摘要:
An audible confirmation system automatically and seamlessly outputs an audible name of a call recipient to a calling party. This audible confirmation system is preferably configured to audibly identify the call recipient to the calling party prior to the call recipient and the calling party communicating with each other. The audible confirmation system preferably includes a text to speech converter coupled to an intelligent network architecture having at least one calling name database. The audible confirmation system allows the calling party to audibly identify the call recipient to the calling party without any input from the call recipient and without using any special equipment such as a display screen by the calling party. The audible confirmation system is especially useful when the call recipient does not have voice mail service and is not available to receive a call. For example, by utilizing the audible confirmation system, the calling party is able to confirm the identity of the call recipient prior to leaving a confidential message for the call recipient by utilizing the calling party's voice mail delivery system for automatically delivering the confidential message to the call recipient.
摘要:
A billing system and method automatically charges a call to a predetermined telephone line wherein the call is placed by a calling part through a service. This service is any one or combination of a voice mail system, a call forwarding system, and the like. Preferably, this billing system and method also automatically charges the call to a predetermined telephone line even when the calling party places the call from a remote location. The billing system and method preferably includes a signal control point coupled to the calling party, the predetermined telephone line, and the service. Preferably, the signal control point is configured to implement the billing system and method such that the call placed by the calling party through the service is billed to the predetermined telephone line. A terminating attempt trigger within a switch associated with predetermined telephone line preferably directs this switch to record a duration of the call and a particular feature utilized for the call. As a result, this switch associated with the predetermined telephone line stores both the call duration and the particular feature associated with the call in a single record. Accordingly, the billing system and method does not need to perform additional steps or add further complexity to obtain both the call duration and the particular feature associated with the call. Further, the calling party is preferably capable of selecting the predetermined telephone line which serves as a telephone line to be billed.
摘要:
A voice messaging platform utilizes resources from remote intelligent peripherals within the network system. The voice messaging platform preferably includes a voice mail module, an internal controller, and an internal storage device. Preferably, the voice mail module allows the voice messaging platform to provide a full feature voice mail system for the users wherein the voice mail module is configured to store incoming messages, play stored messages, play outgoing messages, place outgoing calls, and the like. The internal controller preferably directs the voice messaging platform to detect different types of resources available to the voice messaging platform from the remote intelligent peripherals. Further, the internal controller also directs the voice messaging platform to find addresses corresponding to each of the remote intelligent peripherals within the network system. Preferably, the internal storage device stores the type of resource vailable from the remote intelligent peripherals and their respective addresses.
摘要:
A bookmark system and method automatically stores a subaddress associated with a particular user and location within a presently connected server. The subaddress preferably indicates a location where the user exited the server. This bookmark system and method seamlessly places the user back to this subaddress within the server when the user reconnects to the server. The bookmark system and method is preferably configured to operate within an Intelligent Network service. By utilizing the bookmark system and method, the user is able to move from server to server and automatically return to a subaddress where the user previously exited the server. Further, the bookmark system and method does not require a call to be routed through a prior server in order for the user to return to the subaddress where the user previously exited the prior server.
摘要:
Techniques are disclosed for lawfully intercepting information in communication environments with end-to-end encryption. For example, a method for intercepting encrypted communications exchanged between a first computing device and a second computing device in a communication network, wherein the interception is performed by a third computing device in the communication network, comprises the following steps. The third computing device obtains one or more packets having a packet address associated with one of the first computing device and the second computing device. The one or more packets are obtained by the third computing device, in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the one or more obtained packets may be decrypted so as to obtain data contained therein. The third computing device preserves the packet address of the one or more obtained packets. The third computing device forwards the one or more packets toward a packet-destination one of the first computing device and the second computing device such that the packet-destination one of the first computing device and the second computing device is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
摘要:
A method of administering network selections for a mobile station between a second generation/third generation wireless network and wireless local area networks includes detecting when the mobile station encounters a wireless area network, and communicating an identity of the encountered wireless area network to the second generation/third generation wireless network. The communicating prompts a query for permission to establish a session between the mobile station and the encountered wireless local area network. When permission is granted, the method includes receiving a key distributed to the mobile station. The key is used by the mobile station to establish a session between the mobile station and the encountered wireless local area network.
摘要:
A method and apparatus for identifying a caller who does not provide caller identification on an unanswered call. The caller is asked to record his/her name (or some other characteristic utterance). If the call is unanswered, the record is retained and can be accessed by the called party when that party requests his/her stored voice mail. Advantageously, even on unanswered calls, the identity of the caller can be presented to the called party when that called party requests stored voice mail messages, even if the calling party has private service.
摘要:
In a method and system for opportunistic delivery of less-than-best-effort application data, a WIN network identified the elements of the wireless network servicing a specified mobile client. One or more elements of the wireless network servicing the specified mobile client monitor the connection state of a mobile client and notify the WIN network of connection state changes so that a chatty application running on an external application server may be notified by the WIN network to deliver packet data when the specified mobile client is connected to the network for some other purpose or when unused network resources are available. In this way, network resource overload caused by chatty applications is reduced.
摘要:
A system and method for providing dynamic call disposition service to a wireless terminal that may be occupied or unoccupied. In response to a call to the wireless terminal in a voice domain, call disposition options are provided to the wireless terminal in a data domain. A call disposition action is then taken according to an option selection made at the wireless terminal as part of a cooperative effort between resources in the voice and data domains.
摘要:
A system and method for remote activation of customized telecommunication services are provided for data network telephony subscribers in a data network. In response to a call originator placing a call to a terminating telephony subscriber in the data network, a telephony server routes the call according to custom telecommunication service instructions provided in advance by the telephony subscriber and stored remotely from the telephony subscriber's point of presence on the data network. The call originator may be a data network telephony subscriber or a subscriber in the Public Switched Telephone Network (PSTN). The telephony server preferably performs the call routing based custom telecommunication service instructions (along with the subscriber's network address) retrieved from a subscriber profile server that maintains a subscriber profile database. A registration server may be provided to forward a data network address assigned to the telephony subscriber to the subscriber profile server when telephony service is invoked. Registration service may be provided on behalf of dial-up data network telephony subscribers in association with a network access server.