摘要:
A method for granting access to secure information includes receiving from a caller a call for connection with one of a plurality of agents, distributing the call to the agent of the plurality of agents, initiating an active communication session between the caller and the agent for handling the call, and granting to the agent access to the secure caller information using a plurality of access authentication information that includes an active communication session between the caller and the agent.
摘要:
A method for providing a conference service includes hosting a conference between a plurality of endpoints and communicating at least one media stream received from at least one of the plurality of endpoints to the remaining plurality of endpoints. The method also includes receiving a request to block communication of the at least one media stream to a first endpoint of the plurality of endpoints and blocking communication of the at least one media stream to the first endpoint.
摘要:
Disclosed are apparatus and techniques for escalating an instant messaging (IM) session between two or more users to an audio session so that a communication device (by one or more users) that will optimize the audio session is selectively and intelligently utilized. In one embodiment, if an IP (Internet Protocol) phone is connected to the computer on which an IM session is being escalated, the IP telephone may be used instead of the computer device's own soft telephone so as to maximize audio clarity and quality. In another embodiment, a user's cell phone may be utilized for a mobile user who is using a laptop that is not coupled to an IP telephone or who is communicating from a hotel room in which a telephone call is typically more expensive than a cell phone call. Numerous embodiments for optimizing such audio sessions are described herein.
摘要:
In one embodiment, a method for presence-based management in a communication network includes, using IM, discovering one or more network devices in a communication network. The network devices couple two or more endpoints to each other and enable communication between a first one of the endpoints and one or more second ones of the endpoints. The method also includes, using IM, obtaining presence information on the discovered network devices from the discovered network devices and, using the presence information on the discovered network devices from the discovered network devices, maintaining presence data associated with the discovered network devices.
摘要:
A method for providing a conference service using speaker selection includes hosting a conference between a plurality of endpoints and receiving from the plurality of endpoints a plurality of media streams. The plurality of media streams each include a power indicator. The method includes normalizing the power indicators to determine a normalized power indicator for each of the plurality of media streams and selecting, based on the normalized power indicators of the plurality of media streams, a first number of the plurality of media streams for processing into a conference stream. The method also includes processing the selected first number of the plurality of media streams into the conference stream and communicating the conference stream to at least some of the plurality of endpoints.
摘要:
A method for retrieving data in a data source is provided. The method includes receiving a search term; identifying an active tag associated with the search term; correlating the active tag to dynamic data that is operative to adapt to a mining context in which data is stored; and retrieving the data using the dynamic data.
摘要:
A method for retrieving data in a data source is provided. The method includes receiving a search term; identifying an active tag associated with the search term; correlating the active tag to dynamic data that is operative to adapt to a mining context in which data is stored; and retrieving the data using the dynamic data.
摘要:
An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify certain fields in the message after a signature is inserted. The originating endpoint's agent may create the signature over some fields of the message using an enterprise network's private key. The agent may insert the signature into the message and send the message to a recipient endpoint's authentication agent. The recipient agent may verify the signature, receive a certificate including a second public key, and challenge the identity of the originating endpoint in order to confirm that identity. This challenge may request a confirmation that the originating endpoint knows the private key corresponding to the second public key and may occur while running encrypted media at the endpoints. After the originating endpoint is authenticated, the endpoints may exchange encrypted and/or unencrypted media.
摘要:
A system may provide trust relationship information for a telephone number, where the trust relationship information may indicate whether one or more nodes consider a target node as including or as being associated with a VoIP call agent for the telephone number based on demonstrated knowledge of a PSTN call. The system may determine a target trust relationship to the target node based on the trust relationship information, where the target trust relationship indicates a level of trust a validating node has in the target node being associated with or including the VoIP call agent for the telephone number, and where validating node and the one or more nodes may be in different respective administrative domains of a network.
摘要:
A method for establishing a communication session between two endpoints that do not both support secure media includes receiving a registration from a first endpoint. The registration indicating the first endpoint supports secure media and non-secure media. The method also includes receiving a registration from a second endpoint. The registration indicating the second endpoint supports non-secure media. The method also includes receiving a request to establish a communication session between the first endpoint and the second endpoint using secure media. The method further includes establishing the communication session between the first endpoint and the second endpoint via the communications platform using non-secure media.