摘要:
In accordance with a particular embodiment of the present invention, a method for providing security information associated with a prospective communication session to a user includes providing at least one communication network for the establishment of a prospective communication session between a first network device and a second network device. A security rating is assigned to the prospective communication session, and security information is provided to a user associated with the first network device that includes the security rating.
摘要:
A communication system quarantines text and then automatically transmits the text across a network at the end of a quarantine time period. This text quarantine period gives a user the chance to edit or delete text for a brief amount of time after the text has been entered. This allows editing or deletion of spelling errors, and inadvertent or indiscriminate text responses before the text is sent to a remote user. Since the text characters are automatically transmitted after the quarantine period, normal human communications and interactions are maintained allowing a receiver to interject or interrupt with text comments in the middle of a received text message. Thus, the communication system maintains the interactive advantages of TTY/TDD systems while also providing the editing flexibility of instant messaging systems. In another aspect of the text system, characters are buffered until they form a complete expression. Upon detection of the completed expression, the buffered characters are sent to the destination endpoint.
摘要:
In accordance with a particular embodiment of the present invention, a method using shared configuration information to manage network access for externally generated communications includes maintaining association information for a first end user of a private network and maintaining configuration information for a first endpoint associated with the first end user. When an externally generated communication that is addressed for delivery to a second endpoint associated with a second end user is received at an access point to the private network, the association information is used to determine an association between the first end user and the second end user. The configuration information for the first end user is used to configure the access point to allow the communication to be delivered to the second endpoint.
摘要:
In one embodiment, a method for enhanced call pickup includes accessing data indicating a current status of each of one or more users in a call pickup group (CPG) with respect to an incoming phone call to a phone number corresponding to the CPG and communicating the data to one or more endpoints of one or more users in the CPG for display to one or more users in the CPG. A display of the data to a first user in the CPG facilitates the first user determining a current status of each of one or more second users in the CPG to facilitate a decision by the first user regarding whether to pick up the incoming phone call.
摘要:
Systems and methods for unified messaging are described herein. In an embodiment, a repository server includes a message store. According to one method implemented by the repository server, a voice message is sent as part of an email message. In an embodiment, preprocessing is performed before sending the email, including but not limited to inserting information, data, links, voice mail audio files, and voice mail transcriptions in the email. A copy of the preprocessed email is stored in the message store with an authentication key. The authentication key is used, for example by a recipient of the email, to access voice mail audio files that may not be accessible on the recipient's device.
摘要:
In accordance with a particular embodiment of the present invention, a method using presence information to manage network access includes maintaining presence information for an end user. When a remote access request is received from the end user at a remote endpoint, the presence information for the end user is updated to identify the presence of the end user at one or more network endpoints associated with a private network. An access point to the private network is then automatically configured to allow any communications addressed to an IP address associated with the one or more network endpoints to pass through the access point.
摘要:
A service grammar can be defined in Backus Naur Form for a protocol. The service grammar can be compiled into a service analyzer, which can identify services from a trace of messages sent using the protocol. Similarly, a workflow grammar can be defined for services implemented using the protocol (a meta-grammar). The workflow grammar can be compiled into a workflow analyzer, which can identify workflows from the services (and therefore, indirectly from the trace). This workflow information can be used to define actions for a User Agent (UA) that can act on behalf of a person. The UA can be validated using the service analyzer and workflow analyzer to verify that the UA is acting correctly.
摘要:
Loopback interfaces are put into routers in a packet switched network. When an end to end Quality of Service (QoS) path is not performing adequately, the delay and jitter characteristics are measured for individual network subsystems. An audio signal is converted into a stream of audio packets and sent hop by hop to the different routers in the network having the loopback interface. QoS is determined by looping back the stream of audio packets from the different routers. If necessary, the network is reconfigured according to loopback delay in the individual network subsystems. Reconfiguration can comprise routing telephone calls through different paths in the network or adding additional equipment to increase capacity.
摘要:
Voice and data streams transmitted from a conventional DSVD modem are interfaced directly to a network access server through a modified DSVD modem according to the invention. The voice and data is formatted into network data packets that are then routed directly to different endpoints through the network access server. The modified DSVD modem includes a packet framer that removes conventionally transmitted V.76 DSVD framing formats and stuffs bytes into the voice and data to form network packets. The network access server then routes the voice and data packets to the different endpoints identified in a packet header. Since the voice and data are output from the DSVD modem in data packets, the voice and data can be routed more efficiently to different network endpoints.
摘要:
A communication system quarantines text and then automatically transmits the text across a network at the end of a quarantine time period. This text quarantine period gives a user the chance to edit or delete text for a brief amount of time after the text has been entered. This allows editing or deletion of spelling errors, and inadvertent or indiscriminate text responses before the text is sent to a remote user. Since the text characters are automatically transmitted after the quarantine period, normal human communications and interactions are maintained allowing a receiver to interject or interrupt with text comments in the middle of a received text message. Thus, the communication system maintains the interactive advantages of TTY/TDD systems while also providing the editing flexibility of instant messaging systems. In another aspect of the text system, characters are buffered until they form a complete expression. Upon detection of the completed expression, the buffered characters are sent to the destination endpoint.