Abstract:
A communication system, method, and components are described. Specifically, a communication system that supports dynamic device pairing of communication devices is described. Such pairing is accomplished using a feature or pairing server, without requiring modification to associated communication endpoints. Moreover, sequenced applications can be applied for all communication endpoints when pairing is in effect.
Abstract:
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.
Abstract:
Embodiments disclosed herein provide systems and methods for recording WebRTC communications at a network edge. In a particular embodiment a method provides, in an edge system of a communication network, receiving identification information that identifies a first endpoint and a second endpoint between which a first WebRTC communication will be established. The method further provides establishing the first WebRTC communication between the first and second endpoints through the edge system using the identification information. Also, the method provides identifying packets for the first WebRTC communication and recording the packets to a storage system.
Abstract:
An event that changes the security of a communication session between communication endpoints is determined. The event that changes the security of the communication session between the communication endpoints occurs after the communication session is established. For example, the event may be where a user has enabled a speakerphone. In response to determining the event that changes the security of the communication session between the communication endpoints, a message is sent to the communication endpoints that indicates a changed security level. The communication endpoints display the changed security level to the participants of the communication session. For example, the changed security level when the speakerphone is enabled may indicate that the communication session is now unsecure.
Abstract:
The present invention provides a system, method and apparatus for troubleshooting one or more communications between a first device and a second device. A monitoring device disposed between the first device and the second device receives a message associated with the communication(s), analyzes the received message and stores the analyzed message whenever the analyzed message satisfies one or more troubleshooting criteria. The one or more troubleshooting criteria may include one or more data element criteria, one or more event-based criteria, one or more time-based criteria, one or more logical operators or a combination thereof. The method can be implemented using a computer program embodied on a computer readable medium having one or more code segments to perform the method steps.
Abstract:
Embodiments disclosed herein provide systems, methods, and computer readable media for detecting disturbances in a media stream from a participant on a communication. In a particular embodiment, a method provides identifying disturbance criteria defining a plurality of audible disturbances, a plurality of visual disturbances, and a plurality of communication disturbances. The method further provides identifying one or more audible disturbances from an audio component of the media stream based on predefined disturbance criteria and identifying one or more visual disturbances from a video component of the media stream based on the disturbance criteria. Additionally, the method provides correlating the audible disturbances with the visual disturbances to determine one or more combined disturbances for the participant based on the disturbance criteria, wherein each of the combined disturbances comprises at least one of the audible disturbances and at least one of the visual disturbances.
Abstract:
Media files are often tagged, such as by XML or other tagging paradigms, in order to indicate aspects of certain portions of the media file. Disclosed herein, security policy tagging is provided that supports a logically nested or hierarchical structure. Tags may be time- and/or event-altered, such as when a user who is denied access at one point in time may be granted access at a later point in time. The need to amend the security policy based upon the passage of time is reduced or eliminated as portions, or sub-portions, of a media file that may be selectively tagged with security tags may be presented or downloaded based upon the security policy. The a security policy may incorporate rules that change permissions upon the passage of time or the occurrence of an event, without requiring the modification of the presentation, the security tags of the presentation portion, or the security tag associated with a parent portion of the presentation or the presentation itself.
Abstract:
When an application is installed, a list of one or more communication ports used by the application is received. In addition, a list of communication ports that are currently open in a firewall is received. The two lists are compared to determine if there is a conflict. In response to finding a conflict, a control port option is taken. For example, a control port option may be: 1) where a port management window is displayed that allows the administrator to change the list of one or more communication ports and/or the list of communication ports currently in use, 2) where an auto configuration option window is displayed, or 3) where open communication ports are automatically selected to resolve the conflict. If a conflict is not found, a message is sent to a firewall to automatically open the one or more communication ports for the application.
Abstract:
A network-connected semi-fixed location telephone is disclosed having a network access transceiver configured to provide access to a network for computing devices in communication therewith. The network-connected semi-fixed location telephone also comprises one or more environmental sensors each configured to determine at least one environmental characteristic value that quantifies an environmental characteristic at a location outside the network-connected semi-fixed location telephone. Without limitation, environmental characteristics include temperature, humidity, sound, light, motion, and air quality, The network-connected semi-fixed location telephone further comprises a sensor controller in communication with the at least one environmental sensor. The sensor controller may be separate from the network access transceiver or may be part of the same component. The sensor controller is configured to receive the at least one environmental characteristic value from the at least one environmental sensor, and transmit information based on the at least one environmental characteristic value to a network.
Abstract:
Embodiments disclosed herein provide systems, methods, and computer readable media for facilitating engagement with a plurality of agents in a contact center. In a particular embodiment, a method provides detecting a log-in/out event for a first agent of the plurality of agents operating a first agent system of a plurality of agent systems to a communication distribution system configured to distribute communications with the contact center among the plurality of agent systems. In the communication distribution system, the method provides determining that the first agent system should communicate with a second agent system of the plurality of agent systems and initiating a first communication between the first agent system and the second agent system.