Abstract:
A method and apparatus for adaptive filter graphing in a communication system. The apparatus includes a memory (215) for storing a graphical representation and a communications protocol interface (205) for receiving a message, where the message includes data relating to the graphical representation stored in memory. At least one filter (215) is provided to determine if the data from the received message falls within a range of acceptable data. A multimedia software engine (230) updates the stored graphical representation with the data received in the message providing that the received data falls within the range of acceptable data. The apparatus further includes a display (225) for displaying the updated graphical representation.
Abstract:
A database (BNS 122) having input (from Fraud Control Center 120) that receives billing number that generate a fraud alert. The database (BNS 122) is configured to store billing numbers of a multiplicity of categories of billing products. Storage of billing numbers in the database is organized by at least one indicia of the billing product for the billing number.
Abstract:
An approach for providing network management of a submarine cable network. A line terminating equipment (103, 107) monitors a plurality of physical connections of the submarine cable network. A network management module receives selectively an alarm signal from the line terminating equipment or network management system and reconfigures the submarine cable network based upon the received alarm signal. According to one embodiment of the present invention, the submarine cable network is a dense wave division multiplexing (DWDM) system.
Abstract:
The present invention is a method and a system for authenticating electronic transactions a user-operated device such as a personal computer, and a commercial computer such as a web-site. The present invention features a voice browser and a session correlator (304). Typically, the voice browser is coupled to the user's telephone set via a telephonic connection (200). The voice browser is configured to receive and process user-spoken information from the telephone set. The session correlator (304) is coupled to the web-site. The session correlator (304) is configured to transmit an authentication message to the web-site if a user-spoken transaction identifier matches a computer transaction identifier, and if a user-spoken verification identifier matches a pre-registered voice print.
Abstract:
A method for communicating from an integration platform to a directory server includes receiving user-entered information at the integration platform (1140). The integration platform generates an event based on the user-entered information and publishes the event on a channel subscribed to by a connector associated with the directory server (1150). The connector receives the event information (1160), transforms the event information to a format compatible with the directory server (1170) and establishes communications with the directory server (1180). The connector downloads the information to the directory server and the directory server updates its database. The connector may also determine whether at least one other system received the event information before downloading the information to the directory server.
Abstract:
A system (100) establishes a telephone call between a calling party and a called party (160). The system (100) receives a telephone call connection request, including identification of the called party (120), from the calling party (110) and determines, based on the identification information, if the called party (120) is currently connected to a data network (150). If the called party (120) is currently connected to the data network (150), the system establishes the telephone call between the calling party (110) and an instant messaging client of the called party (120).
Abstract:
A network architecture includes a communication network that support one or more network-based Virtual Private networks (VPNS) (32a, 32b). The communication network includes a plurality of boundary routers (40a, 40b, 42a, 42b) that are connected by access links (35a, 35b) to CPE edge routers (34a, 34b) belonging to the one or more VPNs (32a, 32b). To prevent traffic from outside a customer's VPN (e.g., traffic from other VPNs or the Internet at large) from degrading the QoS provided to traffic from within the customer's VPN (32a, 32b), the present invention gives precedence to intra-VPN traffic over extra-VPN traffic on each customer's access link through access link prioritization or access link capacity allocation, such that extra-VPN traffic cannot interfere with inter-VPN traffic. By configuring the access networks (38a, 38b) the VPN boundary routers (40a, 40b, 42a, 42b) and CPE edge routers (42a, 42b), and the routing protocols of the edge and boundary routers, a high-level service of DoS (Denial of Service) attak prevention is achieved.
Abstract:
The present invention is directed to a method for managing transactions in a telecommunications network. The method includes creating an XML transaction detail file. At least one transaction detail record is stored in the XML transaction detail file in response to a telecommunications transaction. The at least one transaction detail record includes transaction data corresponding to the telecommunications transaction.
Abstract:
The present invention relates to a method for capturing call events (402) and other information in a platform independent way. The method includes generating call event records (404) in response to a SIP call events (402). A call event file (400) is created that includes all the call event records (404) collected by a server over a predetermined period of time. The call event file (400) is an XML document that includes generic, uniformly formatted records that can be read by any network device equipped with an XML parser. XML documents include embedded instructions that enable a receiving computer to decode the records without needing a special proprietary interface.
Abstract:
The present invention is directed to a method for placing a call between a client in one network and a client in another network. The IP network includes a SIP server and a network gateway configured to provide access to a public switched network. The method includes receving a SIP call request message from the first client (200). The SIP call request message is authenticated to identify an authentic originating client (204, 206). A database is searched to find a client billing tag corresponding to the authentic originating client (208, 212). The call is completed if the client billing tag is obtained (214 -218), and not completed if the client billing tag cannot be obtained (210). The invention provides an efficient method for billing phone calls that placed from SIP enabled devices to a telephone connected to the Public Switched Telephone Network (PSTN). The present invention also substantially eliminates certain types of fraud.