摘要:
Clock correlation can be achieved, for example, utilizing the RTP stream between a sender and receiver by determining a baseline at the start of, for example, a communication. This baseline is derived as a point in time from an arriving packet and represents a point from which subsequent packets deviate. Using this baseline, an early packet or a late packet can be detected. An early packet pushes the baseline down to that earlier point, while late arriving packets, if they are arriving late for a continuous period of time, represents a shift in the opposite direction from the baseline, resulting in a baseline moving to the “earliest” packet out of the sequence of the late arriving packets.
摘要:
The present invention is directed toward methods and systems for providing advanced features to a telecommunication device. The systems and methods determine a hierarchical relationship of participants of a conference call and when one participant is communicating with another participant, the parties are made aware of their hierarchical relationship relative to each other.
摘要:
Disclosed are new calculations of packet loss bursts, packet re-ordering, and an indication of relative alternate network path delay metrics, based upon differences between received and expected packet sequence numbers, for determining packet network performance.
摘要:
In one embodiment, the present invention is directed to reconfiguration of a communication device or other network node based on a determination that a user has a target (altered) physical condition.
摘要:
Embodiments of the present invention are directed to a system capable of enforcing document security and delivery policies. In particular, the present invention allows for the detection and removal of files attached to electronic messages. When an attached file is removed from an electronic message, the file may be placed in secure storage. A link to the stored file is inserted in the electronic communication prior to delivery of the message to the addressee of the communication. In order to access the stored file, the recipient of the message is required to select the provided link, which establishes a secure communication channel between the secure storage device and the receiving client computer. Optionally, the recipient may also be required to provide a password and/or digital certificate in order to access the stored file.
摘要:
Once a voicemail is received, it is the onus of the recipient of the voicemail message to call the caller back when a “missed call” message is received on the phone or after the voicemail message is retrieved. While some of the more advanced voicemail systems provide the capability of automatically placing a call from the callee back to the caller upon completion of the callee listening to the voicemail message, an exemplary embodiment of the present invention allows the caller to be connected to the callee should the callee become available while the caller is leaving a voicemail message for the callee.
摘要:
A method and apparatus determine contact by a participant with a sports object by detecting contact of the sports object with the participant via a personal area network of the participant; transmitting in response to the detection player identification information to a central controller; determining that the sports object has left a field of play by the central controller; and alerting in response to the determination a sports official to identify a last participant to contact the sports object via an official system by the central controller.
摘要:
Clock correlation can be achieved, for example, utilizing the RTP stream between a sender and receiver by determining a baseline at the start of, for example, a communication. This baseline is derived as a point in time from an arriving packet and represents a point from which subsequent packets deviate. Using this baseline, an early packet or a late packet can be detected. An early packet pushes the baseline down to that earlier point, while late arriving packets, if they are arriving late for a continuous period of time, represents a shift in the opposite direction from the baseline, resulting in a baseline moving to the “earliest” packet out of the sequence of the late arriving packets.
摘要:
The present invention is directed to protecting network resources from unauthorized data packet streams. In particular, embodiments of the present invention provide for a port hopping arrangement in which a port pair associated with a communication channel is changed intermittently or periodically. In order to prevent the loss of authorized data packets due to network delay and jitter, a period of overlap during which a port and a successive port both accept data packets may be provided. Ports may be selected for use by providing endpoints to a communication with a common algorithm and seed value.