time of the communication requests. The request for a call-back is determined by the caller or inferred by a callee. Call-back cancellation may include removal of a call indication from a notification list of the callee.
Abstract:
An indication of a change in a right to use a service or feature is received. For example, this can be based on an administrator granting access to a previously installed service or feature. In response, a notification is sent to a user of the change of the right to use the service or feature. The notification requests the user to provide a credential to approve the change of the right to use the service or feature. For example, a link may be provided in an email or text message that the user can click on to provide a password/user name. The credential is received and verified. In response to validating the credential, access is allowed according to the change of the right to use the service or feature. The user then has access to the service/feature without the administrator having to know the user's credential.
Abstract:
An application compositor enables the creation a sequence of SIP and HTTP servlets that comprises a converged multi-protocol application. Applications are constructed based on rules that declaratively specify a multi-protocol sequence of servlets and the transitions between the servlets, minimizing programmer effort. The application compositor works with a servlet container within an application server to determine the sequence of servlets to be executed by the servlet container when running the application, and is called by the servlet container to perform transitions between servlets.
Abstract:
To provide better administrative access control for allowing access to network applications, an authorization framework is extended by dynamically adding administrative access control to the authorization framework. For example, the authorization framework can be extended by adding a plug-in to the authorization framework. The authorization framework manages the access control by generating tokens. For example, a token may be a digital certificate. The tokens define what access control an application, such as a client application has when accessing the network application. The tokens are based on the dynamically added administrative access control. When a request for a token is securely received, the authorization framework generates a token that identifies if the application (e.g., the client application) is allowed or not allowed to access the network application. The token is then used by the application to access the network application.
Abstract:
An application compositor enables the creation a sequence of SIP and HTTP servlets that comprises a converged multi-protocol application. Applications are constructed based on rules that declaratively specify a multi-protocol sequence of servlets and the transitions between the servlets, minimizing programmer effort. The application compositor works with a servlet container within an application server to determine the sequence of servlets to be executed by the servlet container when running the application, and is called by the servlet container to perform transitions between servlets.
Abstract:
System and method to revoke call-back requests, the method including: transmitting a plurality of communication requests from a caller to one or more callees; determining mootness of a request for a call-back from at least some of the callees; initiating, by use of a single command, a plurality of call-back cancellation requests to the at least some of the callees; and transmitting one or more call-back cancellation requests to the at least some of the callees. The method may further include determining a characteristic shared by the communication requests to the at least some of the callees. Determining a characteristic may include determining subject matter from message content, metadata, or sending time of the communication requests. The request for a call-back is determined by the caller or inferred by a callee. Call-back cancellation may include removal of a call indication from a notification list of the callee.