摘要:
A reply address is determined from within a voice signal. Voice recognition is performed on at least a portion of the received voice signal to identify the reply address. A user is presented with at least one reply address and confirms a reply address to enable a reply communication such as a call back or text message. The inventions can provide a callback feature for a voice mail system.
摘要:
A Session Initiation Protocol (SIP) proxy is dedicated, at least in part, to supporting routing of communications for a plurality of clients (such as push-to-talk mobile clients) in a given region. In a preferred embodiment, such support exists notwithstanding that at least some of the clients are able to present any of a plurality of differing user identifiers. In particular, differing user identifiers are nevertheless recognized and used by the SIP proxy(ies) to effect compatible provision of a service such as push-to-talk services.
摘要:
One or more Internet Protocol version 4 addresses are selectively modified (for example, by logical movement of a subnet boundary) to thereby alter the number of characters as comprise the address. This permits logical modification of a corresponding Internet Protocol 6to4 address prefix. This permits expansion or contraction of the logical size of the Internet Protocol 6to4 address prefix and hence permits creation and subsequent manipulation and use of corresponding pools of such address prefixes.
摘要:
Methods for processing a media flow at an end of a tunneling association in a data network. One method includes receiving a data packet on a public network, such as the Internet, and recognizing that it encapsulates another data packet for a virtual connection to an application. The virtual connection is addressed by private network addresses. Another method includes constructing a data packet for a virtual connection to the application and encapsulating it for transmission on the public network. The methods provide for hiding the identity of the originating and terminating ends of the tunneling association from the other users of the public network. Hiding the identities may prevent interception of media flow between the ends of the tunneling association or eavesdropping on Voice-over-Internet-Protocol calls. The methods increase the security of communication on the data network without imposing a computational burden on the devices in the data network.
摘要:
A computationally simple yet powerful forward error correction code scheme for transmission of real-time media signals, such as digitized voice, video or audio, in a packet switched network, such as the Internet. For each window of k data packets, the invention generates and transmits at least one cross-wise parity packet taken as an index-shifted function over the k data packets. The invention thereby enables a receiving end to recover from packet loss.
摘要:
A network element (20), such as a PDSN or home agent, upon determining (11) a need to effect a call management operation, then determines (12) whether to constrain the facilitation of that call management operation. When determining that the call management operation should be constrained, the network element can facilitate (14) that call management operation while imposing an artificial facilitation constraint. For example, the rate at which the call management operation is executed with respect to a plurality of existing calls can be specified.
摘要:
A packet data serving node (200) that receives (101) from a mobile station (408) that already has an existing home agent-facilitated data session an indication of a present need to conduct an interactive real-time session is able to establish (102) a non-home agent-facilitated interactive real-time session for that mobile station notwithstanding and apart from the existing home agent-facilitated data session. By one approach this can comprise treating traffic as corresponds to the non-home agent-facilitated interactive real-time session as simple Internet Protocol traffic while treating traffic as corresponds to the existing home agent-facilitated data session as mobile Internet Protocol traffic. If desired, different Internet Protocol address can be used to facilitate such treatment alternatives. By one approach, the aforementioned packet data serving node assigns the Internet Protocol that the mobile station uses in conjunction with the non-home agent-facilitated interactive real-time session.
摘要:
A network element can monitor (105) communication resource usage by, for example, a first end user. A determination (106) can then be had as to whether this first end user's communication resource usage exceeds a predetermined individual level of usage for that first end user (as distinguished, for example, from an upper limit as might be generically applied across an entire user population). When the first end user's communication resource does exceed this predetermined individual level of usage, automatic limitations regarding the first end user's communication resource usage can be imposed (108) while nevertheless continuing to facilitate the end user's communication resource usage.
摘要:
A wireless access gateway (70) obtains (11) substantially current information regarding its own performance capacity. That information is communicated to a network element (90). In a preferred approach, the wireless access gateway integrally combines (12) the substantially current information with at least one call management message to provide a composite message, which composite message is then transmitted (14). The network element then preferably automatically makes determinations (82) regarding selection of a particular wireless access gateway to support a given call as a function, at least in part, of the substantially current information regarding wireless access gateway performance capacity.
摘要:
A network element (20), such as a PDSN or home agent, upon determining (11) a need to effect a call management operation, then determines (12) whether to constrain the facilitation of that call management operation. When determining that the call management operation should be constrained, the network element can facilitate (14) that call management operation while imposing an artificial facilitation constraint. For example, the rate at which the call management operation is executed with respect to a plurality of existing calls can be specified.