摘要:
Methods that enable the detection and handling of lost messages during load-balancing routing protocols are disclosed. In accordance with the illustrative embodiment, when a candidate intermediate node N receives a routing-protocol message, node N performs: (1) a first procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by node N, and (2) a second procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by a neighbor of node N.
摘要:
A method is disclosed that enables access to the paired combination of a personal computer and cellular telephone, the access being provided through voice commands from a Bluetooth headset or other type of wireless headset. Through the headset, a user is able to invoke a speech-recognition engine during a call in progress that involves the cell phone with which the personal computer has been paired. The set of phrases that can be recognized by the engine, which is resident at the personal computer, are based on the current call-processing state of the call that is being handled by the paired cell phone. Some of the phrases correspond to commands to retrieve one or more entries from a database, such as one stored at the cell phone. One or more of the commands can be for controlling the cell phone or a softphone application that executes at the personal computer.
摘要:
An apparatus and method are disclosed that enable a terminal such as a computer-based softphone to retrieve and handle, transparently for its user, the voicemail that has been left by calling parties who called the user's cell-phone number. Furthermore, the softphone is able to integrate the presentation to its user of the voicemail associated with the cell phone with the voicemail that has been left by calling parties who called the softphone itself. The softphone features both i) a personal area network interface that is used to communicate directly with the cell phone and ii) a local area network interface that is used to retrieve the cell-phone voicemail from a voicemail system. Once the softphone is paired with the cell phone, the softphone is able to retrieve signals directly from the cell phone and, based on those signals, retrieves the voicemail from the cell phone's voicemail system.
摘要:
An enhanced user experience during a telecommunications conference may be achieved by using components of devices associated with users as ephemeral adjuncts to a conferencing system. These components may be associated with equipment in a conference room or location such that other participants in the conference may not recognize the use of the device. The quality of a user's experience may thus be improved by using a device and associated components in close proximity to the user. Other participants in a conference may also perceive a benefit from improved intelligibility.
摘要:
Authentication of a user initiating a communication may be achieved using a visual indicator of the user. Initiation of a communication may result in the initiator of the communication collecting image data associated with the initiator's identity. Additionally, the initiator may be required to perform a task, wherein a response to the task may be transmitted with the image data to the receiver of the communication. The receipt of the image data may allow a receiver of the communication to reduce spam and verify that the initiator is who it purports to be.
摘要:
An enhanced user experience during a telecommunications conference may be achieved by using components of devices associated with users as ephemeral adjuncts to a conferencing system. These components may be associated with equipment in a conference room or location such that other participants in the conference may not recognize the use of the device. The quality of a user's experience may thus be improved by using a device and associated components in close proximity to the user. Other participants in a conference may also perceive a benefit from improved intelligibility.
摘要:
System and method to provide location-based levels of data protection, the method including: receiving, by a receiver, login credentials of a user of a mobile device; authenticating, by use of a policy server, a credentials-based level of data access as configured by a policy; retrieving, by a geo-location module, a location of the mobile device; determining, by use of the policy server, a location-based level of data access as configured by the policy; and granting sensitive data access based upon a more restrictive limitation of the credentials-based level of data access and the location-based level of data access.
摘要:
Authentication of a user initiating a communication may be achieved using a visual indicator of the user. Initiation of a communication may result in the initiator of the communication collecting image data associated with the initiator's identity. Additionally, the initiator may be required to perform a task, wherein a response to the task may be transmitted with the image data to the receiver of the communication. The receipt of the image data may allow a receiver of the communication to reduce spam and verify that the initiator is who it purports to be.
摘要:
A method and an apparatus are disclosed that provide a privilege-granting technique for enabling a service-providing domain to grant a privilege to a requesting user in a service-requesting domain. A request handler in the service-providing domain, which comprises one or more service-associated resources, receives a user request to use a service and requests a token from a privilege-granting server, in accordance with the illustrative embodiment of the present invention. Upon receiving the token that specifies a granted privilege from the privilege-granting server, the request handler extends the privilege to the requesting user. Alternatively, the request handler can request a plurality of tokens in advance from the privilege-granting server; after receiving the tokens, the request handler extends a privilege to each requesting user as the handler receives requests to use one or more services.
摘要:
A method is disclosed for adaptively and intelligently partitioning traffic among a plurality of communications channels, without injecting probe traffic into any of the channels. In accordance with the illustrative embodiment, a source node transmits traffic to a receiving node via K communications channels in accordance with partition coefficients α1, . . . , αK, and the source node receives information regarding the quality of service (QoS) provided by each of the communications channels. The source node adjusts the values of the partition coefficients α1, . . . , αK adaptively based on: the current channel QoS information, prior channel QoS information, the prior values of α1, . . . , αK, and a measure of channel independence for one or more pairs of communications channels.