Abstract:
A network for delivering application level multimedia services includes simple, application-level switches and rules managers. Each application-level switch includes rules defining message edits and selections of message destinations. The rules managers operate to manage the rules. Network functions process messages on the application level, and include operation of one or more rules managers and operation of an application-level switch. The network function is performed by the switch application by performing application level message processing according to rules managed by the at least one of the plurality of rules managers. The application level switches together resolve a requested identity to one or more routable addresses, enabling the network to route a message.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a device including a base station communicatively coupled to a communication system, and a communicative device communicatively coupled to the base station for providing voice communication services to a user, wherein the communicative device serves as a proxy to make telephone calls on behalf of a set-top box presenting media services to a presentation device. Other embodiments are disclosed.
Abstract:
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, an authentication system can have a controller element that receives from a communication device by way of a packet-switched network an authentication request comprising a first identification (ID) of a virtual gateway and a second ID of the communication device. The virtual gateway and at least one network element of the packet-switched network can be provisioned to have a physical association with each other such that other network elements of the packet-switched network deny services to the virtual gateway when the virtual gateway attempts to operate outside of said physical association. From said physical association and the aforementioned IDs the controller element can authenticate the communication device. Additional embodiments are disclosed.
Abstract:
A network for delivering application level multimedia services includes simple, application-level switches and rules managers. Each application-level switch includes rules defining message edits and selections of message destinations. The rules managers operate to manage the rules. Network functions process messages on the application level, and include operation of one or more rules managers and operation of an application-level switch. The network function is performed by the switch application by performing application level message processing according to rules managed by the at least one of the plurality of rules managers. The application level switches together resolve a requested identity to one or more routable addresses, enabling the network to route a message.
Abstract:
In embodiments of the disclosed technology, a plurality of ratings of websites is received, wherein each rating is associated with a category and a rater and each rater is associated with at least one group. A selection of a category is received from the user, wherein the user is associated with at least one group. One website location (or a plurality of website locations) is provided in the category to the user based on at least one rating of the plurality of ratings provided by at least one of the raters, wherein at least one group associated with the rater and at least one the group associated with the user are the same group.
Abstract:
Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require that a recipient authenticate to ensure legitimate use or identity. Should pre-delivery authentication be required, the electronic content is held at any networked device while the recipient authenticates. If the recipient correctly authenticates, then the electronic content is released for delivery.
Abstract:
Ring tones and other alerts are processed based on social networks. A person's contact information, as an example, may be associated with a social network. Each different social network may also have its own custom ringtone or other alert. Calls, texts, and other electronic messages may thus processed with the alert of the social network.
Abstract:
Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require that a recipient authenticate to ensure legitimate use or identity. Should pre-delivery authentication be required, the electronic content is held at any networked device while the recipient authenticates. If the recipient correctly authenticates, then the electronic content is released for delivery.
Abstract:
Methods of operating a communications service are provided in which a communication that is addressed to a user of a communication service is received. A determination is made that end user authentication is required before the communication may be delivered to a first recipient electronic device. A request for end user authentication may then be forwarded to the first recipient electronic device in response to determining that end user authentication is required. End user authentication information may be received from the first recipient electronic device. The received end user authentication information may be compared to stored end user authentication information for the user. The communication may be forwarded over a network to the first electronic device in response to determining that the received end user authentication information matches the stored end user authentication information for the user.
Abstract:
A method includes sending, from a base unit, provisioning information to a first device. The provisioning information is associated with the first device establishing a connection with a network device. The method includes identifying a source of interference with the connection. The method also includes sending, to the first device, information indicating an operation state of the source of the interference.