Abstract:
A distributed computer system is disclosed and includes a plurality of identity provider servers and a plurality of service provider servers coupled to a data network. Further, an identity provider locator server is coupled to the data network. In response to a request from one of the plurality of service provider servers, the identity provider locator server can provide an identifier of at least one of the plurality of identity provider servers. The identity provider locator server can include a memory that stores a list of active identity provider servers for a particular end-user having access to the data network. Further, one or more of the plurality of identity provider servers is able to add or remove itself from the list of active identity provider servers.
Abstract:
Call logs are generated based upon calls from a subscriber line and calls to a subscriber line. The call logs are formatted from Generic Data Interface (GDI) messages into an email format (e.g., SMTP) within a call log gateway. The formatted email is then emailed to an email recipient, which can include a messaging service provider or the subscriber himself. The email address to the recipient is determined by the call log gateway based upon the subscriber's identity.
Abstract:
Customer communications can be controlled in accordance with customized rules. An entry menu includes options to modify an existing rule or create a new rule for controlling customer communications. An initial selection criteria menu includes options to indicate whether the new customized rule will be built using a preexisting template or starting from initial blank rule criteria. A list of preexisting templates for creating new customized rules can be provided, and input to populate a selected template can be accepted. Initial blank rule criteria for creating new customized rules can also be provided, including initial criteria and rule conditions for selected initial criteria. Communications are processed in accordance with the stored new customized rule.
Abstract:
Customer communications can be controlled in accordance with customized rules. An entry menu includes options to modify an existing rule or create a new rule for controlling customer communications. An initial selection criteria menu includes options to indicate whether the new customized rule will be built using a preexisting template or starting from initial blank rule criteria. A list of preexisting templates for creating new customized rules can be provided, and input to populate a selected template can be accepted. Initial blank rule criteria for creating new customized rules can also be provided, including initial criteria and rule conditions for selected initial criteria. Communications are processed in accordance with the stored new customized rule.
Abstract:
The invention provides a system and a method display incoming and outgoing call log data associated with telephone calls to and from a plurality of subscriber telephone numbers from one or more telephone networks. The system includes a switch in one network that receives a telephone call from the subscriber's telephone and launches a query in response to an AIN trigger to a service control point. In response, the service control point forwards associated call data to a call log gateway that translates the message into an asynchronous message containing call log data. The call log gateway forwards the asynchronous message to a unified communication platform where it is placed in subscriber mailbox and made available as a call log to a subscriber via a graphic user interface over the internet. A web server retrieves the call log and displays it to the subscriber at a web client.
Abstract:
A system daemon starts through normal system startup procedures and reads its configuration file to determine which data entities (e.g., directories and files) are to be monitored. The monitoring includes a valid MD5 signature, correct permissions, ownership of the file, and an existence of the file. If any modification are made to the data entities, then the system daemon generates an alarm (intended for the administrator of the host) that an intrusion has taken place. Once an intrusion is detected, then the isolating steps or commands are issued in a real-time continuous manner to protect the host system from attack or intrusion.
Abstract:
A method and system for associating a switched virtual circuit (SVC) connection request from an access port in an asynchronous transfer mode (ATM) network to a subscriber and optionally registering an address of the access port in relation to the subscriber. The method and system include receiving a signaling protocol message requesting the SVC connection from the access port, determining whether the signaling protocol message contains subscriber authentication data and, when authenticated, establishing the SVC connection. Furthermore, the SVC connection may be established only if service policies corresponding to the subscriber retrieved from a database indicate that the subscriber is entitled to make SVC connections. The method and system further include registering an address of the access port in the ATM network by substituting the address of the access port for an original subscriber address.
Abstract:
Methods and apparatus for maintaining connectivity with an Internet protocol (IP) phone operating behind a firewall are disclosed. An example method disclosed herein comprises registering the IP phone in response to receiving a first registration request from the IP phone, the first registration request including first registration information, the first registration information including a first public IP address associated with the firewall, storing the first registration information, reregistering the IP phone in response to receiving a second registration request from the IP phone, the second registration request including second registration information, the second registration information including a second public IP address associated with the firewall, the second public IP address different from the first public IP address, and reverting to the stored first registration information to process calls associated with the IP phone.
Abstract:
An automobile's maintenance port is wirelessly connected (for example, via an IEEE 802.11-based connection) to a plurality of gateways/routers that forward automobile diagnostic data (such as a series of diagnostic codes) to a network analyzer server. The network analyzer server offers subscribers a service providing analysis of the received diagnostic data, wherein such analyzed information is transmitted to one or more predetermined locations (such as to a personal computer of the subscriber or a mechanic's diagnostic device at a service station). Thus, homeowners and garages receive the same data and the system eliminates the need for garages to purchase expensive engine analyzers.
Abstract:
Methods and apparatus for maintaining connectivity with an Internet protocol (IP) phone operating behind a firewall are disclosed. An example method disclosed herein comprises registering the IP phone in response to receiving a first registration request from the IP phone, the first registration request including first registration information, the first registration information including a first public IP address associated with the firewall, storing the first registration information, reregistering the IP phone in response to receiving a second registration request from the IP phone, the second registration request including second registration information, the second registration information including a second public IP address associated with the firewall, the second public IP address different from the first public IP address, and reverting to the stored first registration information to process calls associated with the IP phone.