Abstract:
A medium and method are provided for preventing undesired data from being communicated through a network. In one aspect, the method comprises the method comprises receiving from an anonymizing device an indication of an undesired data communication and an identification of one or more of a computing device responsible for said communication and a user responsible for said communication; on the basis of specified criteria, determining whether said indication is valid; when said indication is valid, incrementing a cumulative instance count that sums a number of instances associated with one or more of the computing device and the user; and, when said cumulative count exceeds a predetermined threshold number of instances, implementing a measure to prevent a further undesired data communication from said computing device.
Abstract:
A method to providing VoIP telephony to a plurality of users of a VoIP network includes authenticating and registering a primary user to a VoIP device to support call signaling associated with the primary user. A guest user subscriber of the VoIP network having a guest user directory number is authenticated in response to a password. The guest user directory number is mapped to the unique hardware identifier of the VoIP device, and a second set of VoIP parameters are downloaded from the VoIP network to the VoIP device in order to support call signaling associated with the guest user. VoIP calls are then within the VoIP network in response to the mappings of the primary user directory number and the guest user directory number to the same unique hardware identifier.
Abstract:
A system and method of searching data stored on a wireless device is provided. Using a search request to search data stored on a wireless device which is received at a first processing node from a second processing node, the first processing node performs a search of the data stored on the wireless device. Search results are generated at the first processing node based on the search, and the search results are provided from the first processing node to the second processing node.
Abstract:
A method and system for automatically providing to a network entity in a wireless network, a location of a mobile station where a call is dropped (i.e., a call-drop location). The mobile station or base station may determine that a call in which the mobile station was engaged has been dropped. In response to determining that a call has been dropped, the mobile station or base station may obtain the location of the mobile station. The call-drop location can be used to identify those areas of the wireless network needing improved radio coverage.
Abstract:
There is provided a process for the preparation of 2,3-pyridinedicarboximides having the structural formula I ##STR1## The 2,3-pyridinedicarboximides are useful as intermediates in the preparation of herbicidal 2-(2-imidazolin-2-yl)nicotinic acids, esters and salts.
Abstract:
There is provided an improved method for the conversion of 5,6-dicarboxyl-3-pyridylmethyl ammonium halide to 5-(alkoxymethyl)pyridine-2,3-dicarboxylate salt via a single step closed reaction with the appropriate alcohol and a base at a temperature of about 120.degree.-180.degree. C. The product pyridinedicarboxylate salt is an important intermediate in the manufacture of pyridine imidazolinone herbicidal agents.
Abstract:
A wireless communication device comprises a wireless communication interface, a processing system, and a user interface. The wireless communication interface is configured to wirelessly receive a mixed media signal comprising a plurality of audio streams originating from different source devices. The processing system is configured to isolate the audio streams and generate graphical representations of each one of the audio streams. The user interface is configured to display the graphical representations of each one of the audio streams and receive audio stream modification instructions from a user. The processing system is configured to process the audio stream modification instructions to generate at least one modified audio stream based on the audio stream modification instructions. The user interface is configured to display a graphical representation of the modified audio stream and audibly output a modified mixed media signal comprising the modified audio stream.
Abstract:
Disclosed are methods and systems for using transport-layer source ports to identify sources of packet payloads in mixed tethering and non-tethering environments so that, e.g., a provider may differentially bill between those two types of data communication. In particular, a wireless device capable of sending data from both tethered and non-tethered sources may use specified transport-layer source ports to identify data as coming from various different sources. Network entities that record data usage associated with the device may detect which port the device used to send data and use port-to-source (e.g., port-to-hardware-interface) mapping data to determine the source (e.g., the source hardware interface) of the data. The network entities may report this data usage, along with the determined data sources, to a billing system so that the billing system may accordingly differentially bill a subscriber associated with the device.
Abstract:
An ingress point receives a packet flow from a first communication device. The ingress point copies the packet flow, transmits the packet flow to an egress point over a network path, and processes the copy to determine if the packet flow represents a security event. If the packet flow represents a security event, the ingress point transmits a blocking instruction to the egress point over an alarm link and the egress point blocks the packet flow representing the security event. If the packet flow does not represent a security event, the egress point transmits the packet flow to a second communication device.
Abstract:
Ways of allocating an identifier to a mobile device are disclosed. One method includes receiving a request that requests an address be assigned to the mobile device, considering factors in connection with determining a mobile IP (MIP) address to be assigned to the mobile device, determining the MIP address based on the factors, and conveying the MIP address to the mobile device.