摘要:
In one embodiment, a method includes electronically prompting, in response to a triggering event, a participant connected to a conference session via a corresponding endpoint device to enter an affirmative response in order to continue attending the conference session. The participant is disconnected from the conference session in the event that the affirmative response is not received within a predetermined time period. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
摘要:
A Service Provider (SP) authentication method includes receiving a message from a subscriber-premises device, the message being compatible with an authentication protocol and being transported from the subscriber-premises device to a u-PE device operating in compliance with an IEEE 802.1x compatible protocol. Access to the SP network is either allowed or denied access based on a logical identifier contained in the message. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
A system for interfacing different types of network communications. In one embodiment, the system includes one or more gateways capable of converting messages from messages that are adapted for a first type of network and/or destination device to messages that are adapted for a second type of network and/or destination device. The second type of network and/or destination device includes a first Voice Over Internet Protocol (VOIP) communications device. A message-analysis module is adapted to employ an address associated with the message to selectively forward the message to one or more of the one or more gateways and/or to a destination device. In a more specific embodiment, the first type of network includes a packet-switched network in communication with the first VOIP phone. The destination device includes a mobile phone in communication with a cellular network. In the specific embodiment, the first type of destination device includes a user option to selectively transition a text-based communications session to a voice-based communications session.
摘要:
Disclosed are apparatus and methods for authenticating a device to access a network through an access control port. In one embodiment, one or more first authentication packets for authenticating a first device or user to access a first network domain via a particular access port of a network device are received, for example, by an access control port. The particular access port is configured to control access for packets attempting to ingress into one or more network domains. When the first device or user is authorized to access the first domain, a first binding between the first device and the first domain is formed. The first binding specifies that the first device is allowed to access the first domain and the first binding is associated with the particular access port of the network device. When a packet is received that is attempting to ingress into the first domain and the ingressing packet matches the first binding, the ingressing packet is allowed to access the first domain. In contrast, when a packet is received that is attempting to ingress into the first domain and the ingressing packet does not match the first binding, the ingressing packet is blocked from accessing the first domain.
摘要:
According to one embodiment, a method for removing authentication of a supplicant includes monitoring communication between the supplicant and an authenticator. The method also includes determining, based on the monitored communication, the MAC address for the supplicant and an attachment port of the supplicant to the intermediate network device disposed between the supplicant and the authenticator through which the monitored communication occurs. The method also includes determining that the supplicant no longer has a link connection with the intermediate network device, and in response, sending via the intermediate network device a logoff message having a spoofed source address of the supplicant to the authenticator.
摘要:
A method, a system, a machine-readable medium, and an apparatus for managing storage on a shared storage space, for example, on an email server, are provided. A plurality of emails is compared. If the content of each of the plurality of emails is the same, then a single copy is stored on the email server. Further, each recipient of the plurality of emails is enabled access to the stored email via a link to the single copy. Additionally, one or more attachments of the plurality of emails are compared. If an attachment is the same in each of the plurality of emails, then it is stored as a single copy. Further, a link is inserted in each of the plurality of emails, enabling access to the attachment from the single copy.
摘要:
In one embodiment, a method includes electronically prompting, in response to a triggering event, a participant connected to a conference session via a corresponding endpoint device to enter an affirmative response in order to continue attending the conference session. The participant is disconnected from the conference session in the event that the affirmative response is not received within a predetermined time period. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
摘要:
A system for interfacing different types of network communications. In one embodiment, the system includes one or more gateways capable of converting messages from messages that are adapted for a first type of network and/or destination device to messages that are adapted for a second type of network and/or destination device. The second type of network and/or destination device includes a first Voice Over Internet Protocol (VOIP) communications device. A message-analysis module is adapted to employ an address associated with the message to selectively forward the message to one or more of the one or more gateways and/or to a destination device. In a more specific embodiment, the first type of network includes a packet-switched network in communication with the first VOIP phone. The destination device includes a mobile phone in communication with a cellular network. In the specific embodiment, the first type of destination device includes a user option to selectively transition a text-based communications session to a voice-based communications session.
摘要:
Link layer authentication information is supplied by a link layer authentication device to an access router for tracking IP address usage by a client device. The authentication information supplied to the access router includes an authenticated client identifier and a corresponding authenticated link identifier for the client device that attached to the network based on the authenticated link identifier. The access router, in response to receiving a message that specifies the authenticated link identifier and a source IP address, adds the source IP address to a cache entry that specifies the authenticated client identifier and the corresponding authenticated link identifier, and outputs to an audit resource a record that specifies the source IP address and the authenticated link identifier.
摘要:
An attractive jacket design having removable and changable panels that has the overall effect of lowering the cost of sport jackets. With this invention, chest, shoulder and back panels on the jacket are easily removable and changeable in order to allow a user of the jacket to use one set of patches with the jacket for one purpose or event and to remove those patches from the jacket and put another set of patches on the jacket for another purpose or event, which permits the manufacture of a set of patches for various teams rather than a set of jackets, thus reducing overall manufcturing cost.