摘要:
A telecommunications system uses software applications called user agents, that are preferably Internet-based and that operate on behalf of users in a telecommunications hosting server to control call connections under control of a telecommunications network server that interfaces with the telecommunications hosting server as well as a connection-based public telephone network. The telecommunications hosting server operates on a computer network on behalf of the user agents to provide call signaling in support of many advanced calling and telecommunications services. The functionality and performance (e.g., execution) of the user agent(s) preferably takes place primarily within the telecommunications hosting server, though user client computers can provide some and possibly all of the user agent functionality, depending upon the particular implementation chosen.
摘要:
Methods and systems for telecommunications operations and controls include (1) an enhanced text message process or methodology that allows a remote user who does not have, already installed, a specialized voice telephony program to nevertheless place and participate in a voice call, (2) call admission control using a “degrees of separation” metric, (3) real time controlled sharing of contact (buddy) lists, (4) multi-service instance messaging conferences, and (5) “meta buddies” or buddy lists that can be automatically imported and made part of a user's own buddy list.
摘要:
A multi-media call application is disclosed. The application guarantees quality of service (QOS) for a packet based multi-media call (CALL). The guaranty is effectuated through call associated individual media stream bandwidth control.
摘要:
A method of controlling data transfer between a first and a second computer network comprises parsing content description language received from the first computer network to determine tag information with the content description language. A completion decision is made based on the tag information. For one embodiment, the completion decision may include any of the following: full data transfer between the two network, partial data transfer between the two network, a deferred data transfer at a later time, or a cached data transfer. Restrictions based upon a user's age, a user's access right, cost, system resources, and time of day may also be employed to limit the transfer of data based upon the tag information.
摘要:
A request message is sent by a client to a server according to a first protocol (e.g., HTTP) identifying a data file and a storage location, such as an E-mail address. In response the server forwards the requested data file to the E-mail address according to a second protocol (e.g., SMTP). In doing so large amounts of data can be retrieved at a future time when network traffic is lower. Also, if the client does not have the necessary hardware/software setup, the requested data file can be retrieved by a second client which may have capability to present the information in the data file to the user. The different types of information that are capable of being handled by software operating at the client (e.g., web browser) can be handled by the E-mail software operating at the client.
摘要:
Methods and systems for telecommunications operations and controls include (1) an enhanced text message process or methodology that allows a remote user who does not have, already installed, a specialized voice telephony program to nevertheless place and participate in a voice call, (2) call admission control using a “degrees of separation” metric, (3) real time controlled sharing of contact (buddy) lists, (4) multi-service instance messaging conferences, and (5) “meta buddies” or buddy lists that can be automatically imported and made part of a user's own buddy list.
摘要:
Data transfer is controlled between a first network and a second network of computers by a firewall-proxy combination. Active interpretation of protocol commands exchanged between the first network and the second network is performed to determine specific actions concerning completion of the protocol request. This active firewall-proxy combination may exist on either the first or second network of computers. This method of control provides centralized control and administration for all potentially reachable resources within a network.
摘要:
A request message is sent by a client to a server according to a first protocol (e.g., HTTP) identifying a data file and a storage location, such as an E-mail address. In response the server forwards the requested data file to the E-mail address according to a second protocol (e.g., SMTP). In doing so large amounts of data can be retrieved at a future time when network traffic is lower. Also, if the client does not have the necessary hardware/software setup, the requested data file can be retrieved by a second client which may have capability to present the information in the data file to the user. The different types of information that are capable of being handled by software operating at the client (e.g., web browser) can be handled by the E-mail software operating at the client.
摘要:
A method of controlling the transfer of data between a first and a second computer network comprises parsing content description language received from the first computer network by the second computer network to determine current tag information within the content description language. A completion decision is then dynamically made based upon the current tag information. In one embodiment, the completion decision may include any of the following: full data transfer between the two networks, partial data transfer between the two networks, a deferred data transfer at a later time, or a cached data transfer. Restrictions based upon a user's age, a user's access rights, cost, system resources, and time of day may also be employed to limit the transfer of data based upon the current tag information. In a preferred embodiment, the content description language is HTML. This method may be practiced by an application level proxy that is part of a firewall system protecting the second computer network from the first.
摘要:
A telecommunications system uses software applications called user agents, that are preferably Internet-based and that operate on behalf of users in a telecommunications hosting server to control call connections under control of a telecommunications network server that interfaces with the telecommunications hosting server as well as a connection-based public-telephone network. The telecommunications hosting server operates on a computer network on behalf of the user agents to provide call signaling in support of many advanced calling and telecommunications services. The functionality and, performance (e.g., execution) of the user agent(s) preferably takes place primarily within the telecommunications hosting server, though user client computers can provide some and possibly all of the user agent functionality, depending upon the particular implementation chosen.