摘要:
Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.
摘要:
Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.
摘要:
Service invocation information including call routing, reasons for redirections, and similar information are provided to party requesting a communication session and recipients of an enhanced communication system along the call routing path as the request is routed. Some of the information is filtered based on system and/or user defined rules, user permission levels, and comparable aspects.
摘要:
A health monitoring technique monitors the health and performance of applications executing in a guest partition in a virtualized environment. In an embodiment, a guest integration component interacts with an application through an application programming interface in order for the virtualization platform to monitor the health and performance of the application. In another embodiment, the guest integration component may include a monitoring agent that accesses an event log and/or a performance monitor log to access the health and performance of the application. The health and performance of the application may then be analyzed by the virtualization platform to determine an appropriate remedial action.
摘要:
Modality selection in establishing multimodal conversations is performed automatically based on contextual information in enhanced communication platforms. Automata in client machines determine how a client machine chooses one or more modalities of a conversation invite based on contextual information such as computing device environment, network environment, user presence state, and comparable factors. Executed automata automatically join the user to a selected modality of a conversation or reject one.
摘要:
Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.
摘要:
Safe parking and retrieval of multimodal conversations is enabled through a park server generating a token and encoding it in an address identifier associated with a parking slot. A client application can display the address identifier with the token as a link in a text-based message or in conversation history items. The identifier encoded link may ensure that the intended call can be retrieved from a given parking slot without being confused with another parked call. If another call is parked at the same orbit, the encoded token does not match, and the park server may reject the retrieval attempt with an error message.
摘要:
The entry and transmission of notes to recipients along the conversation chain. Notes can be created based on an incoming caller. The notes can be transmitted to the conversation recipient for viewing before, during, and after the recipient accepts the conversation. This is facilitated by a communications client that operates to allow entry of the notes, and forwarding of the call recipient via a SIP framework. Moreover, notes previously taken and/or information provided manually and/or automatically by the communications system can be provided to an agent (e.g., ACD, receptionist) receiving the conversation, at any point in the conversation chain for quick identification not only of the conversation source but of previous information already collected.
摘要:
A security system that allows an outbound security policy for the connection security to be automatically derived from an inbound security policy for connection security is provided. The security system for an inbound security policy has security suites that each specify one or more security algorithms. Because the security system offers an outbound security suite that matches an inbound security suite, the computing devices that have the same inbound security policy have matching inbound and outbound security suites.
摘要:
The entry and transmission of notes to recipients along the conversation chain. Notes can be created based on an incoming caller. The notes can be transmitted to the conversation recipient for viewing before, during, and after the recipient accepts the conversation. This is facilitated by a communications client that operates to allow entry of the notes, and forwarding of the call recipient via a SIP framework. Moreover, notes previously taken and/or information provided manually and/or automatically by the communications system can be provided to an agent (e.g., ACD, receptionist) receiving the conversation, at any point in the conversation chain for quick identification not only of the conversation source but of previous information already collected.