Abstract:
A method and device for preventing fraud in international calls in a long-distance telecommunications system, where selected customers can avoid fraud control blocks and greater granularity is achieved in blocking international destinations. In the method and device, an override flag is created in the records of the Billing Number Screening (BNS) database. When a call is made using a billing number whose corresponding record has the override flag set, the call is not stopped by fraud control blocks on certain international destinations. In addition, international destinations can be blocked with greater specificity because a Country Set Logic (CSET) field is added to the International City Code Database. The addition of CSET to this database allows particular international city destinations to be blocked from certain origin points.
Abstract:
A system controls the flow of traffic in a network, especially an Ethernet-based network. The system receives a flow control message indicating that traffic flow to a downstream device is to temporarily cease and determines an appropriate flow control action based on a set of control policies in response to the flow control message. The system then performs the selected flow control action.
Abstract:
An interactive telephony services system is provided with instant communications function. In accordance with some embodiments, presence information related to the availability of a called party to be contacted via instant communications affects the handling of telephone calls to the called party. In accordance with some embodiments, a telephone call may be connected to an instant communications client used by a called party.
Abstract:
A network architecture in accordance with the present invention includes a communication network that supports one or more network-based Virtual Private Networks (VPNs). The communication network includes a plurality of boundary routers that are connected by access links to CPE edge routers belonging to the one or more VPNs. To prevent traffic from outside a customer's VPN (e.g., traffic from other VPNs or the Internet at large) from degrading the QoS provided to traffic from within the customer's VPN, the present invention gives precedence to intra-VPN traffic over extra-VPN traffic on each customer's access link through access link prioritization or access link capacity allocation, such that extra-VPN traffic cannot interfere with inter-VPN traffic. Granting precedence to intra-VPN traffic over extra-VPN traffic in this manner entails special configuration of network elements and protocols, including partitioning between intra-VPN and extra-VPN traffic on the physical access link using layer 2 multiplexing and the configuration of routing protocols to achieve logical traffic separation between intra-VPN traffic and extra-VPN traffic at the VPN boundary routers and CPE edge routers. By configuring the access networks, the VPN boundary routers and CPE edge routers, and the routing protocols of the edge and boundary routers in this manner, the high-level service of DoS attack prevention is achieved.
Abstract:
An intelligent network provisioning system (20) has a client platform (22) with a user interface for order entry. A server platform (24) is connected to the client platform (22) by a network (26). The server platform (24) is capable of sending a query to a calling card provisioning system (28). An application server (30) upon receiving an order from the server platform (24) downloads the order to the intelligent network (32) and transmits a state change message to the server platform (24).
Abstract:
A data model of a modeled environment is maintained within a database. The data model includes data defining a plurality of hierarchically arranged subsets of space within the modeled environment and data defining a plurality of items populating the modeled environment. A data processing system displays within a display device at least first and second windows. The first window displays a map of the modeled environment, where the map includes at least one user-selectable graphical element representing one of the plurality of hierarchically arranged subsets of space or one of the plurality of items. In response to a first user input, a graphical element is copied from the first window and displayed within the second window. In response to a second user input selecting the graphical element within the second window, data from the database associated with the subset of space or item represented by the graphical element is presented.
Abstract:
A fraud monitoring system is disclosed for a communications system. The fraud monitoring system analyzes records of usage activity in the system and applies fraud pattern detection algorithms to detect patterns indicative of fraud. The fraud monitoring system advantageously accommodates transaction both records resulting from control of a packet-switched network and those from a circuit-switched network gateway.
Abstract:
In a SIP network, SIP servers are provisioned with information used to authenticate subscribers and entities that will be placing calls. This information can be used during call establishment to allow or deny calls, as well as to determine the appropriate party to bill if the call involves a charge, such as a long distance charge. In addition to allowing calls between authenticated and trusted entities, there is a need for the SIP server to allow certain kinds of calls that involve non-trusted users or entities. If non-trusted entities where not recognized, trusted users and entities within the SIP network would not be able to receive calls from users or entities not know to the SIP server that is providing them services.
Abstract:
The present invention is directed to a method for placing a call between a client in one network and a client in another network. The IP network includes a SIP server and a network gateway configured to provide access to a public switched network. The method includes receiving a SIP call request message from the first client. The SIP call request message is authenticated to thereby identify an authentic originating client. Subsequently, a database is searched to find client billing tag corresponding to the authentic originating client. The call is completed if the client billing tag is obtained, and not completed if the client billing tag cannot be obtained. Thus, the present invention provides an efficient method for billing phone calls that are placed from SIP enabled devices to a telephone connected to the Public Switched Telephone Network (PSTN). The method of the present invention also substantially eliminates certain types of fraud.
Abstract:
A method and apparatus to verify a dialed number is described. A request is received from a calling party to send a first call station a number sent from the first call station and associated with a second call station. The number is sent in accordance with the request.