摘要:
The called party can temporarily defer answering a call simply by pressing a button on the station set. When the button is pressed, the called party's station set sends a data message to the system's voice response unit directing the voice response to play a "please wait" message to the calling party rather than sending the calling party to the called party's voice mail. The voice response unit plays the "please wait" message to the calling party and sends a call park message to the switching system hosting the station set. The call park message to the switching system directs the switching system to park the call at a specific location as is known in the art and a corresponding call park message to the station set transmits the location of the parked call to the station set. When the called party desires to answer the call, a message is sent from the station set to the switching system requesting that the call parked at the identified location be connected to the station set. The call can then be connected without the existing call being interrupted and the third party knowing of its existence.
摘要:
Techniques are disclosed for lawfully intercepting information in communication environments with end-to-end encryption. For example, a method for intercepting encrypted communications exchanged between a first computing device and a second computing device in a communication network, wherein the interception is performed by a third computing device in the communication network, comprises the following steps. The third computing device obtains one or more packets having a packet address associated with one of the first computing device and the second computing device. The one or more packets are obtained by the third computing device, in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the one or more obtained packets may be decrypted so as to obtain data contained therein. The third computing device preserves the packet address of the one or more obtained packets. The third computing device forwards the one or more packets toward a packet-destination one of the first computing device and the second computing device such that the packet-destination one of the first computing device and the second computing device is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
摘要:
A method of administering network selections for a mobile station between a second generation/third generation wireless network and wireless local area networks includes detecting when the mobile station encounters a wireless area network, and communicating an identity of the encountered wireless area network to the second generation/third generation wireless network. The communicating prompts a query for permission to establish a session between the mobile station and the encountered wireless local area network. When permission is granted, the method includes receiving a key distributed to the mobile station. The key is used by the mobile station to establish a session between the mobile station and the encountered wireless local area network.
摘要:
A method and apparatus for identifying a caller who does not provide caller identification on an unanswered call. The caller is asked to record his/her name (or some other characteristic utterance). If the call is unanswered, the record is retained and can be accessed by the called party when that party requests his/her stored voice mail. Advantageously, even on unanswered calls, the identity of the caller can be presented to the called party when that called party requests stored voice mail messages, even if the calling party has private service.
摘要:
An audible confirmation system automatically and seamlessly outputs an audible name of a call recipient to a calling party. This audible confirmation system is preferably configured to audibly identify the call recipient to the calling party prior to the call recipient and the calling party communicating with each other. The audible confirmation system preferably includes a text to speech converter coupled to an intelligent network architecture having at least one calling name database. The audible confirmation system allows the calling party to audibly identify the call recipient to the calling party without any input from the call recipient and without using any special equipment such as a display screen by the calling party. The audible confirmation system is especially useful when the call recipient does not have voice mail service and is not available to receive a call. For example, by utilizing the audible confirmation system, the calling party is able to confirm the identity of the call recipient prior to leaving a confidential message for the call recipient by utilizing the calling party's voice mail delivery system for automatically delivering the confidential message to the call recipient.
摘要:
A billing system and method automatically charges a call to a predetermined telephone line wherein the call is placed by a calling part through a service. This service is any one or combination of a voice mail system, a call forwarding system, and the like. Preferably, this billing system and method also automatically charges the call to a predetermined telephone line even when the calling party places the call from a remote location. The billing system and method preferably includes a signal control point coupled to the calling party, the predetermined telephone line, and the service. Preferably, the signal control point is configured to implement the billing system and method such that the call placed by the calling party through the service is billed to the predetermined telephone line. A terminating attempt trigger within a switch associated with predetermined telephone line preferably directs this switch to record a duration of the call and a particular feature utilized for the call. As a result, this switch associated with the predetermined telephone line stores both the call duration and the particular feature associated with the call in a single record. Accordingly, the billing system and method does not need to perform additional steps or add further complexity to obtain both the call duration and the particular feature associated with the call. Further, the calling party is preferably capable of selecting the predetermined telephone line which serves as a telephone line to be billed.
摘要:
In a method and system for opportunistic delivery of less-than-best-effort application data, a WIN network identified the elements of the wireless network servicing a specified mobile client. One or more elements of the wireless network servicing the specified mobile client monitor the connection state of a mobile client and notify the WIN network of connection state changes so that a chatty application running on an external application server may be notified by the WIN network to deliver packet data when the specified mobile client is connected to the network for some other purpose or when unused network resources are available. In this way, network resource overload caused by chatty applications is reduced.
摘要:
A system and method for providing dynamic call disposition service to a wireless terminal that may be occupied or unoccupied. In response to a call to the wireless terminal in a voice domain, call disposition options are provided to the wireless terminal in a data domain. A call disposition action is then taken according to an option selection made at the wireless terminal as part of a cooperative effort between resources in the voice and data domains.
摘要:
A system and method for remote activation of customized telecommunication services are provided for data network telephony subscribers in a data network. In response to a call originator placing a call to a terminating telephony subscriber in the data network, a telephony server routes the call according to custom telecommunication service instructions provided in advance by the telephony subscriber and stored remotely from the telephony subscriber's point of presence on the data network. The call originator may be a data network telephony subscriber or a subscriber in the Public Switched Telephone Network (PSTN). The telephony server preferably performs the call routing based custom telecommunication service instructions (along with the subscriber's network address) retrieved from a subscriber profile server that maintains a subscriber profile database. A registration server may be provided to forward a data network address assigned to the telephony subscriber to the subscriber profile server when telephony service is invoked. Registration service may be provided on behalf of dial-up data network telephony subscribers in association with a network access server.
摘要:
A method for intercepting encrypted communications exchanged between first and second computing devices in a communication network, wherein interception is performed by a third computing device in the computing network. The third computing device obtains one or more packets having a packet address associated with one of the first and second computing devices in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the obtained packets may be decrypted to obtain data contained therein. The third computing device preserves the packet address of the obtained packets and forwards the obtained packets toward a packet-destination one of the first and second computing devices such that the packet-destination one of the first and second computing devices is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.