摘要:
In accordance with a particular embodiment of the present invention, a method using Quality of Service (QoS) information to influence a user's presence state is provided that includes the establishment of a virtual communication session between a first network device and a second network device. The virtual communication session emulates a communication session that may be established in the future. At least one QoS parameter associated with the virtual connection is monitored. Presence information is then provided to a first user that includes the QoS parameter.
摘要:
In one embodiment, a system is provided to prevent VoIP spam. The system may store call data that is associated with a call to a phone number made over a Public Switched Telephone Network. Subsequently, the system may accept an Internet Protocol telephony connection in response to verification of a demonstrated knowledge of the call. The demonstrated knowledge of the call may be verified based on the call data.
摘要:
A system may protect against Sybil attacks on a peer-to-peer (P2P) network based on each one the nodes in the P2P network being identified by a corresponding certificate. In particular, a node may receive a license key, where the license key is evidence of a purchased product license. The node may transmit a message included in the license key to a certificate authority. The node may receive a certificate from the certificate authority in response to authentication of the message. The node may be identified in the P2P network with a node identifier included in the certificate.
摘要:
A system may generate from a first value, based on rounding information, a first security key that matches a second security key whenever the first value and a second value from which the second security key is generated differ by less than a non-zero predetermined amount. The second security key may be generated from the second value rounded to a multiple of a rounding interval that is nearest to the second value. The rounding information may include a rounding direction indication. The rounding direction indication may indicate the direction in which the second value is rounded to the multiple of the rounding interval nearest to the second value.
摘要:
In one embodiment, a system is provided to restrict VoIP communication. The system may validate a Voice over Internet Protocol (VoIP) call initiation message based on demonstrated knowledge of a Public Switched Telephone Network (PSTN) call.
摘要:
In one embodiment, a method includes automatically detecting occurrence of an event at an endpoint that suggests checking whether a public safety answering point (PSAP) currently associated with the endpoint is correctly associated with the endpoint. The method further includes, in response to the occurrence of the event, automatically prompting through the endpoint a user to provide input indicating whether data identifying a current location of the endpoint is correct. The method further includes receiving input from the user through the endpoint indicating whether the data is correct and, if the input from the user indicates that the data is not correct, automatically initiating an update of the data to correctly identify the current location of the endpoint.
摘要:
Combining signals includes receiving signals from communication devices, where each signal is associated with a content describing the signal. The following is repeated for each signal: the content associated with a signal is examined, whether the signal is a voice signal is determined in accordance with the content, and the signals are sent to a signal combiner in accordance with the determination of whether the signal is a voice signal. The signals are combined at the signal combiner.
摘要:
In one embodiment, a method for presence-based management in a communication network includes, using IM, discovering one or more network devices in a communication network. The network devices couple two or more endpoints to each other and enable communication between a first one of the endpoints and one or more second ones of the endpoints. The method also includes, using IM, obtaining presence information on the discovered network devices from the discovered network devices and, using the presence information on the discovered network devices from the discovered network devices, maintaining presence data associated with the discovered network devices.