Abstract:
A method for implementing a SIP feature includes, in particular embodiments, establishing a communication session via a communications platform between a first and second user and receiving a request from a third user to join the communication session. The second and third users are from a plurality of users using a shared line. The method further includes integrating communications of the third user into the communication session. In particular embodiments the method includes establishing a communication session between a first and second user via a communications platform. The method also includes receiving a select request that locks the communication session so that a third user cannot resume the communication session with the first user. In particular embodiments the method includes receiving a request from a first user of a shared line to enable a privacy feature that reduces call information generated by the communications platform in remote state notifications.
Abstract:
A client device bootstraps against a trusted server by obtaining an activation code that includes an identifier and a one time password. The client device sends a message to a public server requesting an address of a trusted server associated with the identifier. The client device receives the address of the trusted server from the public server and initiates a communication session with the trusted server at the address provided by the public server. The one time password is used as a shared secret to secure the communication session. The client device downloads cryptographic information from the trusted server.
Abstract:
In one implementation, an apparatus includes an audio detection circuit, a central processor, and the switch. The audio detection circuit is configured to determine whether audio is present in an input signal and generate an audio presence indicator indicative of the audio. The central processor is configured to receive the audio presence indicator and a mute command. The central processor generates a switch command based on the mute command. The switch is configured to block the input signal from a digital signal processor in response to the switch command. The central processor generates a dynamic mute message that indicates audio is detected while a mute command is active.
Abstract:
In one implementation, an apparatus includes an audio detection circuit, a central processor, and the switch. The audio detection circuit is configured to determine whether audio is present in an input signal and generate an audio presence indicator indicative of the audio. The central processor is configured to receive the audio presence indicator and a mute command. The central processor generates a switch command based on the mute command. The switch is configured to block the input signal from a digital signal processor in response to the switch command. The central processor generates a dynamic mute message that indicates audio is detected while a mute command is active.
Abstract:
A provisioning client obtains an identifier from a public server and a one-time password from a trusted server. The provisioning client combines the one-time password with the identifier to create an activation code for a client device and presents the activation code to the client device. The activation code enables the client device to download trusted cryptographic information from the trusted server in a communication session that is secured using the one-time password.
Abstract:
A trusted server receives a request for an activation code, which includes an identifier associated with the trusted server and a one-time password, for a client device. The trusted server obtains the identifier from a public server, generates the one-time password, and combines the one-time password with the identifier to create the activation code. The trusted server provides the activation code to a provisioning client, which presents the activation code to the client device. The trusted server and client device secure a communication session using the one-time password as a shared secret. The trusted server downloads trusted cryptographic information to the client device over the secure communication session.
Abstract:
A call control entity communicates with Internet Protocol (IP) phones over a network. Responsive to a request from a new IP phone that is to replace an existing IP phone, the call control entity determines there is no existing IP phone record for the new IP phone. In response, the call control entity acquires from the new IP phone a directory number associated that is to be used when making calls with the new IP phone, and searches for an existing IP phone record for the existing IP phone based on the directory number. When the existing IP phone record is found, the call control entity creates for the new IP phone a new IP phone record associated with the directory number, copies existing configuration information from the existing IP phone record to the new IP phone record, and configures the new IP phone with the existing configuration information.
Abstract:
A provisioning client obtains an identifier from a public server and a one-time password from a trusted server. The provisioning client combines the one-time password with the identifier to create an activation code for a client device and presents the activation code to the client device. The activation code enables the client device to download trusted cryptographic information from the trusted server in a communication session that is secured using the one-time password.
Abstract:
A call control entity communicates with Internet Protocol (IP) phones over a network. Responsive to a request from a new IP phone that is to replace an existing IP phone, the call control entity determines there is no existing IP phone record for the new IP phone. In response, the call control entity acquires from the new IP phone a directory number associated that is to be used when making calls with the new IP phone, and searches for an existing IP phone record for the existing IP phone based on the directory number. When the existing IP phone record is found, the call control entity creates for the new IP phone a new IP phone record associated with the directory number, copies existing configuration information from the existing IP phone record to the new IP phone record, and configures the new IP phone with the existing configuration information.
Abstract:
A trusted server receives a request for an activation code, which includes an identifier associated with the trusted server and a one-time password, for a client device. The trusted server obtains the identifier from a public server, generates the one-time password, and combines the one-time password with the identifier to create the activation code. The trusted server provides the activation code to a provisioning client, which presents the activation code to the client device. The trusted server and client device secure a communication session using the one-time password as a shared secret. The trusted server downloads trusted cryptographic information to the client device over the secure communication session.