Abstract:
Enabling control over multiple forms of communication to a recipient, such as email, instant messages, cell phone calls, conventional phone calls, faxes, and the like. The recipient defines rules for authenticating senders and for determining when, where, and how communication from the senders is transmitted to the recipient's preferred receiving device(s). The rules are stored in a database of a central service. The central service applies the rules to incoming email, instant messages, calls, faxes, etc. The central service screens unauthentic senders according the recipients rules associated with each form of communication, requiring the sender to provide some proof of identification. If authenticated, the central service enables a sender to communicate with the recipient via the recipient's currently preferred receiving device. If necessary, the central service converts incoming communications to the recipient's preferred form of communication for transmission to the recipient's preferred voice mail, cell phone, instant message service, etc.
Abstract:
A system for facilitating wireless communication. The system includes a client device configured to operate in a plurality of networks. The system also includes a server coupled to the plurality of networks and managed by an enterprise. The server is configured to store connectivity information of the client device, to route incoming media data addressed to the client device using the connectivity information of the client device, and to route outgoing media data originated from the client device through the server. The connectivity information pertains to connectivity of the client device with at least one network of the plurality of networks.
Abstract:
A method for facilitating wireless communication of a client device with a destination telecommunication device is provided. The method includes receiving a first telecommunication signal from the client device by a server managed by an enterprise. The method also includes analyzing the first telecommunication signal to determine if a less expensive telecommunication option is available. The method further includes, the server sending a callback signal to the client device if the less expensive telecommunication option is available. The method yet also includes accepting the callback signal via a non-human initiated response by the client device, thereby establishing a telecommunication connection between the client device and the server. The method yet further includes sending a second telecommunication signal by the server to the destination telecommunication device. The method in addition includes establishing a telecommunication session between the client device and the destination telecommunication device when the second telecommunication signal is accepted.
Abstract:
The present invention is directed at rebooting a cluster while maintaining cluster operation. Cluster operation is automatically maintained during the reboot since at least one member of the cluster stays active during the process. An administrator triggers the reboot process and then does not have to perform any other steps during the reboot process. An algorithm executes which reboots members of the cluster at different times, while always maintaining operation of at least one member of the cluster.
Abstract:
A mobility architectural arrangement for managing telecommunication mobility for a handset is provided. The arrangement includes a DiVitas protocol proxy (DPP), which is configured to manage connectivity between a mobility client of the handset and a mobility server within an enterprise. The DPP includes a client DPP being configured to manage the connectivity for the mobility client of the handset. The client DPP receives a plurality of client connectivity requests from a plurality of application clients. The server DPP is configured to manage the connectivity for the mobility server. The server DPP receives a plurality of server connectivity requests from a plurality of application servers. The client DPP and the server DPP are configured to interact with one another to establish a secure channel.
Abstract:
A system and method is directed to detecting tampering of a computer system's operating system (OS). The OS includes a kernel binary and at least one user level binary. When the user level binary is generated, selected integrity data is also generated. Such integrity data may include, but is not limited to, a digital signature, a hash associated with the user level binary, and the like. In one embodiment, integrity data is also generated for the kernel. The kernel is modified to include the integrity data associated with the user level binary. The kernel further includes a tamper detector that is configured to examine the OS binary against its associated integrity data. If tampering is detected, the tamper detector may provide a message indicating which OS binary may have been modified. The tamper detector may also quarantine the modified OS binary, log the message, and the like.
Abstract:
An arrangement for managing a telecommunication session for a plurality of mobile communication devices that includes at least a first mobile communication device and a second mobile communication device is provided. The arrangement includes a mobility gateway, which is configured to communicate with the mobility client software of the first mobile communication device, wherein the first mobile communication device is a subscriber of the mobility gateway. The mobility gateway includes computer readable code implementing a model configured for collecting and storing environmental data about a set of access points. The environmental data includes data collected during the telecommunication session between the first mobile communication device and the second mobile communication device. The environmental data also includes data collected during previous telecommunication sessions supported by the mobility gateway. The environmental data is employed by the mobility gateway to manage the telecommunication session for the first mobile communication device.
Abstract:
A mobility architectural arrangement, which includes a set of software modules, is provided. A subset of the set of software modules implements a DiVitas description protocol (DDP), which is configured to transport data packets between applications clients on a handset and application servers within an enterprise. The set of modules includes a client DDP, which is configured to be loaded onto a mobility client of the handset. The client DDP is configured to perform at least one of sending the data packets from a first application client and receiving the data packets from a first application server. The set of modules includes a server DDP, which is configured to he loaded onto a mobility server managed by the enterprise. The server DDP is configured to perform at least one of sending the data packets from the first application server and receiving the data packets from the first application client.
Abstract:
A computer-implemented method for authenticating a cellular recipient to facilitate a call from a first caller's first communication device to a cellular recipient's cellular telephone is provided. The first caller dials an enterprise extension number and a server employs a cellular telephone number associated with cellular telephone to attempt to direct the call to cellular telephone in a public cellular network. The method includes initiating, prior to completing an end-to-end bearer channel between first communication device and cellular telephone, an authentication period having a finite duration. The method also includes receiving first authentication data from cellular telephone. If first authentication data matches, during the authentication period, with second authentication data that is pre-arranged with the server, completing the end-to-end bearer channel between first communication device and cellular telephone. However, if authentication period expires before first authentication data is received, denying the call and preventing the establishment of end-to-end bearer channel.
Abstract:
Enabling control over multiple forms of communication to a recipient, such as email, instant messages, cell phone calls, conventional phone calls, faxes, and the like. The recipient defines rules for authenticating senders and for determining when, where, and how communication from the senders is transmitted to the recipient's preferred receiving device(s). The rules are stored in a database of a central service. The central service applies the rules to incoming email, instant messages, calls, faxes, etc. The central service screens unauthentic senders according the recipients rules associated with each form of communication, requiring the sender to provide some proof of identification. If authenticated, the central service enables a sender to communicate with the recipient via the recipient's currently preferred receiving device. If necessary, the central service converts incoming communications to the recipient's preferred form of communication for transmission to the recipient's preferred voice mail, cell phone, instant message service, etc.