Abstract:
A communication system, method, and components are described. Specifically, a communication system having the ability to facilitate a semi-attended transfer in SIP for an IP-Multimedia Subsystem (IMS) environment is disclosed. The semi-attended transfer is possible even though one or more Back-to-Back User Agents are positioned between users engaged in the semi-attended transfer.
Abstract:
System and method to perform a directive by a first SIP User Agent (UA) engaged in a peer-to-peer communication session with a second SIP User Agent (UA), the method including: arming the first SIP User Agent (UA) to define the directive; setting a trigger condition in the first SIP User Agent (UA) to perform the directive if the trigger condition becomes true; monitoring, by use of a processor within the first SIP User Agent (UA), for the trigger condition in the communication session; and if the trigger condition becomes true, performing by use of a processor the directive without usage of a back-to-back user agent.
Abstract:
In an attempt to establish a communication session between a first communication entity and a second communication entity, a first message is received. For example, the first message may be a SIP INVITE message. A determination is made, based on a registration message from the first communication entity and/or the second communication entity, that at least one of the first communication entity or the second communication entity is Internet Protocol (IP) version intolerant. In response to determining that the at least one of the first communication entity or the second communication entity is IP version intolerant, one or more IP addresses are adapted in messages (e.g., the SIP INVITE message) for establishing the communication session. The adaption changes/removes the one or more IP addresses to a different IP version to ensure proper IP compatibility.
Abstract:
In an attempt to establish a communication session between a first communication entity and a second communication entity, a first message is received. For example, the first message may be a SIP INVITE message. A determination is made, based on a registration message from the first communication entity and/or the second communication entity, that at least one of the first communication entity or the second communication entity is Internet Protocol (IP) version intolerant. In response to determining that the at least one of the first communication entity or the second communication entity is IP version intolerant, one or more IP addresses are adapted in messages (e.g., the SIP INVITE message) for establishing the communication session. The adaption changes/removes the one or more IP addresses to a different IP version to ensure proper IP compatibility.
Abstract:
A fingerprint is received from a communication endpoint. The fingerprint is based on a hardware identifier of the communication endpoint. For example the fingerprint may be based on a Media Access Control (MAC) address of the communication endpoint. A request for an emergency call from the communication endpoint is received that also includes the fingerprint. For instance, a user may initiate a 911 call from the communication endpoint. The emergency call is established. After the emergency call is disconnected, a request for an emergency call back is received. For example, if the emergency call prematurely disconnected, the emergency call back is initiated. The request for the emergency call back is routed to the communication endpoint based on the fingerprint to ensure that the emergency call is properly completed.
Abstract:
An Address Resolution Protocol (ARP) process receives a first Internet Protocol (IP) address that is associated with a Media Access Control (MAC) address of a communication endpoint. A first Session Initiation Protocol (SIP) INVITE for an emergency call request is received from the communication endpoint. The ARP process receives a second IP address that is associated with the MAC address of the communication endpoint. A second SIP INVITE is received that is a request for an emergency call back. The second SIP INVITE is routed to the communication endpoint based on the second IP address associated with the MAC address of the communication endpoint to reestablish the emergency call with the communication endpoint.
Abstract:
An event that changes the security of a communication session between communication endpoints is determined. The event that changes the security of the communication session between the communication endpoints occurs after the communication session is established. For example, the event may be where a user has enabled a speakerphone. In response to determining the event that changes the security of the communication session between the communication endpoints, a message is sent to the communication endpoints that indicates a changed security level. The communication endpoints display the changed security level to the participants of the communication session. For example, the changed security level when the speakerphone is enabled may indicate that the communication session is now unsecure.
Abstract:
The concept of a centralized communication log is provided. Anchor points, and specifically Session Initiation Protocol (SIP) anchor points, serve as a media and call control point that is established on a per-user basis which can then be leveraged by a communication log application. Such a communication log application is able to determine accurate and real-time communicant information for a communication session and populate a centralized communication log with the same. Such a communication log is, therefore, accurate with respect to multiple users in a system, highly available, and scaled horizontally.
Abstract:
A method, server, and communication system are described that, among other things, enable a server in a server cluster to assume control of any “early” Session Initiation Protocol (SIP) dialogs previously handled by another server in the server cluster when that server fails or otherwise becomes unable to continue handling a communication session. The replacement server in the server cluster is able to generate one or more messages that include an identification of the dialog identifiers used by the now failed server as well as new dialog identifiers to replace the dialog identifiers used by the now failed server.
Abstract:
A communication processor receives a call request to establish a communication session from a first communication endpoint to a second communication endpoint. The communication processor changes the intent of the call request. For example, the call request can be changed by automatically forwarding the call request, automatically forking the call request, automatically rejecting the call request based on the second communication endpoint being busy, and/or changing a first type of medium of the communication session to a second type of medium of the communication session. A call log manager conveys status information regarding the changed intent of the call to a call log of the second communication endpoint based on changing the intent of the call request.