-
公开(公告)号:CA2486435A1
公开(公告)日:2003-12-24
申请号:CA2486435
申请日:2003-06-03
Applicant: IBM
Inventor: CREAMER THOMAS , WINTERS SCOTT LEE , MOORE VICTOR , WALTERS GLEN ROBERT
Abstract: A voice browser (125) configured to process voice markup language documents can include a telephony application (135) and an integrated communications interface (130) for interacting with a voice processing system (100). The voice browser can be configured to load the telephony application independently of a received telephone call. The integrated communications interface can include at least one of an integrated transaction capabilities application part (TCAP) component for receiving a transaction capabilities application part query and an integrated ISUP component for receiving a telephony control signal.
-
公开(公告)号:PL332828A1
公开(公告)日:1999-10-11
申请号:PL33282897
申请日:1997-10-02
Applicant: IBM
Inventor: JADE PRASHANTH , MOORE VICTOR STUART , RAO ARUN MOHAN , WALTERS GLEN ROBERT
Abstract: A firewall isolates computer and network resources inside the firewall from networks, computers and computer applications outside the firewall. Typically, the inside resources could be privately owned databases and local area networks (LAN's), and outside objects could include individuals and computer applications operating through public communication networks such as the Internet. Usually, a firewall allows for an inside user or object to originate connection to an outside object or network, but does not allow for connections to be generated in the reverse direction; i.e. from outside in. The disclosed invention provides a special "tunneling" mechanism, operating on both sides of a firewall, for establishing such "outside in" connections when they are requested by certain "trusted" individuals or objects or applications outside the firewall. The intent here is to minimize the resources required for establishing "tunneled" connections (connections through the firewall that are effectively requested from outside), while also minimizing the security risk involved in permitting such connections to be made at all. The mechanism includes special tunneling applications, running on interface servers inside and outside the firewall, and a special table of "trusted sockets" created and maintained by the inside tunneling application. Entries in the trusted sockets table define objects inside the firewall consisting of special inside ports, a telecommunication protocol to be used at each port, and a host object associated with each port. Each entry is "trusted" in the sense that it is supposedly known only by individuals authorized to have "tunneling" access through the firewall from outside.
-
公开(公告)号:CZ138799A3
公开(公告)日:1999-08-11
申请号:CZ138799
申请日:1997-10-02
Applicant: IBM
Inventor: JADE PRASHANTH , MOORE VICTOR STUART , RAO ARUN MOHAN , WALTERS GLEN ROBERT
Abstract: A firewall isolates computer and network resources inside the firewall from networks, computers and computer applications outside the firewall. Typically, the inside resources could be privately owned databases and local area networks (LAN's), and outside objects could include individuals and computer applications operating through public communication networks such as the Internet. Usually, a firewall allows for an inside user or object to originate connection to an outside object or network, but does not allow for connections to be generated in the reverse direction; i.e. from outside in. The disclosed invention provides a special "tunneling" mechanism, operating on both sides of a firewall, for establishing such "outside in" connections when they are requested by certain "trusted" individuals or objects or applications outside the firewall. The intent here is to minimize the resources required for establishing "tunneled" connections (connections through the firewall that are effectively requested from outside), while also minimizing the security risk involved in permitting such connections to be made at all. The mechanism includes special tunneling applications, running on interface servers inside and outside the firewall, and a special table of "trusted sockets" created and maintained by the inside tunneling application. Entries in the trusted sockets table define objects inside the firewall consisting of special inside ports, a telecommunication protocol to be used at each port, and a host object associated with each port. Each entry is "trusted" in the sense that it is supposedly known only by individuals authorized to have "tunneling" access through the firewall from outside.
-
-