Abstract:
A secure payment method includes receiving, by a payment recipient, a transaction request from a party in a transaction. The payment recipient requests a payment that is in a specified form and that is uniquely identified by a unique identification. The method includes receiving, on behalf of the payment recipient and at a payment recipient computer, the payment that is in the specified form. The payment is uniquely identified by the unique identification. The payment recipient authorizes the transaction in response to receiving the payment that is in the specified form and that is uniquely identified by the unique identification. The specified form is issued by a private third party.
Abstract:
The use of virtual resources providing communication services is adjusted based on load. A determination is made, for a specific number range, whether the virtual telephone number mapping service instances dedicated to the specific number range are being underutilized. If the virtual telephone number mapping service instances dedicated to the specific number range are being underutilized, a virtual telephone number mapping service instance dedicated to the specific number range is selected for removal. A determination is also made, for the specific number range, whether a number of virtual telephone number mapping service instances dedicated to the specific number range is sufficient to handle requests for communication services. If the number of virtual telephone number mapping service instances dedicated to the specific number range is not sufficient to handle the requests, instantiation of a virtual telephone mapping instance is initiated.
Abstract:
Calls placed to a call recipient bypass the terminating messaging system, creating an enhanced message in the call originator's messaging system and delivering the enhanced message using alternate routing information. A caller creates enhanced messages for a call recipient even when the call recipient's messaging system does not support such functionality. The caller also embeds stored content and/or use links in the enhanced messages to allow the message to be modified and/or deleted before it is accessed by the call recipient.
Abstract:
In one embodiment, the present invention is a method and apparatus for social networking in a dynamic environment. In one embodiment, a method for social networking in a network includes broadcasting a first set of one or more keywords representing one or more interests of a first user in the network, receiving a response from a second user in the network indicating interest in at least one of the interests of the first user, and connecting to a server in the network, where the server hosts a group for supporting communications between at least the first network user and the second network user.
Abstract:
Systems and methods to select peered border elements for a communication session based on Quality-of-Service (QoS) are disclosed. In particular, an example method includes determining a composite QoS parameter of a communication session based on weighting QoS parameters of the session, the QoS parameters including a grade of service parameter of the session and a preferred mode of communication for a voice over Internet protocol (VoIP) device of a called party; querying a telephone number mapping server for a status of each of the peered border elements; assigning the session to be handled by a selected peered border element of the peered border elements based on the composite QoS parameter and the status of each of the peered border elements; and generating a QoS authorization token to reserve network resources associated with the selected peered border element.
Abstract:
A mechanism is provided for recovering from a catastrophic failure that results in a large number of user endpoints attempting to come on line simultaneously after an NGN is restored. In an enhanced DNS load balancer, DNS queries from the user end points relating to a particular NGN edge device are selectively dropped if a rate of queries for the particular edge device suddenly increases or exceeds a threshold. The query dropping may also be based in part on the class of service assigned to the user endpoint.
Abstract:
A mechanism controls global synchronization, or registration floods, that may result when a large number of endpoints in a Voice over Internet Protocol (VoIP) network such as an Internet Protocol Multimedia Subsystem (IMS) come online simultaneously after a catastrophic failure. The mechanism allows the Domain Name System (DNS) infrastructure to efficiently control the overload condition by registering user end points with backup border elements, and by staggering and by randomizing the time-to-live (TTL) parameter in registrations with backup border elements.
Abstract:
An automatic message escalation system includes attaching an acknowledgement flag to a message after it is received in the message mailbox of an identified message recipient. The status of the acknowledgement flag indicates whether or not the message has been retrieved. After a given or specified period of time, the acknowledgement flag is checked to see if the message was retrieved. If the message was retrieved, the message will not be escalated. If the message was not retrieved, the message will be sent to the next message recipient on an escalation list.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to transmit to a media server a request for distribution of media content to one or more targeted recipients according to a user profile associated with the communication device that is stored in the media server. The format of the media content can be adjusted by the media server based at least in part on the user profile. Other embodiments are disclosed.
Abstract:
The use of virtual resources providing communication services is adjusted based on load. A determination is made, for a specific number range, whether the virtual telephone number mapping service instances dedicated to the specific number range are being underutilized. If the virtual telephone number mapping service instances dedicated to the specific number range are being underutilized, a virtual telephone number mapping service instance dedicated to the specific number range is selected for removal. A determination is also made, for the specific number range, whether a number of virtual telephone number mapping service instances dedicated to the specific number range is sufficient to handle requests for communication services. If the number of virtual telephone number mapping service instances dedicated to the specific number range is not sufficient to handle the requests, instantiation of a virtual telephone mapping instance is initiated.