摘要:
A communications services network platform has a multi-layered software architecture residing on a host computer. The network platform connects to a communications network and includes a call processing stack, a link layer, and a service support subsystem. The call processing stack implements call processing by processing events associated with a communication path through the communications network and has an application layer, representing each active call being processed by the call processing stack, and a resource layer, including software abstractions of physical resources located outside the host computer. The link layer manages a communications link between physically connected physical resources and the call processing stack. The service support subsystem executes services requested by the call processing stack. The platform manages and controls communications events associated with the communication path to complete a request for services between nodes on the communication network.
摘要:
A host computer system having at least one network interface interfaced with a computer network is operated in a multi-user mode. An intrusion event is detected using a system daemon. In response to detecting the intrusion event, the at least one network interface is isolated from the computer network and the host computer system taken down to a single user state so that access to the host computer system is limited to physical access at the host computer system.
摘要:
A system daemon starts through normal system startup procedures and reads its configuration file to determine which data entities (e.g., directories and files) are to be monitored. The monitoring includes a valid MD5 signature, correct permissions, ownership of the file, and an existence of the file. If any modification are made to the data entities, then the system daemon generates an alarm (intended for the administrator of the host) that an intrusion has taken place. Once an intrusion is detected, then the isolating steps or commands are issued in a real-time continuous manner to protect the host system from attack or intrusion.
摘要:
The present invention provides a method and apparatus for a shared line Find-Me-Follow-Me (FMFM) voicemail application. Each person sharing a telephone number is provided a sub mailbox with FMFM contact numbers individually configured for each user sub mailbox. The invention further provides a method and apparatus for dynamic out dial determination that removes numbers from the FMFM contact number list that match numbers in the inbound call path to avoid looping. The present invention further provides a method and apparatus for FMFM call path duplication of the inbound call path onto the out dial call information to provide caller identification for the original calling party after the call is forwarded or processed using FMFM.
摘要:
A method is provided for customizing a call control rule by a subscriber at a graphical user interface. The method includes providing a first display, including multiple conditions relating to identifying calls involving the at least one telephone number, and receiving a first selection of at least one identifying condition. The method further includes providing a second display, including multiple call dispositions relating to processing the calls based on the at least one selected condition, and receiving a second selection of at least one call disposition. The identifying condition and the call disposition are stored as the call control rule in association with the telephone number, and calls involving the telephone number are processed in accordance with the stored call control rule. The method may also include providing a third display describing the call control rule contemporaneously with receiving the first and second selections.
摘要:
In one embodiment according to the invention, there is disclosed a method for implementing call controls in a telephony network. The method comprises processing a call log of actual calls for an individual end user of the telephony network to identify applicability, for each call of the call log, of each rule of a set of call control rules; and providing a display of a call disposition that would occur for at least one call in the call log, assuming implementation of the set of call control rules. Another embodiment according to the invention comprises providing a call log of calls for an individual end user of the telephony network; and providing a display of a call control rule applied to a call of the call log. The display of the call control rule comprises an identification of one or more criteria that triggered application of the call control rule, and a disposition of the call as a result of the call control rule.
摘要:
A subscriber is provided with personal caller identification information when a telephone call is placed to the subscriber. In particular, a network service platform is supplied with a calling party number. A network caller ID database is queried using the calling party number to retrieve network caller ID information. A central personal address book is queried, using the calling party number, to retrieve personal caller identification information associated with the calling party number. Then the network element forwards the network caller identification information supplemented with the personal caller identification information to the subscriber when connecting the telephone call to the subscriber.
摘要:
A method for processing Ethernet data and may include receiving Ethernet data via at least one Ethernet physical interface transceiver (PHY) integrated within a single Ethernet IP telephone chip. At least one secure application key may be received from a secure server by an on-chip security module (OSM) integrated within the Ethernet IP telephone chip for processing the received Ethernet data. The Ethernet IP telephone chip may be authenticated prior to the processing of the received Ethernet data using a security processor integrated within the OSM. The received Ethernet data may be processed by the Ethernet IP telephone chip based on the received at least one secure application key. The at least one secure application key may be communicated only from the secure server to the Ethernet IP telephone chip. The received Ethernet data may include one or both of video data and/or voice data.
摘要:
A method for processing Ethernet data and may include receiving Ethernet data via at least one Ethernet physical interface transceiver (PHY) integrated within a single Ethernet IP telephone chip. At least one secure application key may be received from a secure server by an on-chip security module (OSM) integrated within the Ethernet IP telephone chip for processing the received Ethernet data. The Ethernet IP telephone chip may be authenticated prior to the processing of the received Ethernet data using a security processor integrated within the OSM. The received Ethernet data may be processed by the Ethernet IP telephone chip based on the received at least one secure application key. The at least one secure application key may be communicated only from the secure server to the Ethernet IP telephone chip. The received Ethernet data may include one or both of video data and/or voice data.
摘要:
A system and method are provided for reviewing and updating a subscriber's telecommunications services using a graphical user interface via multiple data networks. A data message is received at an intelligent peripheral from the graphical user interface via at least one of the data networks. The data message indicates a subscriber's desired update to a selected service. The data message is converted into a protocol compatible with a service control point. The converted data message is identical to a data message that the intelligent peripheral would create if the subscriber had entered the desired update via an interactive voice response system. The converted data message is transmitted to the service control point, which updates the service in accordance with the subscriber's update. Thus, the service is updated substantially contemporaneously with the request. Moreover, the subscriber retains the ability to update and review service data via the interactive voice response.