Abstract:
A method of managing communications services begins with a communications platform receiving a request for a communications service to be provided to a communications device by a source other than the communications platform. The communications platform determines an authorization of the communications device to receive the communications service. The authorization comprises a permission of the communications device to receive the communications service during a lifetime of a communications session maintained with the communications device. The communications network authorizes delivery of the communications service to the communications device during the lifetime of the communications session, in accordance with the authorization.
Abstract:
Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first primary communication device; providing a second primary communication device; providing a conference call controller; establishing a first control link between the first primary communication device and the conference call controller; communicating first identification data between the first primary communication device and the conference call controller via the first control link; establishing a media link between the first and second primary communication devices via the conference call controller. In certain embodiments, the first identification data corresponds to at least one participation level of the first primary communication device with respect to the media link. The method may further comprise establishing a second control link between the second primary communication device and the conference call controller; communicating second identification data between the second primary communication device and the conference call controller via the second control link; wherein the second identification data establishes a participation level of the second primary communication device with respect to the media link.
Abstract:
A method for controlling access to a conference call, the method comprising authenticating a mobile device in accordance with access requirements for the conference call rejecting the mobile device if the participant does not comply with the access requirements in response to the rejection, determining by a processor based on information other than said access requirements that the mobile device is legitimate and overriding the rejection to allow connection to the conference call if it is determined that the mobile device is legitimate.
Abstract:
In a computer-implemented method of joining a user to a conference call event an interface associated with a time management software application is displayed. The interface displays information relating to the conference call event including a date for a conference call which is subject of the conference call event and a start time of the conference call. While displaying the interface, a menu offering one or more options is displayed; these one or more options include an option to join the conference call. When an indication of a selection of the option to join the conference call is received, information associated with the conference call is located; this information includes a telephone number for a conference call bridge. A connection with the conference call bridge using the telephone number is initiated.
Abstract:
In a computer-implemented method of joining a user to a conference call event an interface associated with a time management software application is displayed. The interface displays information relating to the conference call event including a date for a conference call which is subject of the conference call event and a start time of the conference call. While displaying the interface, a menu offering one or more options is displayed; these one or more options include an option to join the conference call. When an indication of a selection of the option to join the conference call is received, information associated with the conference call is located; this information includes a telephone number for a conference call bridge. A connection with the conference call bridge using the telephone number is initiated.
Abstract:
A system and method for reestablishing a voice communications session moderated by a group call server between two or more telephony devices. The method is performed by a processor monitoring the communications session. The method comprises: storing one or more data records representing group call information; detecting disconnection of at least one participating telephony device from the group communications session, and determining that the disconnection was not intentionally initiated; accessing the stored call group information data and causing signals to enable reestablishment of participation by the disconnected device to be sent to the disconnected device; and upon receipt by the group call server from the disconnected device of signals representing a request to reconnect the disconnected device, outputting command signals for reestablishing a communications session between the disconnected device and at least one other device participating in the group communications session.
Abstract:
In a computer-implemented method of joining a user to a conference call event an interface associated with a time management software application is displayed. The interface displays information relating to the conference call event including a date for a conference call which is subject of the conference call event and a start time of the conference call. While displaying the interface, a menu offering one or more options is displayed; these one or more options include an option to join the conference call. When an indication of a selection of the option to join the conference call is received, information associated with the conference call is located; this information includes a telephone number for a conference call bridge. A connection with the conference call bridge using the telephone number is initiated.
Abstract:
An architecture, system and associated method and apparatus for securely communicating authentication data to a communication device. In one embodiment, the method includes modulating a spectral source's radiation using the authentication data, wherein the spectral source's radiation is adapted to operate as a first transmission medium for carrying the authentication data, the first transmission medium being containable within an enclosure that inhibits passage of the spectral source's radiation (i.e., spectrally opaque enclosure). The modulated authentication data is transmitted via the first transmission medium to the communication device disposed in the spectrally opaque enclosure.
Abstract:
A method for controlling access by of communication devices to a conference call, the method comprising associating proximity settings with a conference call, the proximity settings indicating a acceptable proximity of other communication devices relative to a selected communication device; sensing by the selected communication device proximity of the other devices within its proximity of the communication device to obtain proximity information; and determining, by a processor, from the obtained proximity information and the proximity settings an action to be performed with reference to the conference call.
Abstract:
Systems and methods are described that facilitate the generation of calling lists for use in planning or setting up conference calls. The system may include a communications module and a contact database comprising a plurality of contact records, each contact record corresponding to a different contact. Each contact record may include at least one contact address and at least one descriptor. For example, the descriptor may include a job title and/or expertise for the contact. The system may also include a selection module configured to select at least one of the contacts and also configured to compare the at least one descriptor to at least one qualifier criteria. The method may include: providing a contact database comprising a plurality of contact records, each contact record corresponding to a different contact; wherein each contact record comprises at least one contact address and at least one descriptor; determining at least one qualifier criteria; comparing the qualifier criteria to the at least one descriptor; determining a calling list corresponding to at least one contact.