Abstract:
In one embodiment, an apparatus may verify an identity of a destination Voice-over-lnternet-Protocol (VoIP) call agent for a destination telephone number based on demonstrated knowledge of at least one public switched telephone network (PSTN) call initiated to the destination telephone number. The apparatus may also receive the identity of the destination VoIP call agent based on the demonstrated knowledge of the at least one PSTN call initiated to the destination telephone number.
Abstract:
In an embodiment, a care-of address associated with a first node coupled to a communications network via an access node is received. The care-of-address may be contained in a notification message sent by a home agent associated with the first node or by a binding update message sent by the first agent. The access node is identified using the care-of address. A request to tap communications associated with the first node at the access node is generated and the request is forwarded to the access node to cause communications associated with the first node to be tapped at the access node.
Abstract:
The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).
Abstract:
Verfahren zum Abwehren von ungewünschten Telefonanrufen (SPIT, SPAM over VoIP), wobei einem Anrufer eines Telefonanrufs eine vorübergehende Nichtbereitschaf t zur Anrufannahme des Angerufenen signalisiert wird, falls eine Anruferidentifikation (AID) des Anrufers dem Angerufenen unbekannt ist. Merkmal ist bekannt als "graylist / greylist f ilter".
Abstract:
A peering authority or settlement clearinghouse (Fig. 2A, 300) can be used to control access, collect session accounting information and provide financial settlement of interconnect or session fees among anonymous Internet Protocol (IP) peers (120, 230) or networks. The addition of peering policy criteria, such as price and quality of service, to peer to peer route discovery mechanisms enable a trusted intermediary, such as the settlement clearinghouse (300), to authorize acceptable interconnection or peeing sessions between anonymous IP peers (120, 230). Any financial settlement transactions which result from the peering sessions may be subsequently executed by the settlement clearinghouse (300).
Abstract:
The present invention is a method to provide maximum security to transactions and communications made on a digital network with a device comprising a card reader. The device is made of a microphone, a speaker, a dialing device, electronics circuitry, digital ports to facilitate communication with digital networks and a card reader.
Abstract:
Gegenstand der Erfindung sind ein Verfahren und eine Anordnung sowie Vorrichtungen zur Kommunikationssteuerung in einem Kommunikationsnetzwerk, demgemäß teilnehmerspezifische Daten (D) eines von einem anrufenden Teilnehmer (A) zwecks des Aufbaus einer Kommunikationsverbindung (C) angerufenen Teilnehmers (B) in einer dem anrufenden Teilnehmer (A) zugeordneten Liste (WL) zur Verwaltung teilnehmerspezifischer Daten (D) vertrauenswürdiger Teilnehmer gespeichert werden. Dabei werden die teilnehmerspezifischen Daten (D) bezüglich des angerufenen Teilnehmers (B) automatisch in der Liste (WL) gespeichert.
Abstract:
Verfahren zur Bereitstellung eines Internet- Sprachübermittlungsdienstes (VoIP-Dienst) für einen Kommunikationsteilnehmer, dem ein Zugangsendgerät (3) und eine daran angeschlossene Fernsprechendeinrichtung (1) zugeordnet ist, wobei das Zugangsendgerät (3) über einen Kommunikationskanal (5) mit einem Netzzugangserver (4) verbunden ist und durch ein MGCP- basiertes Steuerungsprotokoll aus einem paketvermittelten Kommunikationsnetz (15) heraus gesteuert wird, mit folgenden Schritten: Herstellen einer Breitband-Verbindung auf dem Kommunikationskanal (5) zwischen dem Zugangsendgerät (3) und einem Netzzugangsserver (BRAS) (4), wobei während des Aufbaus der Breitband-Verbindung eine Identifizierungsinformation von dem Zugangsendgerät (3) an den Netzzugangserver (4) übermittelt wird; Authentifizieren des Zugangsendgerätes (3) durch den Netzzugangsserver (4) durch Auswerten der zuvor übermittelten Identifizierungsinformation.
Abstract:
Method and adapter apparatus(200,250) for securing information exchanged between a calling party(102) and a called party(14). A first signal is generated, which is representative of an analog probe signal. The first signal is released towards the called party(14). Responsive to receipt from the called party of a second signal responsive to the analog probe signal and indicative of an ability of the called party to participate in a secure information exchange, negotiations are performed with the called party to securely exchange subsequent information with the called party. In this way, the adapter apparatus (200,250) can securely exchange information without prior knowledge of whether the called party is secure-capable or secure-incapable and without prior knowledge of whether the called party is a POTS phone or a packet-switched device.
Abstract:
A system, method, and apparatus for managing data transfers between a secure location and a less secure location based on data transfer settings established by an administrator and according to security related aspects and business policy requirements are presented. A data transfer checker apparatus stored and operating on a wireless mobile device retrieves data transfer settings to determine if requested data to be transferred from a first location to a second location is to be performed.