摘要:
Embodiments are disclosed for a quantum key distribution (QKD) enabled intra-datacenter network. An example system includes a first QKD device and a second QKD device. The first QKD device includes a first quantum-enabled port and a first network port. The second QKD device includes a second quantum-enabled port and a second network port. The first quantum-enabled port of the first QKD device is communicatively coupled to the second quantum-enabled port of the second QKD device via a QKD link associated with quantum communication. Furthermore, the first network port of the first QKD device is communicatively coupled to a first network switch via a first classical link associated with classical network communication. The second network port of the second QKD device is communicatively coupled to a second network switch via a second classical link associated with classical network communication.
摘要:
Embodiments are disclosed for a quantum key distribution (QKD) enabled intra-datacenter network. An example system includes a first QKD device and a second QKD device. The first QKD device includes a first quantum-enabled port and a first network port. The second QKD device includes a second quantum-enabled port and a second network port. The first quantum-enabled port of the first QKD device is communicatively coupled to the second quantum-enabled port of the second QKD device via a QKD link associated with quantum communication. Furthermore, the first network port of the first QKD device is communicatively coupled to a first network switch via a first classical link associated with classical network communication. The second network port of the second QKD device is communicatively coupled to a second network switch via a second classical link associated with classical network communication.
摘要:
A receiver node receives, over a communication fabric, a transaction packet that includes an identifier of a sender node and an identifier of a process at the sender node, the transaction packet sent by the process for a transaction. The receiver node performs authentication for the transaction based on the identifier of the process and the identifier of the sender node.
摘要:
A system for associating an action of a user with a message corresponding to the action, where the message is visually displayed on a series of sequentially disposed discrete mats. The message is uttered by the user and the message is verified using a speech analyzer. The system includes at least two mats, each mat having a display, a transmitter, a receiver, and a presence sensor indicating the presence of the user and configured to indicate the intention of the user to add an answer to a composite answer. The system also includes an audio receiver that receives an audio input from the user and an indicator device that indicates whether the mat is a head mat.
摘要:
A system, method, and device for use in videoconferencing. The method typically includes installing a videoconferencing services switch at an access point to an IP network, and registering a plurality of subscribers for videoconferencing services. Each subscriber typically has a plurality of endpoints. The method further includes receiving subscriber-specific settings to be applied to multiple videoconferencing calls from the plurality of endpoints associated with each subscriber. The method further includes storing the subscriber-specific settings at a location accessible to the switch, and configuring the switch to connect calls from the plurality of endpoints at each subscriber based on the corresponding subscriber-specific settings.
摘要:
Methods, systems, and computer program products for providing Internet protocol multimedia subsystem (IMS) registration service to a non-IMS subscriber terminal are disclosed. According to one method, activity involving a non-IMS subscriber terminal is identified. In response to identifying the activity involving the non-IMS subscriber terminal, an IMS network registration operation is performed on behalf of the non-IMS subscriber terminal.
摘要:
Various example embodiments are described. According to one example, a method may include maintaining a database of a plurality of direct inward dial telephone numbers, including a subset of the direct inward dial telephone numbers which are available for assignment; receiving, through a website, an application from a customer for an alias telephone number to be associated with a customer telephone number; processing the application, the processing including assigning to the customer an alias telephone number selected from the subset of available telephone numbers which are available for assignment and associating the alias number with the customer telephone number; and receiving a telephone call from a third party to the alias telephone number and routing the telephone call from the alias telephone number to the customer telephone number.
摘要:
Systems for monitoring, storage, and analysis of information in signaling messages, communicated from originating networks to a destination network through one or more intermediate networks are described. Correlation and comparison between signaling messages of interest sent from an origination network to signaling messages received by the destination network allows for the detection of inconsistent information, e.g., information fields in a communicated message that have been altered, either intentionally or unintentionally, by an intermediate carrier. The introduction of an additional communications path over which notification messages are forwarded from signaling monitoring equipment in the origination network to signaling monitoring equipment in the destination network allows for a significant reduction in the memory storage requirements at the destination network and in the amount of processing required to match, compare, and evaluate signaling messages. In addition, the reduction in stored messages and processing time allows the monitoring system to operate in near-real time allowing for fraud detection while a call is still in progress.
摘要:
Methods, systems, and computer program products for providing telecommunication services between a SIP network and an SS7 network are disclosed. In one method, SIP/SS7 gateway receives an INVITE message from a SIP proxy server. The SIP/SS7 gateway extracts a called party number from the INVITE message and determines whether a telecommunications service is required and a type of service required for the INVITE message based on the called party number. The SIP/SS7 gateway then formulates an SS7 query to a database corresponding to the identified service type. The SIP/SS7 gateway receives a response from the database and uses data from the response to facilitate completion of the call. In one example, the SIP/SS7 gateway may forward a routing number extracted from the response back to the originating SIP proxy server. In another example, the SIP/SS7 gateway may generate a new INVITE message and forward the new INVITE message to a terminating SIP proxy server. In yet another example, the SIP/SS7 gateway may formulate a second query to the same database or to a different database to obtain further information for facilitate completion of the call.
摘要:
Call Control entities in a network communicate between themselves by amending call processing messages to include encrypted network information. As such, a call may be established whose path through the network is dependent on the paths of other calls. Information of a scope larger than a Call Controller normally possesses can, as a result of this communication, be made available to Call Controllers for constraining call establishment. This information could relate to other calls and connections associated with those other calls. The information may also relate to gateways in and to adjacent networks and the Call Controllers in the adjacent networks that are related to the current Call Controller.