Abstract:
The system and method monitor a secure Web Real Time Communication (WebRTC) session between browsers. To do so, a WebRTC application receives a first WebRTC offer with a fingerprint of a first browser to establish a secure communication session. The WebRTC application sends session information and the fingerprint of the first browser to a media relay. The WebRTC application receives a fingerprint of a media relay. A second WebRTC offer with a fingerprint of the media relay is sent to a second browser. An answer to the second WebRTC offer is received. Session information and the fingerprint of the second browser are sent to the media relay so the media relay can decrypt the secure communication session. The first WebRTC offer is answered. A secure communication session is established via the media relay using the fingerprints. The media relay, based on the fingerprints, can monitor the secure communication session.
Abstract:
Methods, devices, and systems are provided such that enterprise network administrators may create and display a dial plan management arrangement using enterprise canonical format and number normalization and friendly display tables. A solution is provided for creating and managing call routing simply and graphically using enterprise canonical format rather than through a legacy routing scheme using of a series of tables with no graphic depiction and multiple formats. By using a single format with a graphical representation when administering dial planning, implementation and management are significantly simpler and more efficient.
Abstract:
A communication system, method, and components are described. Specifically, a communication method is disclosed which enables a media device and control device to be dynamically paired to one another and a control link call to be established between the media device and the control device. The control link call can be utilized to permit the media device to be controlled by the control device while the media device exchanges media with a communication device operated by another user.
Abstract:
An endpoint adaptor and methods of operating the same are provided. The endpoint adaptor provides a single persistent view of a mobile communication device to a network and network-based applications. Moreover, a mobile application on the communication device can leverage the full capabilities of the device without passing any of the complexities associated therewith beyond a network agent acting on behalf of the mobile application.
Abstract:
Embodiments disclosed herein provide systems and methods for quarantining communications at a network edge by routing traffic through a specialized network edge system. In a particular embodiment a method provides, identifying criteria indicating whether certain network traffic should be handled by the specialized network edge system. The method further provides receiving first information about first network traffic received at a first network edge system for a communication network. In response to determining, based on the first information, that the first network traffic satisfies the criteria, the method provides routing the first network traffic through the specialized network edge system.
Abstract:
A communication device sends a Session Initiation Protocol (SIP) INVITE message to establish a call. In response, the call is forked. For example, in parallel forking, the SIP INVITE may be sent to two different communication devices. The forking causes each communication device to send at least one provisional response message. In this case, first and second SIP provisional response messages are received that include Session Description Protocol (SDP) information for a media stream. A first media stream associated with one of the first or second SIP provisional response messages is received and played. A second media stream associated with the other one of the first or second SIP provisional response messages is received within a first time period. In response to receiving the second media stream within the first time period, the first media stream is discarded and the second media stream is played.
Abstract:
A communication session with a communication endpoint is established. The communication session is placed on hold. For example, the communication session is placed on hold by being sent to a contact center queue. In response to placing the communication session on hold, a first message is sent to the communication endpoint that indicates the communication session has been placed on hold. A second message is received from the communication endpoint that indicates that a user of the communication endpoint would like to play personal media while the communication session is on hold. The communication session is later taken off hold. In response to determining that the communication session is taken off hold, a third message is sent to the communication endpoint to stop playing the personalized media. This process allows the user to play personalized media while being placed on hold.
Abstract:
When a user is attempting to access a server application, a challenge is received, in a browser, for a one or more login credentials to access a server application (e.g., a web page). For example, a user is requested to provide a user name and password to login to the server application. In response to the user providing the credentials via the browser, the login credentials are sent. If the credentials are validated, an access token is received by the browser from the server application. In response to receiving the access token for the server application, the browser sends the access token and an address for the server application, via a local loopback address, to a local application. This allows the local application to send local information, such as local files, to the server application using the token.
Abstract:
To provide better administrative access control for allowing access to network applications, an authorization framework is extended by dynamically adding administrative access control to the authorization framework. For example, the authorization framework can be extended by adding a plug-in to the authorization framework. The authorization framework manages the access control by generating tokens. For example, a token may be a digital certificate. The tokens define what access control an application, such as a client application has when accessing the network application. The tokens are based on the dynamically added administrative access control. When a request for a token is securely received, the authorization framework generates a token that identifies if the application (e.g., the client application) is allowed or not allowed to access the network application. The token is then used by the application to access the network application.
Abstract:
When a user is attempting to access a server application, a challenge is received, in a browser, for a one or more login credentials to access a server application (e.g., a web page). For example, a user is requested to provide a user name and password to login to the server application. In response to the user providing the credentials via the browser, the login credentials are sent. If the credentials are validated, an access token is received by the browser from the server application. In response to receiving the access token for the server application, the browser sends the access token and an address for the server application, via a local loopback address, to a local application. This allows the local application to send local information, such as local files, to the server application using the token.