Abstract:
A communication device sends a Session Initiation Protocol (SIP) INVITE message to establish a call. In response, the call is forked. For example, in parallel forking, the SIP INVITE may be sent to two different communication devices. The forking causes each communication device to send at least one provisional response message. In this case, first and second SIP provisional response messages are received that include Session Description Protocol (SDP) information for a media stream. A first media stream associated with one of the first or second SIP provisional response messages is received and played. A second media stream associated with the other one of the first or second SIP provisional response messages is received within a first time period. In response to receiving the second media stream within the first time period, the first media stream is discarded and the second media stream is played.
Abstract:
An event that changes the security of a communication session between communication endpoints is determined. The event that changes the security of the communication session between the communication endpoints occurs after the communication session is established. For example, the event may be where a user has enabled a speakerphone. In response to determining the event that changes the security of the communication session between the communication endpoints, a message is sent to the communication endpoints that indicates a changed security level. The communication endpoints display the changed security level to the participants of the communication session. For example, the changed security level when the speakerphone is enabled may indicate that the communication session is now unsecure.
Abstract:
The concept of a centralized communication log is provided. Anchor points, and specifically Session Initiation Protocol (SIP) anchor points, serve as a media and call control point that is established on a per-user basis which can then be leveraged by a communication log application. Such a communication log application is able to determine accurate and real-time communicant information for a communication session and populate a centralized communication log with the same. Such a communication log is, therefore, accurate with respect to multiple users in a system, highly available, and scaled horizontally.
Abstract:
A first Session Initiation Protocol (SIP) REFER message is sent by an application server to a User Agent (UA). A UA is typically in a communication device, such as a telephone or personal computer. The first SIP REFER message requests the UA to provide a unique Uniform Resource Identifier (URI) for an instance of a networked application. For example, a networked application may be a call recording application. In response to sending the first SIP REFER message, a SIP NOTIFY message with the URI for the instance of the networked application is received by the application server. The application server sends a second SIP REFER message to the UA using the URI. The second SIP REFER message includes information for managing a widget. A widget is object, such as a button or sound. The widget is then displayed or played on a communication device according to a set of rules.
Abstract:
A communication device gets a widget resource Uniform Resource Identifier (URI) from the network. The widget resource URI is used by the communication device to get a widget (i.e., a graphical user interface object) of a networked application that is displayed on the communication device. In response to getting the widget resource URI, the communication device downloads a context document from the widget resource URI. The context document defines the widget or a location of a widget document that defines the widget for use in the communication device. The communication device identifies an attachment point for the widget (i.e., a place to display the widget) that is associated with an activation of a device object (e.g., a window). The communication device determines that the attachment point is within a scope. In response to determining that attachment point is within the scope, the widget is displayed on the communication device.
Abstract:
The concept of a secure call indicator is introduced. In general, the secure call indicator is capable of inspecting the security of signaling associated with Session Initiation Protocol (SIP) messages and comparing the security with media descriptions of the actual media path of the SIP messages. Furthermore, the secure call indicator may be configured to indicate the security associated with a communication session via a physical or virtual notification system.
Abstract:
A first Session Initiation Protocol (SIP) REFER message is sent by an application server to a User Agent (UA). A UA is typically in a communication device, such as a telephone or personal computer. The first SIP REFER message requests the UA to provide a unique Uniform Resource Identifier (URI) for an instance of a networked application. For example, a networked application may be a call recording application. In response to sending the first SIP REFER message, a SIP NOTIFY message with the URI for the instance of the networked application is received by the application server. The application server sends a second SIP REFER message to the UA using the URI. The second SIP REFER message includes information for managing a widget. A widget is object, such as a button or sound. The widget is then displayed or played on a communication device according to a set of rules.
Abstract:
The concept of a secure call indicator is introduced. In general, the secure call indicator is capable of inspecting the security of signaling associated with Session Initiation Protocol (SIP) messages and comparing the security with media descriptions of the actual media path of the SIP messages. Furthermore, the secure call indicator may be configured to indicate the security associated with a communication session via a physical or virtual notification system.
Abstract:
Methods and systems are provided such that users, servers, and applications may utilize an extensible data filtering model where data is organized into a tree with filtering available at any node level. Accordingly, the node filtering and propagation method and system allows for the efficient management and automatic replication of common information for multiple applications at all data levels.
Abstract:
A communication system, method, and components are described. Specifically, a communication system having the ability to carry a transitive context and communicate the transitive context to new participant user agents for continuity through all related call dialogs is disclosed. The transitive context communication is possible through the use of a newly created SIP dialog using a REFER message and/or an INVITE message for all call flows and topology change operations.