Abstract:
An encrypted file transfer system allows for the platform independent transfer of files and encrypting/decrypting in an integrated solution. Furthermore, the exchange of encryption keys can be handled through, for example, a secure socket connection between the client and a server thus removing the requirement of the user manually decrypting the transferred file(s).
Abstract:
An IP telephony client initiates and manages multimedia sessions. The client includes a user interface, an application interface, and a protocol stack. The application interface provides an interface between the protocol stack and the user interface and helper applications. The protocol stack packages messages received from the application interface and parses messages received from other parties or prospective parties. The application interface converts incoming messages to appropriate application programming interfaces (APIs) and sends incoming payloads to the appropriate helper application.
Abstract:
A method for using at least one Bad Billed Number Record (BBN) to detect fraud in a telecommunication system includes the steps of generating the at least one BBN for each call attempt made using a billing product, when the call attempt satisfies any one of a plurality of fraud criteria; storing the at least one BBN in a storage queue for later retrieval; and retrieving and analyzing the at least one BBN to increment a plurality of fraud control counters according to the analysis. A system for using a plurality of BBNs to detect fraud in a telecommunications system includes a network operator service platform (OSP) for generating BBNs based on received call attempts; a network information concentrator (NIC) for temporarily storing the generated BBNs; and a fraud monitoring system for retrieving the stored BBNs, filtering out unidentifiable BBNs, analyzing identifiable BBNs, and generating alarms based on the analysis.
Abstract:
A test unit provides testing capability at a network interface device (NID). The test unit may be remotely activated so that testing is initiated upon activation from a remote site. In one embodiment, a characteristic signal is sent over a telephone line toward the NID. A characteristic signal is detected and the testing unit is activated. The testing unit may perform multiple types of tests, including tests for detecting line loss, line noise and latency. The test may be implemented using electronic circuitry or using an intelligent computer system.
Abstract:
A data model of a modeled environment is maintained within a database. The data model includes data defining a plurality of hierarchically arranged subsets of space within the modeled environment and data defining a plurality of items populating the modeled environment. In response to a first user input selecting a plurality of features of the modeled environment, where each of the selected features is one of the subsets of space or one of the items, a plurality of graphical elements are displayed within a whiteboard window to represent the plurality of user selected features. A control for at least one function is also presented to the user in association with the whiteboard window. In response to a second user input selecting the control for the function, a logical connection between at least two of the plurality of features having corresponding graphical elements within whiteboard window are automatically generated by reference to a rule set. In addition, a graphical element representing the logical connection is displayed within the whiteboard window.
Abstract:
An approach for providing telephony and other services over a data network is disclosed. A user profile information is maintained for a party to control the screening of inbound communications requests intended for the party. Means are disclosed for redirecting an inbound call to a designated alternative location if it is determined that the inbound call meets at least one screening criterion. The user profile information controls screening criteria and disposition of calls that are intercepted by the screening process.
Abstract:
A virtual private branch exchange (PBX) system that routes calls within a packet-switching network. Login information is received from a data device. The login information includes an alias identifying a user at the data device and a network address identifying the location of the data device on the packet-switching network. The virtual private branch exchange system associates the user's private branch exchange extension with the network address and routes calls to the user's (PBX) extension to the data device on the basis of the network address of the data device.
Abstract:
A Network Alarm Monitoring System for monitoring messages generated by network elements that provides for a great degree of configuration and reliability. Via a display interface, e.g., Web-based or otherwise, clients may create and configure text-based rules for monitoring alarms. These rules are applied to specify which actions are to be taken on which messages, based on designated field values of alarm messages. Actions include writing messages to an alarm database, sending messages to downstream network management systems, triggering an e-mail or page. Furthermore, remote access to the network element being monitored is provided.
Abstract:
Disclosed is a system that prevalidates service orders that are placed by an inter exchange carrier with a local exchange carrier for connection of the inter exchange carrier with a business customer. An integrated prevalidation system and service order system is disclosed in which prevalidation requests are performed using the data that is entered for the service order. Prevalidation responses are then used to ensure that the order will be correct when submitted, thereby avoiding, the necessity for expensive supplemental orders. Further, the present invention allows for stand alone prevalidation requests which enable a provisioner to determine availability of circuits, and to determine location information and equipment identification directly from the LEC databases. Further, the present invention is capable of reconciling the database of the inter exchange carrier with the database of the LEC to avoid submission of incorrect service orders. Further, auditing reports can be generated whenever a prevalidation response has been accepted and a service order acknowledgment has rejected the service order. These reports can be used to audit and obtain credit for the necessary supplemental orders which may follow. Also, prevalidation requests are reserved to prevent submission of conflicting service orders.
Abstract:
A system and method for reliabe delivery of datagram protocol data unit (PDU) packets generated by a network oriented application at a first computing network element to a second computing network element across a network. The method steps include: at the first computing network element, capturing generated datagram packets destined for the second computing network element; determining a size of a payload associated with the datagram and communicating the size of the payload to the second computing element via a reliable connection-oriented transport service PDU; communicating the actual payload to the second computing element via the reliable connection-oriented transport service PDU; and, at the second computing network element, utilizing payload size and payload to reconstruct a datagram PDU including the payload for a network application at the second computing network element. By this technique, reliable datagram PDU transport over the network is ensured.