Abstract:
A network-connected access point is disclosed having a network access transceiver configured to provide access to a network for computing devices in communication therewith. The network access point also comprises one or more environmental sensors each configured to determine at least one environmental characteristic value that quantifies an environmental characteristic at a location distant from the network access point. Without limitation, environmental characteristics include temperature, humidity, sound, light, motion, and air quality, The network access point further comprises a sensor controller in communication with the at least one environmental sensor. The sensor controller may be separate from the network access transceiver, or may be part of the same component. The sensor controller is configured to receive the at least one environmental characteristic value from the at least one environmental sensor, and transmit information based on the at least one environmental characteristic value to a network.
Abstract:
Methods and apparatuses for covert transmission of an assistance request message from a wearable computing device are disclosed. In one embodiment, a wearable computing device receives a covert input and transmits a corresponding assistance request message without presenting an indication that such a request message is being, or has been, transmitted. Thus, a user in an emergency situation, which may worsen if a corresponding perpetrator detects a call for emergency assistance, can use the wearable computer device to send an assistance request message in a covert manner.
Abstract:
A wearable computing device. The wearable computing device includes a wireless communications interface and a processor device coupled to the wireless communications interface. The processor device is configured to monitor a personal performance activity of a wearer of the wearable computing device. The processor device is further configured to receive, via the wireless communications interface, a business performance metric alert that indicates that a business performance metric quantifier that quantifies a business performance metric of an individual is an undesirable value. The processor device is further configured to signal a wearer of the wearable computing device that the wearable computing device has received the business performance metric alert.
Abstract:
Distributed application of enterprise policies to WebRTC interactive sessions, and related methods, systems, and computer-readable media are disclosed. In this regard, in one embodiment, a method for applying an enterprise policy to a WebRTC interactive session comprises receiving, by a distributed policy enforcement agent of a recipient device, a WebRTC session description object directed to the recipient device originating from a sender device via a secure network connection. The method further comprises determining, by the distributed policy enforcement agent, one or more enterprise policies based on the WebRTC session description object. The method additionally comprises applying the one or more enterprise policies to the WebRTC session description object. In this manner, an enterprise may permit establishment of a WebRTC interactive session that crosses an enterprise network boundary, while at the same time ensuring that the WebRTC interactive session complies with the one or more enterprise policies.
Abstract:
Enhancing privacy by obscuring Traversal Using Relays around Network Address Translator (TURN) connections, and related methods, systems, and computer-readable media are disclosed herein. In one embodiment, a method comprises obtaining, by a TURN client, one or more candidate addresses comprising a TURN relayed transport address of a TURN server. The method further comprises generating a camouflaged candidate list, based on the candidate addresses, in which the TURN relayed transport address is obscured; generating a connection setup message comprising the camouflaged candidate list; and sending the connection setup message to a TURN peer executing on a computing device. In another embodiment, a method comprises receiving, by a TURN server, a request for a provision of a first TURN service from a TURN client to connect to a TURN peer. The method further comprises masking a presence of the TURN server to the TURN peer, and relaying communications based on the masking.
Abstract:
Contact center interactive text stream wait treatments are disclosed. A user device initiates a communication interaction with an automated contact center device (ACCD). A text stream comprising a plurality of text components is from the ACCD during an agent wait period. The text components of the text stream are provided for presentation in a display area of a display during the agent wait period.
Abstract:
Enhancing media characteristics during Web Real-Time Communications (WebRTC) interactive sessions by using Session Initiation Protocol (SIP) endpoints, and related methods, systems, and computer-readable media are disclosed herein. In one embodiment, a method comprises intercepting, by a media redirection agent of a WebRTC client executing on a computing device, a WebRTC initiation token. The method further comprises generating a SIP endpoint WebRTC token based on the WebRTC initiation token, and sending the SIP endpoint WebRTC token to a remote endpoint. The method also comprises establishing a WebRTC interactive session between the remote endpoint and a SIP endpoint based on the SIP endpoint WebRTC token. By leveraging the audio and/or video functionality of the SIP endpoint, the media characteristics of the WebRTC interactive session may be enhanced, resulting in an enhanced user experience.
Abstract:
System and method to revoke call-back requests, the method including: transmitting a plurality of communication requests from a caller to one or more callees; determining mootness of a request for a call-back from at least some of the callees; initiating, by use of a single command, a plurality of call-back cancellation requests to the at least some of the callees; and transmitting one or more call-back cancellation requests to the at least some of the callees. The method may further include determining a characteristic shared by the communication requests to the at least some of the callees. Determining a characteristic may include determining subject matter from message content, metadata, or sending time of the communication requests. The request for a call-back is determined by the caller or inferred by a callee. Call-back cancellation may include removal of a call indication from a notification list of the callee.
Abstract:
Verification of privacy of Web Real-Time Communications (WebRTC) media channels via corresponding WebRTC data channels, and related methods, systems, and computer-readable media are disclosed. In this regard, in one embodiment, a method for verifying privacy of a WebRTC media channel comprises establishing the WebRTC media channel between first and second WebRTC clients using a keying material. The method further comprises establishing a corresponding WebRTC data channel between the first and second WebRTC clients using the keying material, and negotiating, in the WebRTC data channel, a cryptographic key exchange. The method also comprises generating a first and a second Short Authentication String (SAS) based on the cryptographic key exchange in the WebRTC data channel. The method further comprises displaying the first SAS and the second SAS, such that a mismatch between the first SAS and the second SAS indicates an existence of a man-in-the-middle (MitM) attacker.
Abstract:
Enhancing privacy by obscuring Traversal Using Relays around Network Address Translator (TURN) connections, and related methods, systems, and computer-readable media are disclosed herein. In one embodiment, a method comprises obtaining, by a TURN client, one or more candidate addresses comprising a TURN relayed transport address of a TURN server. The method further comprises generating a camouflaged candidate list, based on the candidate addresses, in which the TURN relayed transport address is obscured; generating a connection setup message comprising the camouflaged candidate list; and sending the connection setup message to a TURN peer executing on a computing device. In another embodiment, a method comprises receiving, by a TURN server, a request for a provision of a first TURN service from a TURN client to connect to a TURN peer. The method further comprises masking a presence of the TURN server to the TURN peer, and relaying communications based on the masking.