摘要:
Customer communications can be controlled in accordance with customized rules. An entry menu includes options to modify an existing rule or create a new rule for controlling customer communications. An initial selection criteria menu includes options to indicate whether the new customized rule will be built using a preexisting template or starting from initial blank rule criteria. A list of preexisting templates for creating new customized rules can be provided, and input to populate a selected template can be accepted. Initial blank rule criteria for creating new customized rules can also be provided, including initial criteria and rule conditions for selected initial criteria. Communications are processed in accordance with the stored new customized rule.
摘要:
Customer communications can be controlled in accordance with customized rules. An entry menu includes options to modify an existing rule or create a new rule for controlling customer communications. An initial selection criteria menu includes options to indicate whether the new customized rule will be built using a preexisting template or starting from initial blank rule criteria. A list of preexisting templates for creating new customized rules can be provided, and input to populate a selected template can be accepted. Initial blank rule criteria for creating new customized rules can also be provided, including initial criteria and rule conditions for selected initial criteria. Communications are processed in accordance with the stored new customized rule.
摘要:
A distributed computer system is disclosed and includes a plurality of identity provider servers and a plurality of service provider servers coupled to a data network. Further, an identity provider locator server is coupled to the data network. In response to a request from one of the plurality of service provider servers, the identity provider locator server can provide an identifier of at least one of the plurality of identity provider servers. The identity provider locator server can include a memory that stores a list of active identity provider servers for a particular end-user having access to the data network. Further, one or more of the plurality of identity provider servers is able to add or remove itself from the list of active identity provider servers.
摘要:
Call logs are generated based upon calls from a subscriber line and calls to a subscriber line. The call logs are formatted from Generic Data Interface (GDI) messages into an email format (e.g., SMTP) within a call log gateway. The formatted email is then emailed to an email recipient, which can include a messaging service provider or the subscriber himself. The email address to the recipient is determined by the call log gateway based upon the subscriber's identity.
摘要:
The invention provides a system and a method display incoming and outgoing call log data associated with telephone calls to and from a plurality of subscriber telephone numbers from one or more telephone networks. The system includes a switch in one network that receives a telephone call from the subscriber's telephone and launches a query in response to an AIN trigger to a service control point. In response, the service control point forwards associated call data to a call log gateway that translates the message into an asynchronous message containing call log data. The call log gateway forwards the asynchronous message to a unified communication platform where it is placed in subscriber mailbox and made available as a call log to a subscriber via a graphic user interface over the internet. A web server retrieves the call log and displays it to the subscriber at a web client.
摘要:
A flexible network platform and call processing system are disclosed. The call processing system includes a particular call processing architecture and a resource managing system which allow new services to be implemented rapidly. An OAM&P subsystem and systems for performing data provisioning and service creation are each provided for use with the disclosed call processing system. The call processing system may include a call processing mechanism for performing call processing in accordance with defined service logic, and call processing resources connected to the call processing mechanism. The call processing resources are designed so that any service logic unit may be linked to any particular event that might occur in connection with the call processing system. A resource managing system is also disclosed for assigning resources for use by a call processing system. A resource is assigned in response to a request made by the call processing system specified capability. The resource managing system receives the request for a specified capability and allocates a logical resource object that identifies a particular resource that will support the specified resource capability.
摘要:
A communications services network platform has a multi-layered software architecture residing on a host computer. The network platform connects to a communications network and includes a call processing stack, a link layer, and a service support subsystem. The call processing stack implements call processing by processing events associated with a communication path through the communications network and has an application layer, representing each active call being processed by the call processing stack, and a resource layer, including software abstractions of physical resources located outside the host computer. The link layer manages a communications link between physically connected physical resources and the call processing stack. The service support subsystem executes services requested by the call processing stack. The platform manages and controls communications events associated with the communication path to complete a request for services between nodes on the communication network.
摘要:
A system daemon starts through normal system startup procedures and reads its configuration file to determine which data entities (e.g., directories and files) are to be monitored. The monitoring includes a valid MD5 signature, correct permissions, ownership of the file, and an existence of the file. If any modification are made to the data entities, then the system daemon generates an alarm (intended for the administrator of the host) that an intrusion has taken place. Once an intrusion is detected, then the isolating steps or commands are issued in a real-time continuous manner to protect the host system from attack or intrusion.
摘要:
A method and system for associating a switched virtual circuit (SVC) connection request from an access port in an asynchronous transfer mode (ATM) network to a subscriber and optionally registering an address of the access port in relation to the subscriber. The method and system include receiving a signaling protocol message requesting the SVC connection from the access port, determining whether the signaling protocol message contains subscriber authentication data and, when authenticated, establishing the SVC connection. Furthermore, the SVC connection may be established only if service policies corresponding to the subscriber retrieved from a database indicate that the subscriber is entitled to make SVC connections. The method and system further include registering an address of the access port in the ATM network by substituting the address of the access port for an original subscriber address.
摘要:
Methods and apparatus for maintaining connectivity with an Internet protocol (IP) phone operating behind a firewall are disclosed. An example method disclosed herein comprises registering the IP phone in response to receiving a first registration request from the IP phone, the first registration request including first registration information, the first registration information including a first public IP address associated with the firewall, storing the first registration information, reregistering the IP phone in response to receiving a second registration request from the IP phone, the second registration request including second registration information, the second registration information including a second public IP address associated with the firewall, the second public IP address different from the first public IP address, and reverting to the stored first registration information to process calls associated with the IP phone.