Abstract:
Methods, systems and computer readable media for user authentication for proxy-configured clients in captive portal deployments are described. In some implementations, the method can include receiving, at a captive portal, a request from a client device to resolve a proxy IP address, and determining whether the client device has been authenticated. The method can also include, when the client device has not been authenticated, causing the captive portal to act as an intermediate domain name system (DNS) server and forwarding the DNS request to one or more other DNS servers, and evaluating any received responses from the one or more other DNS servers. The method can include, when received responses contain an IP address, replying to the client with the received IP address, and when the received responses do not contain an IP address, replying to the client with an IP address of the captive portal.
Abstract:
Embodiments disclosed herein provide systems, methods, and computer readable media for managing bandwidth based on audio power level. In a particular embodiment, a method includes receiving a media stream from a first client device, wherein the media stream includes an audio stream. During receipt of the media stream, the method provides determining whether an audio power level of the audio stream satisfies criteria for inclusion in an output media stream from the media server system along with one or more media streams received from one or more other client devices. Upon determining that the criteria is not satisfied, the method provides transferring a first notification to the first client device that includes a first instruction for the first client device to reduce an amount of bandwidth used for transferring the media stream.
Abstract:
Embodiments include managing Identity Provider (IdP) identifiers for Web Real-Time Communications (WebRTC) interactive flows, and related methods, systems, and computer-readable media. In one embodiment, a method for managing IdPs comprises selecting, by a WebRTC client executing on a computing device, one or more preferred IdP identifiers indicated by one or more preferences from a plurality of IdP identifiers corresponding to a plurality of IdPs for providing identity assertions during an establishment of a WebRTC interactive flow. The method further comprises obtaining one or more identity assertions from respective ones of the plurality of IdPs corresponding to the one or more preferred IdP identifiers. The method also comprises providing, during the establishment of the WebRTC interactive flow, the one or more identity assertions. In this manner, an entity may specify the IdP used for identity authentication, and the number of identity assertions provided during initiation of the WebRTC interactive flow.
Abstract:
Contact manager computer system and method to dynamically generate an aggregated context information, including: a monitoring module configured: to monitor a communication session with a customer; to determine one or more communication contexts of the customer; to determine one or more communication contexts of an agent assisting the customer; to obtain customer context information from the one or more determined communication contexts of the customer; to obtain agent context information from the one or more determined communication contexts of the agent; a processor coupled to a memory, the memory configured to store context information under control of the processor; an aggregated context information generation module to generate the aggregated context information from the obtained customer context information and the obtained agent context information; an inference module to create an inference from the aggregated context information; and a display module to display a result of the inference to an agent.
Abstract:
A request to establish a communication session is received at a cloud communication application. The request is from a first enterprise communication device to establish a communication session with a second communication device that is typically also within the enterprise. In response to receiving the request to initiate the communication session, the cloud communication application directs the first enterprise communication device to use an enterprise media server for sending a media stream of the first communication session. This allows the cloud communication application to provide one or more cloud services for the media stream via a communication channel that has been previously established between the cloud communication application and the enterprise media server. This results in the media stream being sent within the enterprise, thus, providing enhanced security. In addition, less bandwidth is required because the media streams do not have to be sent to and from the cloud.
Abstract:
Systems, methods and computer readable media for mobility integration with fabric-enabled networks are described. Some implementations can include a method comprising terminating, using one or more processors, an access tunnel at an edge switch of a fabric-enabled network, and establishing, using the one or more processors, a mobility tunnel with the edge switch. The method can also include mapping, using the one or more processors, a mobility network to a service identifier associated with the mobility network. The method can further include forwarding, using the one or more processors, traffic for the mobility network from the edge switch to another edge switch across the fabric enabled network, wherein the traffic includes the service identifier.
Abstract:
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.).
Abstract:
A method, apparatus and computer program product for performing optimized distributed routing for stretched data center models through updating route advertisements based on changes to Address Resolution Protocol (ARP) Tables is presented. Port members of an Internet Protocol I (IP) interface or Virtual Local Area Network (VLAN) are distinguished into Access Interfaces which only lead to hosts on said subnet and Trunk Interfaces which lead to other redundant routers on said subnet. In the subnet of a network a network route for the subnet is always advertised. A separate host route corresponding to an Internet Protocol (IP) address of each Address Resolution Protocol (ARP) table record that points to an Access Interface is advertised and route advertisements are changed for a host in said subnet for tracked access interfaces.
Abstract:
A collaboration environment provides a generic event distributing framework that can distribute both synchronous and asynchronous events. The distributed events may be pre-defined or dynamically defined. Further, the framework can support multiple data formats for the event payload. The collaboration environment relies on two separate APIs to separate event producers from event consumers.
Abstract:
Embodiments provide single sign on to enterprise applications through a captive portal. Example embodiments include receiving from a captive portal sign-on user interface, a request for network access from a user, the request including authentication credentials, redirecting the user to an identity server when the user has been authenticated for network access using the authentication credentials. Redirecting may include providing the identity server with the authentication credentials, and generating a single sign on (SSO) token using the authentication credentials, the SSO token allowing the user to access enterprise applications.