Verizon Business Network Services Inc. Patent applications |
Patent application number | Title | Published |
20140130130 | DYNAMIC RADIUS - A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the RADIUS server. The authentication request includes at least a user identifier and a device identifier. The RADIUS server determines an authentication format utilized by the network access server based on the received authentication request. The system may also determine an authorization level to provide with an authentication response. | 05-08-2014 |
20120265875 | NETWORK ELEMENT CONNECTION MANAGEMENT WITHIN A NETWORK MANAGEMENT SYSTEM - Preferred embodiments of the invention provide systems and methods to receive a logical command, the logical command being associated with a target identifier of a network element, determine connection parameters of the network element based on the target identifier, define a work flow based on the logical command, the work flow including a connection manager work unit, and execute the connection manager work unit to retrieve a connection from a connection pool based on the connection parameters. | 10-18-2012 |
20120134668 | METHOD AND SYSTEM FOR MEASURING LATENCY - A system and method for measuring latency of an optical transport network includes generating a time stamp, transmitting the time stamp in an optical transport network, and processing the time stamp to measure latency of the optical transport network. | 05-31-2012 |
20110208781 | DATA STRUCTURE VERSIONING FOR DATA MANAGEMENT SYSTEMS AND METHODS - In one of many possible implementations, an exemplary method comprises maintaining a baseline data structure comprising a plurality of baseline data records and a base set of relationships between the baseline data records, providing, for access by an external party, a customizable data structure comprising copies of the baseline data records and a customizable set of relationships between the copies of the baseline data records, fixing the base set of relationships in the baseline data structure to be unchangeable by the external party, and defining the customizable set of relationships in the customizable data structure to be changeable by the external party. Corresponding systems and methods are also disclosed. | 08-25-2011 |
20110138451 | METHOD AND SYSTEM FOR AN INTERCEPT CHAIN OF CUSTODY PROTOCOL - Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising securely negotiating a data collection interval time and protocol support for electronic data collection between network equipment associated with a data collecting party and network equipment associated with a data receiving party, receiving a nonce at a network equipment associated with the data collecting party from network equipment associated with the data receiving party, utilizing the nonce to compute, at least in part, a hash value at network equipment associated with the data collecting party, collecting electronic data at an intercept access device at network equipment associated with the data collecting party, utilizing the nonce and the hash value to transmit the collected electronic data to network equipment associated with the data receiving party, and utilizing the hash value to establish a chain of custody between the data collecting party and the data receiving party. | 06-09-2011 |
20110019811 | SYSTEM AND METHOD OF PROVIDING LOCAL NUMBER PORTABILITY - A system for and method of providing local number portability is presented. A request may be received to establish a session between an origination user agent and a destination user agent. The request may comprise a destination user agent identifier. It may be determined whether the destination user agent identifier was ported from one service provider to another. If so, routing information may be provided for establishing the session through the second service provider rather than through the first service provider. The session may be established over one or more Internet protocol networks. | 01-27-2011 |
20110007635 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR ROUTE DETERMINATION - Methods and computer program products are provided for improved routing by evaluating routing alternatives based on multiple-path elements. The homing models provide a solution for improved access homing while balancing latency, load-balancing, and diversity needs by viewing each network in isolation or the combination of networks as a single network. | 01-13-2011 |
20100195509 | SYSTEM AND METHOD FOR TESTING NETWORK ELEMENTS USING A TRAFFIC GENERATOR WITH INTEGRATED SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) CAPABILITIES - A system and method in accordance with exemplary embodiments may receive, from a management system, configuration data associated with a management protocol. In addition, the system and method may generate test data traffic at least based on the configuration data. Further, the system and method may transmit, to one or more network elements, the test data traffic. Even further, the system and method may receive, from the management system, a query associated with the management protocol that requests data traffic information associated with at least one of the generated test data traffic, transmitted test data traffic, and received test data traffic. The system and method may transmit, to the management system, the requested data traffic information in response to the query. | 08-05-2010 |
20100180325 | SYSTEM AND METHOD FOR PROVIDING A NORMALIZED SECURITY LIST - A system and method for providing a normalized security list including a first module configured to generate a first normalized security list of user identifications within a network and a second module configured to generate a second normalized security list of user identifications within the network. The system and method may also include an equalizer module configured to compare the first normalized security list with the second normalized security list, equalize the first normalized security list based on the second normalized security list, and equalize the second normalized security list based on the first security list. The system and method may also include a processing module configured to perform an audit of user identifications within the network by processing the first equalized normalized security list and the second equalized normalized security list and generating audit results based on the processing. | 07-15-2010 |
20100161990 | IVR CALL ROUTING USING ENCRYPTED DATA - A token representing encrypted data is used to initiate a call routing strategy based on receipt of the token. The call routing strategy is configured to initiate a query. Decrypted data associated with the encrypted data may be accessed to determine a data relationship based on the query. | 06-24-2010 |
20100159954 | UPDATING AN OPERATING PARAMETER - A method includes communicating with a first wireless network of a first type, and obtaining a location-based operating parameter from the first wireless network. The method further includes checking the validity of the location-based operating parameter obtained from the first wireless network. If the location-based operating parameter obtained from the first wireless network is not valid, then the method further includes searching for a second wireless network of a second type, and updating the location-based operating parameter from the second wireless network. | 06-24-2010 |
20100154012 | TELEVISION BOOKMARKING WITH MULTIPLATFORM DISTRIBUTION - A system includes a content processing device in communication with a control device, the content processing device is configured to receive multi-media content from a network, and create a bookmark representing at least a portion of the multi-media content upon receiving a signal from the control device. | 06-17-2010 |
20100153852 | Method and System for Providing Interactive Flow Chart Elements - Exemplary embodiments include methods and systems for diagnosing and/or analyzing one or more service problems including an acquire module configured to acquire one or more interactive flow chart methods to diagnose one or more service problems, wherein each of the one or more interactive flow chart methods comprises one or more method steps. Also, the system may include an analytical module configured to provide a first method step of the one or more interactive flow chart methods to a user and provide a second method step of the one or more interactive flow chart methods based at least in part on a user feedback to the first method step; and a presentation module configured to display a diagnostic report of the one or more service problems. | 06-17-2010 |
20100153433 | MULTIPLATFORM COMMUNICATION AND MEDIA JOURNAL WITH MAPPING - A plurality of media files may be maintained in a data store, where each of the plurality of media files is associated with at least one indication comprising at least one of a geographic indication and a time indication. At least one indication may be identified, wherein the at least one indication is one of a geographic indication and a time indication. A query may be sent to the data store, wherein the query includes the identified at least one indication and at least one media file may be retrieved from the data store according to the query. | 06-17-2010 |
20100153055 | NETWORK TESTING - A method may include receiving, at a first network device, a test initiation message from a control device, wherein the test initiation message includes at least an identification of a second network device. The method may further include retrieving the identification of the second network device from the test initiation message and generating test data including at least source information associated with the first network device, destination information associated with the second network device, and timestamp information associated with a time at which the test data is generated. In addition, the method may include transmitting the test data to the second network device via a data network under test and receiving return test data from the second network device. Further, the method may include generating performance information based on the return test data received from the second network device. | 06-17-2010 |
20100150514 | SPLICED FIBER TRAY SOFT DUROMETER MATERIAL (SDM) MANIFOLD - A manifold for holding spliced optical fibers and their protective plastic coatings in a secure and motionless manner. The manifold includes a “clamp” made from a soft durometer material (SDM) such as a high strength silicone mold-making rubber or a dry polymer gel that has been partially sliced to a depth of about 75%. The manifold permits ease of insertion of a spliced optical fiber into, and removal of that spliced optical fiber from, an SDM-slice without disturbing other fibers that are held in other slices in the manifold. In a particular embodiment the gel or rubber SDM fills a four-sided plastic box to overflow. Slices in the SDM are parallel to each other and to front and back walls of the box which has a hinged cover to exert pressure on the overflow SDM material when the cover is closed to increase holding force on splice-junctions of embedded bare-glass optical fibers, those fibers within their respective protective coatings exiting the box, left and right, via cut-outs in the side walls of the box. | 06-17-2010 |
20100150335 | CALL ROUTING - An inbound traffic allocation module is configured to store, in a database, data received from a plurality of site-services, and to determine a route capacity based at least in part on the received data, data received from each of the site-services including data related to at least one of a health and a busyness of the site-service. A traffic manager module is configured to retrieve the data from the site-services and to provide the data to the inbound traffic allocation module. A service selection engine module is configured to receive a request to route a call, and to route the call to one of the site-services based at least in part on the route capacity associated with the site-service. | 06-17-2010 |
20100150136 | VOICE-OVER-INTERNET PROTOCOL DEVICE LOAD PROFILING - A device may obtain, from a remote device on a network, information regarding loads and Session Initiation Protocol (SIP) devices on which the loads are installed. In addition, the device may access a database storing load compatibility information, identify problematic loads based on the obtained information and the load compatibility information, determine fixes for one or more of the problematic loads, and apply the fixes to the one or more of the problematic loads over the network. | 06-17-2010 |
20100150028 | DISTRIBUTING CUSTOMER LOCATION ACCESS LINKS ACROSS NETWORK PROVIDER NODES DURING NETWORK PLANNING - A computing-device implemented network planning process distributes access links associated with customer locations to selected nodes of a provider network. The network planning process distributes the access links associated with the customer locations to the selected nodes of provider network such that overall latency goals for the network are met and such that the density of the connected customer locations to the network nodes in the network satisfy density requirements. The network planning process seeks diversity in customer location assignments by creating additional capacity through the re-assignment of customer locations to alternate network nodes in order to free up space on network nodes needed to off-load customer locations from other over-loaded network nodes. The network planning process permits an expanded ring of network nodes to accommodate dense customer traffic load across a wide area while meeting both individual connection and overall system requirements. | 06-17-2010 |
20100149987 | Traffic Allocation - A method may include storing rules associated with processing calls. Each of the rules may include a maximum number of calls per unit of time. The method may also include determining whether the maximum number of calls per unit of time associated with a first one of the rules is greater than a threshold. The method may further include allocating by a first node, when the maximum number of calls per unit of time is greater than the threshold, a number of calls per unit of time to the first node based on the number of calls satisfying the first rule that were received by the first node and a total number of calls satisfying the first rule that were received by all of the nodes. | 06-17-2010 |
20100141418 | REMOTELY CONFIGURABLE VEHICULAR SIGN - A configurable sign includes a mounting mechanism that connects the configurable sign to a vehicle, a display, a memory to store a plurality of instructions, and a processor to execute instructions in the memory. The processor executes instructions in the memory to receive configured sign information from one of a user device or a server, configure one of text, graphics, video, or audio, associated with the display, based on the configured sign information, and display, via the display, the configured text, graphics, video, or audio. | 06-10-2010 |
20100138547 | GENERIC BROADBAND APPLICATION AND PLUG-INS - A device may receive a broadband card, dynamically load a non-generic plug-in to detect the broadband card, determine whether the loaded non-generic plug-in detects the broadband card, dynamically load a generic plug-in when the loaded non-generic plug-in does not detect the broadband card, and use the generic plug-in to certify the broadband card. | 06-03-2010 |
20100138268 | PROGRESS MANAGEMENT PLATFORM - A device receives milestone information and dependency information associated with a project, generates a milestone flow chart based on the milestone information and the dependency information, and represents one or more milestones, in the milestone flow chart, with one or more nodes. The device also represents one or more dependencies among the one or more milestones with one or more directed arcs provided between corresponding nodes of the one or more nodes, and calculates a critical path associated with the one or more milestones. The device further represents the critical path with bolded directed arcs provided between corresponding nodes of the one or more nodes, and provides the milestone flow chart, including the representations of the one or more milestones, the one or more dependencies, and the critical path, for display. | 06-03-2010 |
20100131858 | USER INTERFACE - A device may include a user interface configured to provide audio, video or haptic output in response to received communications. The device may also include logic to identify information associated with an availability status of a user of the device and provide an audio, video or haptic output via the user interface based on the information associated with the availability status of the user of the device. | 05-27-2010 |
20100110883 | METHOD AND SYSTEM FOR DETERMINING ALTERNATE PATHS - An approach is provided for determining alternative paths. Information is stored specifying a set of available paths among network elements within a connection-oriented network. The available paths are sorted according to a predetermined criterion. The sorted paths are selectively filtered based on either a particular one of the network elements, a region associated with one or more of the network elements, or a combination thereof. | 05-06-2010 |
20100106748 | METHOD AND SYSTEM FOR LOGGING AND STORING HETEROGENEOUS COMMUNICATION SESSIONS - An approach is provided for creating a workspace for automatically logging and storing heterogeneous communication sessions and for accessing this workspace from a user-designated environment. | 04-29-2010 |
20100106500 | METHOD AND SYSTEM FOR ENHANCING VERBAL COMMUNICATION SESSIONS - An approach is provided for enhancing verbal communication sessions. A verbal component of a communication session is converted into textual information. The converted textual information is scanned for a text string to trigger an application. The application is invoked to provide supplemental information about the textual information or to perform an action in response to the textual information for or on behalf of a party of the communication session. The supplemental information or a confirmation of the action is transmitted to the party. | 04-29-2010 |
20100094619 | AUDIO FREQUENCY REMAPPING - An exemplary system and method are directed at receiving an audio signal and process the audio signal into a remapped audio signal based on a plot profile. The plot profile may include at least one of an identified range of audio frequencies. The processing may comprise retrieving an identified range of audio frequencies from the plot profile; determining a range of impaired audio frequencies in the audio signal based on the identified range of audio frequencies; shifting the frequency of at least a portion of the impaired audio frequencies to outside of the identified range; and continuing to retrieve identified ranges of audio frequencies from the plot profile. The shifting of the impaired audio frequencies of the audio signal may be performed until no further identified ranges of audio frequencies are available for consideration. | 04-15-2010 |
20100088419 | METHOD AND SYSTEM FOR PROVIDING A SETUP TIMER IN A SIP-BASED NETWORK - A system and method for providing a setup timer in a SIP-based network including initiating a session by transmitting one or more messages to a first user. The system and method also comprises starting a first timer upon transmitting the one or more messages, wherein the first timer is configured to expire after a first predetermined time period. The system and method further comprises starting a second timer upon transmitting the one or more messages, wherein the second timer is configured to expire after a second predetermined time period. The system and method furthermore comprises transmitting one or more instructions upon expiration of at least one of the first timer and the second timer, and taking one or more actions based at least in part on the one or more instructions. | 04-08-2010 |
20100088205 | Methods, Systems and Computer Program Products for a Cloud Computing Spot Market Platform - This disclosure details the implementation of methods, systems and computer program products for a cloud computing spot market platform (hereinafter, “Platform”). Fluctuations in demand for computing resources may engender idle processing capacity within the framework of a cloud computing system. Embodiments of the Platform provide infrastructure for redistributing idle capacity to grid-style batch computing processes, such as may be based on the same processing resources as those used by the cloud computing system. In this manner, Platform embodiments may increase the utilization of idle resources and reduce revenue losses associated with demand variability for cloud computing system administrators. In one embodiment, market-oriented floating prices for grid-style batch computing utilizing idle resources may be implemented based on monitored and analyzed levels of computing resource supply and demand. | 04-08-2010 |
20100085703 | Equipment Chassis Shield - An apparatus of an embodiment may include a network equipment chassis shield comprising a rectangular planar surface for mounting in front of a face of an equipment chassis, at least one supporting bracket for mounting the rectangular planar surface, and two or more fasteners for securing the rectangular planar surface to an anchoring structure. A first fastener may secure the rectangular planar surface to the at least one supporting bracket and a second fastener may secure the at least one supporting bracket to the anchoring structure. | 04-08-2010 |
20100082241 | METHOD AND SYSTEM FOR PROVIDING NAVIGATIONAL SERVICES - An approach is provided for a managed navigational service. Real-time positional information corresponding to a user is received over a communication network. An approaching point of interest is determined based on the positional information. The approaching point of interest is correlated with travel information and metadata associated with the approaching point of interest. Information about the approaching point of interest is transmitted over the communication network to the user. | 04-01-2010 |
20100080244 | METHOD AND SYSTEM FOR NETWORK BANDWIDTH ALLOCATION - A method and system of an embodiment may include a method, comprising receiving, at a computing device, network bandwidth information for a network, receiving, at a computing device, a request for network bandwidth, identifying, at a computing device, one or more portions of network bandwidth to fulfill the request. The method may include provisioning the one or more identified portions of unallocated network bandwidth for the request. The identification may comprise utilizing the network bandwidth information to identify one or more portions of unallocated network bandwidth with sufficient capacity for the request, and determining which of the one or more portions of unallocated network bandwidth will result in less fragmentation of remaining unallocated network bandwidth. | 04-01-2010 |
20100061721 | METHOD AND SYSTEM FOR ADJUSTING NETWORK INTERFACE METRICS - An approach is provided for adjusting network interface metrics to optimize transmissions across a network. A measurement of performance of a network interface is made, wherein the network interface is configured to provide traffic across an optical network. A determination is made regarding whether the measured performance satisfies a predetermined threshold. A network metric value of the network interface is adjusted if the measured performance of the network interface satisfies the predetermined threshold. | 03-11-2010 |
20100061662 | System and Methods for Recording Emergency Data - A system and method for recording emergency data during a 911 call. The emergency data recorded may be in the form of a digital image. The digital image may be of the event prompting the 911 call. The digital image may be a single image, a series of images, or streaming video. The emergency data may be received on a portable electronic device, such as a cell phone, through a digital imaging device, such as a digital camera. The emergency data may then be transmitted to a server, wherein the emergency data is stored. The emergency data may be accessed by a 911 dispatcher during a 911 call to review the image data to aid in assessing the emergency recorded in the emergency data. | 03-11-2010 |
20100061264 | METHOD AND SYSTEM FOR IDENTIFYING NETWORK PATHS - A method and system of an embodiment may include receiving network information associated with one or more network links, one or more network nodes, and a network hub, identifying at least two network paths from at least one of the one or more network nodes to the network hub based on the network information. Identifying at least two network paths from at least one of the one or more network nodes to the network hub based on the network information may include determining a number of hops for each identified network path, determining a latency of each link for each identified network path, summing the latencies of each link for each identified network path to calculate a total network path latency, and determining a ranking of the network paths based at least in part on the number of hops and the total network path latency. | 03-11-2010 |
20100053337 | VIDEO TEST PROCESS INTEGRATED IN A SET-TOP-BOX - A device, such as a set-top box, may include logic to allow television customers to automatically test and adjust the quality of the displayed video signal. A set-top box may receive a user selection of whether to perform a video test using an automatic loopback test sequence or a user subjective test sequence. The set-top box may perform, when the automatic loopback test sequence is selected, a video quality test that may include transmitting a signal from the set-top box, receiving a loopback version of the video signal, and comparing the received loopback version of the video signal to the transmitted signal. The set-top box may perform, when the user subjective test sequence is selected, a video quality test that may include displaying one or more test patterns to a user and receiving feedback from the user relating to a quality of the displayed test patterns. | 03-04-2010 |
20100043047 | UNAUTHORIZED DATA TRANSFER DETECTION AND PREVENTION - A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via a system bus. Identifying a class, and selectively forwarding the data communication message based in part on the received policy and the identified class. | 02-18-2010 |
20100042647 | METHOD AND SYSTEM FOR RECORDING REAL-TIME COMMUNICATIONS - An approach is provided for buffering and recording real-time communications and then delivering the recorded communication to a user-specified device in a user-specified format. | 02-18-2010 |
20100040368 | METHOD AND SYSTEM FOR MANAGING OFF-NET VIRTUAL CONNECTIONS - An approach is provided for managing off-network virtual connections. A first management channel is mapped to a second management channel for transport of management information over an optical time-division-multiplexing (TDM) network that includes an off-network portion. The off-network portion corresponds to a third party provider. The first management channel corresponds to an electrical connection and the second management channel corresponds to an optical connection. | 02-18-2010 |
20100039957 | SYSTEM AND METHOD FOR MONITORING AND ANALYZING NETWORK TRAFFIC - An approach is provided for monitoring and analyzing network traffic. Traffic is monitored during a configurable time interval. A number of bursts associated with the traffic are tracked. A measured traffic rate is generated based on the number of bursts occurring within the time interval. The measured traffic rate is compared with a committed rate to determine if the measured traffic rate exceeds the committed rate. | 02-18-2010 |
20100034362 | NETWORK CALL RECORDING - A method and system of an embodiment may include receiving at least a portion of a call recording request at a voice response unit, identifying a call received at the voice response unit as a call matching one or more parameters of the call recording request, and utilizing available digital signal processing resources of the voice response unit to record one or more specified portions of the call. | 02-11-2010 |
20100031023 | METHOD AND SYSTEM FOR PROVIDING CENTRALIZED DATA FIELD ENCRYPTION, AND DISTRIBUTED STORAGE AND RETRIEVAL - An approach is provided for securely storing sensitive data values. A primary facility is provided that directly or indirectly receives requests from a requestor to store an actual data value. The primary facility obtains a replacement value associated with the actual value and encrypts the actual value, and the replacement value is transmitted to the requestor. The replacement and encrypted values are stored in a master copy database at the primary facility, and copies thereof are stored in distributed secondary databases. When the requestor needs an actual data value, the requestor transmits the replacement value either to the primary facility for retrieval of data from the master database, or to the secondary facility for retrieval from the respective secondary database. The chosen facility retrieves the encrypted value from its respective database using the replacement value, decrypts the encrypted value, and transmits the actual value back to the requestor. | 02-04-2010 |
20100027765 | METHOD AND SYSTEM FOR PROVIDING ASSISTED COMMUNICATIONS - An approach is provided for selectively translating a communication session and associated media among different formats based on user sensory impairment, preferred communication format, device capability, and restrictive environmental conditions. | 02-04-2010 |
20100023610 | MIXED INTEGER PROGRAMMING MODEL FOR MINIMIZING LEASED ACCESS NETWORK COSTS - A device receives network configuration information from a network, determines a logical network based on the network configuration information, and constructs a mixed integer programming (MIP) model based on the logical network. The device also calculates an optimal solution, which minimizes network costs, using the mixed integer programming (MIP) model, performs a post-optimization mapping procedure on the optimal solution to produce an optimal network configuration mapping, and outputs the optimal network configuration mapping for implementation. | 01-28-2010 |
20100005188 | METHOD AND SYSTEM FOR AN INTERCEPT CHAIN OF CUSTODY PROTOCOL - Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising securely negotiating a data collection interval time and protocol support for electronic data collection between network equipment associated with a data collecting party and network equipment associated with a data receiving party, receiving a nonce at a network equipment associated with the data collecting party from network equipment associated with the data receiving party, utilizing the nonce to compute, at least in part, a hash value at network equipment associated with the data collecting party, collecting electronic data at an intercept access device at network equipment associated with the data collecting party, utilizing the nonce and the hash value to transmit the collected electronic data to network equipment associated with the data receiving party, and utilizing the hash value to establish a chain of custody between the data collecting party and the data receiving party. | 01-07-2010 |
20100002724 | METHOD AND SYSTEM FOR ADJUSTING BANDWIDTH USING MULTIPLE TIMERS - An approach is provided for auto-bandwidth adjusting bandwidth allocations for traffic-engineered tunnels used to carry traffic along a network. Traffic over the tunnel is sampled at a first interval period and at a second interval period, where the second interval period is shorter than the first interval period. A determination is made as to whether the sampled traffic taken using the second interval period is greater than the bandwidth allocation, and the bandwidth allocation is adjusted upward based upon a determination that the sampled traffic taken using the second interval period is greater than the bandwidth allocation. Also, a determination can be made as to whether the sampled traffic taken using the first interval period is less than the bandwidth allocation, and the bandwidth allocation can be adjusted downward based upon a determination that the sampled traffic taken using the first interval period is less than the bandwidth allocation. | 01-07-2010 |
20090323910 | AUTOMATED RESPONSE SYSTEM TUNING - A system and method for creating, storing, and retrieving data associated with initiated communications to a vendor are disclosed. An exemplary system includes a response server in communication with a database that provides a platform for storage and retrieval of records created by the response server. The response server is configured to provide a series of menus including a group of selections during the initiated communications to the vendor and receive inputs in response to the menus. The response server is further configured to create a record for each initiated communication as the initiated communication is occurring, and to create a report including at least a portion of the data from each record. The portions of data taken from each record each describe a characteristic of at least one of the inputs for the initiated communication associated with each respective record. | 12-31-2009 |
20090321517 | SECURITY DEVICE READER - A method performed by a device may include exchanging encryption information with a security card, generating validation information based on the exchanged encryption information with the security card and transmitting the validation information to the security card for display. | 12-31-2009 |
20090313059 | SYSTEM AND METHOD FOR INTEGRATING ISSUE TRACKING SYSTEMS - Communication between a first issue tracking system and a second issue tracking system is provided. An integration platform is configured to translate an issue tracking ticket from a form recognizable by the first issue tracking system, which can be a component of a customer network, into a form recognizable by the second issue tracking system, which can be a component of a service provider network. A gateway server is provided to control communications between the integration platform and the issue tracking system of the service provider network. | 12-17-2009 |
20090310595 | PROVIDING SESSION INITIATION PROTOCOL (SIP) CALL CONTROL FUNCTIONS TO PUBLIC SWITCHED TELEPHONE NETWORK (PSTN)-BASED CALL CONTROLLER - A device receives information associated with an outbound call from a calling party via a Public Switched Telephone Network (PSTN), and generates a request for the outbound call from the Public Switched Telephone Network (PSTN) using a remote procedure call (RPC) interface. The device also enables communication, via the remote procedure call (RPC) interface, of the outbound call with a Session Initiation Protocol (SIP)-based device associated with a called party. | 12-17-2009 |
20090293126 | MALWARE DETECTION DEVICE - An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware. | 11-26-2009 |
20090293079 | METHOD AND APPARATUS FOR PROVIDING ONLINE SOCIAL NETWORKING FOR TELEVISION VIEWING - An approach is provided for extending social networking to television viewing. A community of a plurality of users is created, wherein each user is logged in a device configured to present audio-video content. Presence information of one of the users in the community is determined and transmitted to a corresponding device of another one of the users. | 11-26-2009 |
20090291663 | EMERGENCY CALL FORKING AND NOTIFICATION - A method includes receiving subscriber configuration information for an emergency forking/notification service, the subscriber configuration information including criteria for initiating the forking/notification service and contact information for a recipient of the forking/notification service; receiving an emergency call from a calling device; routing the emergency call to a public safety answering point (PSAP); identifying the emergency call as a candidate for the emergency forking/notification service based on information associated with the calling device and the criteria for initiating the forking/notification service; and automatically initiating a forking/notification session to notify the recipient that an emergency call has been initiated from the calling device. | 11-26-2009 |
20090288157 | SECURITY OVERLAY NETWORK - A device receives an indication of detected attack traffic associated with a network, identifies a victim of the attack traffic, and selects a security platform for processing the attack traffic. The device also advertises a tunnel and routing tag information in the network for the selected security platform, receives the attack traffic via the advertised tunnel, and forwards the attack traffic to the selected security platform for processing. The device further receives processed traffic from the selected security platform, and forwards, via the network, the processed traffic to the victim. | 11-19-2009 |
20090285381 | PARKING AND ROUTING NETWORK CALLS AND SESSIONS - A device may process a call, receive a request to forward the call at a call extension point, obtain information about parked calls from a queue that stores information associated with the parked calls, determine whether the call may be parked or forwarded to a terminating device based on the information, park the call at the call extension point when it is determined that the call may not be forwarded, and forward the call to the terminating device when it is determined that the call may be forwarded. | 11-19-2009 |
20090279681 | LOCATION- AND PRESENCE-BASED MEDIA SESSION ROUTING - A method includes defining multiple recipient candidates for a media session request; identifying a geographic location of a communication device that initiates the media session request; identifying a geographic location of each of the recipient candidates at the time of the media session request; determining the optimal recipient candidate for the media session request based on the geographic location of the communication device that initiates the media session request and the geographic location of each of the recipient candidates; and automatically routing the media session request over a network to the determined optimal recipient candidate. | 11-12-2009 |
20090279432 | Intercept flow distribution and intercept load balancer - A system and method for intercepting and load-balancing information including one or more mediation devices configured to receive intercept instructions for intercepting information for a predetermined period of time, an intercept access device configured to receive the intercept instructions from the one or more mediation devices, wherein the intercept access device may identify and intercept information based on the intercept instructions and may encapsulate the intercepted information, and an intercept load balancer configured to receive the intercepted information and transmit the intercepted information to the one or more mediation devices for distribution to one or more law enforcement device. | 11-12-2009 |
20090268605 | Method and System for Network Backbone Analysis - A method and system of an embodiment may include receiving network path information identifying one or more network paths, receiving network traffic information specifying a network ingress and a network egress for the network traffic on a first network path of the one or more identified network paths and the network traffic information specifying one or more attributes of the network traffic, emulating failure of one or more components of the first network path, determining a second network path between the specified network ingress and the specified network egress to accommodate the network traffic from the first network path, and providing information associated with the second network path. | 10-29-2009 |
20090265764 | AGGREGATION AND USE OF INFORMATION RELATING TO A USERS CONTEXT - Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used by authorized context consumers. | 10-22-2009 |
20090265236 | AGGREGATION AND USE OF INFORMATION RELATING TO A USERS CONTEXT FOR PERSONALIZED ADVERTISEMENTS - Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user. | 10-22-2009 |
20090262917 | DELIVERY OF CALL DATA IN A COMMUNICATION SYSTEM - A method may include receiving a call having call data, determining that the call data cannot be forwarded along a call path, assigning an identifier to the call data, forwarding the call along the call path without the call data, and storing the call data and the identifier at a device outside the call path. | 10-22-2009 |
20090254674 | SESSION INITIATION PROTOCOL (SIP) OVERLOAD PROTECTION - A device receives a Session Initiation Protocol (SIP) response that includes a load header associated with a downstream Session Initiation Protocol (SIP) device. The device also determines an amount of traffic to send to the downstream Session Initiation Protocol (SIP) device based on the load header. The device further sends the determined amount of traffic to the downstream Session Initiation Protocol (SIP) device. | 10-08-2009 |
20090248714 | SELECTIVE MAPPING OF INTEGRATED DATA - In one of many possible implementations, an exemplary system includes a plurality of data subsystems configured to store local data associated with an external party, the data subsystems configured to be maintained by an internal party. The system further includes a data integration subsystem configured to store global data and a defined mapping of the global data to the local data, the global data including a global data record mapped to a local data record having a first data schema type, recognize a migration event in the local data, the migration event including migration of the first schema type local data record to a second schema type local data record, and associate a smart mapping record with the global data record, the smart mapping record configured to selectively map the global data record to one of the first schema type local data record and the second schema type local data record. | 10-01-2009 |
20090245094 | OUTAGE ANALYSIS SYSTEM - A device may receiving alarms identifying failures of network elements, create a site table that includes a list of sites at which the alarms are generated and a number of alarms for each of the sites, determine whether an outage has occurred based on the alarms, analyze whether the outage is a false outage based on a failure of a probe that generates the alarms, and provide a notification that includes the site table, an indication of whether the outage has occurred, or an indication whether the outage is a false outage. | 10-01-2009 |
20090186634 | Method and System for SMS/MMS Messaging to A Connected Device - The method and system for SMS/MMS messaging to a connected device may be realized as a system comprising at least one server module. The at least one server module may be adapted to receive from a connected device an outbound messaging message through a packet-based network. The at least one server module may also be adapted to send the outbound messaging message to an external messaging network. The connected device may be communicatively coupled to the packet-based network. The outbound messaging message may be associated with a user account. The user account may be associated with a telephone number. | 07-23-2009 |
20090183149 | DATA IMAGING SYSTEM AND METHODS - A method performed by a network device may include receiving index information from a second network device identifying an updated application, querying a third network device for the identified updated application, receiving the identified updated application from the third network device, storing the identified updated application received from the third network device and applying stored application user settings from memory to the stored updated application. | 07-16-2009 |
20090172148 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING OF IP NETWORKS ELEMENTS - Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collecting state data from the one or more routers of one or more protocols at discrete time intervals, the state data being associated with one or more routers of a network, analyzing corresponding state data collected at two or more discrete time intervals, and outputting a result of the analysis of the state data collected from the one or more routers of the network. | 07-02-2009 |
20090169016 | METHOD AND SYSTEM FOR KEYING AND SECURELY STORING DATA - An approach is provided for securely storing sensitive data. A system is provided that includes a central device configured to receive a key from a requester, to obtain a new key associated with the key, and to transmit the new key to the requestor, and a storage device for storing the new key in association with the key. Also, a secure system is provided that includes a parsing unit that parses an actual data value into a first data field and a second data field, a key generation unit that generates a key, a first process that transmits the key to a central manager and receives a new key associated with the key from the central manager, and at least one storage device configured to store the first data field in association with the key, and to store the second data field in association with the new key. | 07-02-2009 |
20090169010 | METHOD AND SYSTEM FOR PROVIDING DATA FIELD ENCRYPTION AND STORAGE - An approach is provided for securely storing and managing sensitive data. A system and method are provided that include a central device that receives an actual data value from a requester, encrypts the actual data value, obtains a replacement value for the encrypted actual data value, obtains a secondary replacement value based on the encrypted actual data value, and transmits the replacement value to the requester for storage by the requester. The system and method also includes a storage device for storing the secondary replacement value in association with the encrypted actual data value at a secure location. The requester can later use the replacement value to retrieve the actual data value from the central device. | 07-02-2009 |
20090165096 | DYNAMIC RADIUS - A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the RADIUS server. The authentication request includes at least a user identifier and a device identifier. The RADIUS server determines an authentication format utilized by the network access server based on the received authentication request. The system may also determine an authorization level to provide with an authentication response. | 06-25-2009 |
20090164640 | MULTIMEDIA PERSONAL ASSISTANT - A system receives, when a multimedia component is operating in a first identity, a first communication request from a first user. The first communication request includes a voice session establishment request or a video session establishment request. The system provides, in response to receiving the first communication request, first multimedia content to the first user based on the first identity and an identifier associated with the first user. The system further receives, when the multimedia component is operating in the first identity, a second communication request from a second, different user. The second communication request includes a voice session establishment request or a video session establishment request. The system provides, in response to receiving the second communication request, second, different multimedia content to the second, different user based on the first identity and an identifier associated with the second, different user. | 06-25-2009 |
20090164580 | MULTIMEDIA OUTBOUND NOTIFICATION - A device may include a memory and a processor. The memory may store first information relating to a trigger, second information relating to multimedia content, and a destination party identifier. The memory may further associate the first information, the second information, and the one or more destination party identifiers. The processor may detect that the trigger has been satisfied, and obtain, in response to detecting that the trigger has been satisfied, the multimedia content based on the second information. The processor may also establish a session with a user device using the destination party identifier, and provide the multimedia content to the user device. | 06-25-2009 |
20090164481 | MULTIMEDIA PORTAL - A system receives, from a first user, a communication request for a second user and determines, in response to receiving the communication request, whether a trigger is satisfied. The system may aggregate, in response to determining that the trigger is satisfied, content of different types to form multimedia content and provide the multimedia content to the first user. | 06-25-2009 |
20090164422 | PURCHASE TRENDING MANAGER - A device retrieves information associated with purchases from a purchase database, and provides for display of a last purchase option, a sort purchases option, and a lowest cost option based on the purchase information. The device further receives selection of one of the last purchase option, the sort purchases option, or the lowest cost option, and provides for display of last purchase information when the last purchase option is selected. The device also provides for display of sort purchases information when the sort purchases option is selection, and provides for display of lowest cost information when the lowest cost option is selected. | 06-25-2009 |
20090164421 | PERSONAL INVENTORY MANAGER - A device retrieves information associated with personal inventory from a personal inventory database, and provides for display of an input personal inventory option, a search personal inventory option, and a search loaned personal inventory option based on the retrieved personal inventory information. The device further receives selection of one of the input personal inventory option, the search personal inventory option, or the search loaned personal inventory option, and receives information associated with a new personal inventory item when the input personal inventory option is selected. The device also provides for display of search personal inventory information when the search personal inventory option is selection, and provides for display of search loaned personal inventory information when the search loaned personal inventory option is selected. | 06-25-2009 |
20090161857 | VENDOR FACILITY CUSTOMER ASSIGNMENT - A system and method for assigning initiated communications to a particular branch, location, or facility associated with a vendor are disclosed. An exemplary system may include an assignment server in communication with a data network that includes a primary data line for a vendor having a plurality of associated vendor facilities. The system further may include a plurality of vendor facility data lines, each of which is associated with one of the vendor facilities. The assignment server is configured to locate a group of vendor facilities from the plurality of vendor facilities that are within a predetermined range of a location associated with the initiated communication. The assignment server is further configured to assign one of the eligible vendor facilities to the initiated communication and connect the initiated communication with the vendor facility data line of the assigned vendor facility. | 06-25-2009 |
20090161852 | METHOD AND SYSTEM FOR MANAGING TELEPHONE NUMBER ALLOCATION - A system and method in accordance with exemplary embodiments may include receiving, from a customer, limitation data associated with managing telephone number allocation, determining a limitation threshold based on at least the limitation data, allocating one or more telephone numbers to a customer based on at least the limitation threshold, and providing the one or more telephone numbers to a customer. | 06-25-2009 |
20090161838 | AUTOMATED MULTIMEDIA CALL CENTER AGENT - An automated multimedia call center device may receive a verbal request for information from a user device during a multimedia session between the automated multimedia call center device and the user device. The automated multimedia call center device may further obtain a group of recognition results for the verbal request using speech recognition, cause at least two recognition results of the group of recognition results to be visually displayed on the user device, receive selection of one recognition result of the at least two recognition results, perform a search using the selected one recognition result to obtain multimedia content, and provide the multimedia content to the user device. | 06-25-2009 |
20090161626 | SYSTEM AND METHOD FOR DUAL-MODE HANDOFF - Exemplary embodiments include methods and systems for a deterministic facilitating for a dual-mode handoff between a local area network (LAN) and a wide area network (WAN). The hand-off method may include associating identification information with a mobile user device and locating the mobile user device within a local area network based at least in part on the identification information associated with the mobile user device. The hand-off method may also include moving the mobile user device outside a coverage area of the local area network, associating the mobile user device with a wide area network based at least in part on the identification information associated with the mobile user device, and updating a wide area network server of a location associated with the mobile user device. | 06-25-2009 |
20090158443 | PIRACY PREVENTION, DETECTION, AND CONTENT MANAGEMENT - A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message. | 06-18-2009 |
20090158415 | METHOD AND APPARATUS OF PROVIDING AN INTERFACE FOR MANAGING NETWORK SWITCHES - An approach is provided for presenting, via a graphical user interface, a plurality of selectable areas corresponding to a plurality of categories of switches and a plurality of options. One of the options includes a search function for finding a desired one of the switches. A communication session is automatically established with one of the switches as specified by a user through one of the selectable areas or the search function. Information from the one switch is received over the communication session, wherein the information is used for analyzing the one switch. | 06-18-2009 |
20090158392 | DYNAMIC AUTHENTICATION GATEWAY - A dynamic authentication broker is configured to process authentication requests received from a network access server formatted in any of a plurality of protocols and received over any of a plurality of ports. Processing authentication requests may include authenticating and/or authorizing a particular user, user device and/or network access server. | 06-18-2009 |
20090157404 | GRAMMAR WEIGHTING VOICE RECOGNITION INFORMATION - A device receives a voice recognition statistic from a voice recognition application and applies a grammar improvement rule based on the voice recognition statistic. The device also automatically adjusts a weight of the voice recognition statistic based on the grammar improvement rule, and outputs the weight adjusted voice recognition statistic for use in the voice recognition application. | 06-18-2009 |
20090154357 | Method and System for Providing Default Route Advertisement Protection - A system and method in accordance with exemplary embodiments may include detecting connectivity of a core network element to an internal network. In addition, the system and method may halt advertisement of a default route from the core network element to a network element external to the internal network in response to not detecting connectivity of the core network element to the internal network. The system and method may also allow advertisement of the default route from the core network element to the network element external to the internal network in response to detecting connectivity of the core network element to the internal network. | 06-18-2009 |
20090135815 | HIERARCHICAL SEGMENTED LABEL SWITCHED PATHS - A network may include a first set of routers at a first level of a multi-protocol label switched tunneling hierarchy and a second set of routers at a second level of the multi-protocol label switched tunneling hierarchy, the second set of routers connected to the first set of routers in a partially meshed topology. The network may also include a hierarchical segmented label switched path. The hierarchical segmented label switched path may include a forwarding adjacency label switched path including a subset of the first set of routers, and a label switched path coupled to the forwarding adjacency label switched path, the label switched path including a subset of the second set of routers. | 05-28-2009 |
20090132928 | DISPLAY OF END-TO-END PHYSICAL LAYER SIGNAL FLOW - A device may comprise a client. The client may be configured to send a request for a physical view about network devices that connect two end points of a network path. In addition, the client may be configured to receive information about the network devices of the network path in response to the request, the information including a complete list of physical devices in the network path in accordance with the request for the physical view. Further, the client may be configured to display the complete list of the physical devices in order the physical devices connect the two end points. | 05-21-2009 |
20090129289 | SYSTEM, METHOD AND COMPUTER-READABLE STORAGE MEDIUM FOR CALCULATING ADDRESSING AND BANDWIDTH REQUIREMENTS OF A NETWORK - Apparatuses, methods and computer-readable storage mediums are provided for calculating estimated addressing and bandwidth requirements of a customer domain, such as to facilitate designing the respective domain. A method includes selecting customer premises equipment (CPE) of a domain including a plurality of CPEs, where each CPE includes one or more devices, and one of the one or more devices include an interface with which the domain communicates with the respective CPE. The method also includes determining if the interface of the selected CPE comprises a router, and calculating an addressing requirement of the selected CPE, where the addressing requirement includes a number of device addresses for the selected CPE. The method may additionally or alternatively include analyzing traffic patterns of the selected CPE with respect to one or more other CPEs, and based on the analysis, calculating a bandwidth requirement of the selected CPE. | 05-21-2009 |
20090119476 | DATA MIGRATION - Data is extracted from at least one data source. The data is translated according to a metadata model and is stored in a staging data store. A migration management user interface is provided that includes a mechanism for indicating at least some of the data to be included in a migration event. The migration event is initiated based at least in part on the input received via the user interface. The at least some of the data is migrated from the staging data store to a target data store according to a hierarchy of controls. | 05-07-2009 |
20090119348 | DATA STRUCTURE VERSIONING FOR DATA MANAGEMENT SYSTEMS AND METHODS - In one of many possible implementations, an exemplary system includes a data integration subsystem configured to maintain a baseline data structure representing a base set of data relationships. The data integration subsystem in further configure to maintain a mapping of the baseline data structure to local data maintained by a plurality of local data subsystems. The system further includes a portal subsystem configured to provide a first customizable data structure associated with the baseline data structure for user access, create a copy of at least a subset of the baseline data structure, and provide a second customizable data structure associated with the copy of the baseline data structure for user access. The first and second customizable data structures are independently customizable to represent different custom sets of data relationships. | 05-07-2009 |
20090116703 | MULTIFACTOR MULTIMEDIA BIOMETRIC AUTHENTICATION - A device may receive a request to authenticate a user, automatically establish a multimedia session with the user in response to receiving the request, and capture a group of biometric identifiers for the user from the multimedia session. The device may further perform a group of biometric authentication operations using the analyzed or captured biometric identifiers to obtain a group of authentication scores, determine whether the user is properly authenticated based on the group of authentication scores, and transmit a message representing the determination of whether the user is properly authenticated. | 05-07-2009 |
20090113071 | Methods and Systems for Providing Efficient Provisioning of Data Flows - A system and method may include receiving a new flow request, the new flow request for requesting provisioning of a flow between a computer and the server, identifying a path of one or more network elements between the computer and the server, and determining whether provisioning the flow between the computer and the server violates a constraint. The system and method may further include updating an oversubscription factor and available bandwidth for an interface of each of the one or more network elements in the event the constraint is not violated, and determining whether a second path exists between the computer and the server in the event the constraint is violated. | 04-30-2009 |
20090103448 | APPARATUS, METHOD AND COMPUTER-READABLE STORAGE MEDIUM FOR CALCULATING THROUGHPUT REQUIREMENTS OF A NETWORK - An apparatus, method and computer-readable storage medium are provided for calculating an estimated throughput requirement of a network, such as to facilitate selecting the minimum bandwidth, maximum bandwidth or some other appropriate bandwidth for providing network services to a customer accessing that network. In this regard, a method of calculating a throughput requirement of a network includes receiving a bandwidth requirement. The method also includes calculating a data link-layer frame rate requirement based on the bandwidth requirement and a frame size, where the calculated frame rate requirement is limited by a line rate for transmission of data packets across a core network. In addition, the method includes calculating a data link-layer throughput requirement based on the calculated frame rate requirement and the frame size. | 04-23-2009 |
20090099884 | METHOD AND SYSTEM FOR DETECTING FRAUD BASED ON FINANCIAL RECORDS - An approach is disclosed for detecting fraud in financial records of a network subscriber. Financial records are received and impersonal data are extracted. Financial record data are processed to conform to a normalized format. Normalized records can be correlated into groups linked to respective sources such as, for example, an individual, a business entity, or a healthcare practitioner. Digits contained in this data are analyzed to determine a pattern that is indicative of fraud. An alert, to the fact that fraud has been detected with respect to an identified plurality of records if such determination has been made, is then generated. | 04-16-2009 |
20090089207 | PREPAID BUDGET CALLING ACCOUNTS WITH OVERRUNS BILLED TO A CREDIT CARD - Prepaid services include offering a plurality of services. An account is configured to track usages of the plurality of services as well as associating a plurality of recurring balances with the account, wherein each balance is associated with a respective service of the plurality of services. It is possible to deduct an amount associated with providing a particular service for a period of time from the recurring balance associated therewith. | 04-02-2009 |
20090088128 | PREPAID SERVICES ACCOUNTS WITH MULTI-USER CUSTOMERS AND INDIVIDUALIZED QUOTAS - Prepaid services include a multi-user prepaid services account as well as a prepaid balance associated with the account. A plurality of user records associated with the account each includes a quota. A service monitoring component may be configured to repeatedly draw down the prepaid balance by providing one or more allocations of the prepaid balance during a service period to a user associated with a respective user record. | 04-02-2009 |
20090088127 | SYSTEMS AND METHODS FOR PROVIDING MULTIPLE SIMULTANEOUS CALLS FROM THE SAME PREPAID ACCOUNT - Prepaid services include associating a plurality of users with a prepaid services account. The account is configured to track a prepaid balance associated with the account as well as to allow at least a subset of the plurality of users associated with the account to draw down the prepaid balance at least generally at the same time. Drawing down the prepaid balance includes allocating a portion of the prepaid balance to each respective user, monitoring a provision of service, and repeating, selectively, the allocating and monitoring. | 04-02-2009 |
20090086942 | LEASE MODEL FOR AVOIDING PERMANENT CARD LOCKING - Methods relating to prepaid services include determining an unlocked status of an account configured to track usage of prepaid services. The methods further include locking the account for a length of time after the determining step. The methods further include providing, for a service period, a service to a user associated with the account subsequent to the locking step, and continuously extending the locking for an additional length of time throughout the service period. | 04-02-2009 |
20090086643 | PATH TESTING AND SWITCHING - A method may include forming a first path from a first node to a second node and transmitting data via the first path. The method also includes measuring a performance parameter associated with transmitting data via the first path and determining whether the measured performance parameter meet a required performance parameter. The method also includes sending a notification to a customer associated with the first path when the measured performance parameter does not meet the required performance parameter, where the notification indicates that the first path is unavailable. | 04-02-2009 |
20090076793 | SYSTEM AND METHOD FOR PROVIDING A MANAGED LANGUAGE TRANSLATION SERVICE - An approach is disclosed for providing a managed language translation service. A request, from a source station, is received, at a switch, to establish a voice call with a destination station. A determination is made whether the request includes an indicator specifying invocation of a translation service managed by a service provider. If the request includes the indicator, the voice call is directed to a gateway that transmits the voice call over a data network to a translation application. The translation application translates, in real-time, speech associated with the voice call from a first language to a second language. The translated speech is transmitted to the destination station. | 03-19-2009 |
20090059789 | METHOD AND SYSTEM FOR PROVIDING USER CONFIGURABLE DIFFERENTIATED SERVICE - An approach is provided for specifying class of service (CoS) information. A wireless device is configured to connect to a wireless access point that communicates with a data network. The wireless device generates a message including a header that specifies class of service information for establishing a communication path over the data network. The class of service information is configurable by a user of the wireless device. | 03-05-2009 |
20090010175 | METHOD AND SYSTEM FOR PROVIDING AUTOMATIC DISABLING OF NETWORK DEBUGGING - An approach is provided for automatic disabling of network debugging. A debugging command is received for initiating debugging of a router that includes a processor configured to execute a debugging procedure. Utilization of the processor is monitored. A determination is made whether the utilization exceeds a utilization threshold. The debugging procedure is disabled based on the determination that the utilization threshold is exceeded. | 01-08-2009 |
20090007145 | DASHBOARD MAINTENANCE/OUTAGE CORRELATION - A device receives multiple products associated with a customer of a network and provided by the network, matches the multiple products with multiple maintenance events, and displays multiple visual indicators indicating status of the multiple maintenance events. | 01-01-2009 |
20090006591 | DASHBOARD INTERFACE GROUP IDENTIFIER - A device receives multiple identifiers associated with a customer of a network, receives multiple products associated with the customer and provided by the network, groups the multiple identifiers into a single customer identifier, and associates the single customer identifier with the multiple products. | 01-01-2009 |
20090006264 | Methods and Systems For Secure Voice-Authenticated Electronic Payment - This application discloses systems, methods, and processes for providing a secure, voice-authenticated form of electronic payment from a device. The described exemplary system provides an infrastructure for receiving an electronic payment request, verifying the request using voice authentication, and allowing or denying the request based on the authentication or non-authentication of the user. | 01-01-2009 |
20090006112 | DASHBOARD MAP FILTERING AND CLUTTER/DECLUTTER ALGORITHM - A device displays multiple products associated with a customer of a network and provided by the network, receives a customer selection of a filtering mechanism, and one of increases or reduces a display of the multiple products based on the customer selection of the filtering mechanism and based on device types associated with the multiple products. | 01-01-2009 |
20090003328 | Methods and Computer Program Products For Route Determination - Methods and computer program products are provided for improved routing by evaluating routing alternatives based on multiple-path elements. The homing models provide a solution for improved access homing while balancing latency, load-balancing, and diversity needs by viewing each network in isolation or the combination of networks as a single network. | 01-01-2009 |
20090003314 | Systems and Methods For Verification of IP Device Location - This application discloses systems and methods for associating the geographic location of VoIP devices and monitoring and updating these locations such that emergency personnel can be directed to a caller's location based on the stored geographic-location information. | 01-01-2009 |
20090003239 | Methods and Computer Program Products For Route Determination - This application discloses methods and computer program products for optimal or at least improved routing by evaluating routing alternatives based on multiple-path elements. The systems and methods can determine the shortest route to network points while maintaining route diversity. As such, the systems and methods can determine diverse routes with network-entrance diversity or diverse routes entering a network through a common access point. | 01-01-2009 |
20090003195 | INTELLIGENT NETWORK RESTORATION - A device may isolate a first failure of a network interface that transports packets from one point in a network to another point in the network, may detect a subsequent failure of the interface, and may identify a recovery of the network interface from the subsequent failure. In addition, the device may restore the network interface to the network to enable the interface to transport packets after a wait-to-restore period that is approximately greater than or equal to a time difference between when the first failure and the subsequent failure occur. | 01-01-2009 |
20080318616 | FLEXIBLE LIFESTYLE PORTABLE COMMUNICATIONS DEVICE - A method may include receiving a call at a portable communication device, entering a first mode when the call is directed to a first device identifier associated with the portable communication device; and entering a second mode when the call is directed to a second device identifier associated with the portable communication device, wherein the first mode provides access to a first set of applications and a first set of user data and the second mode provides a second set of applications and a second set of user data. | 12-25-2008 |
20080317237 | NETWORK CONFIGURATION AND ROUTING - A system may install a trunk between a first switch and an end office, where the trunk is a trunk home for the end office. The system may further identify Numeric Numbering exchanges (NXXs) that home to the end office. Traffic for at least one of the identified NXXs is routed to the end office through a second switch that is different than the first switch. The system also causes traffic for the identified NXXs to be routed to the first switch. | 12-25-2008 |
20080304637 | METHOD AND SYSTEM FOR PROVIDING INTELLIGENT CALL REJECTION AND CALL ROLLOVER IN A TELEPHONY NETWORK - A system and method may include receiving a call connection request associated with a calling device over a telephony network, the call connection request requesting establishment of a telephone call. The system and method may further include presenting a plurality of call rejection options, each of the plurality of call rejection options being associated with separate call rejection messages, and determining which one of the plurality of call rejection options is selected, where the plurality of call rejection options permit a called party to intelligently reject a phone call. | 12-11-2008 |
20080304470 | METHOD AND SYSTEM FOR PROVIDING INTELLIGENT CALL REJECTION AND CALL ROLLOVER IN A DATA NETWORK - A system and method may include receiving an invite message associated with a calling device over a data network, the invite message requesting establishment of a voice over data communication session, and presenting a plurality of call rejection options, each of the plurality of call rejection options being associated with separate call rejection messages. The system and method may further include determining which one of the plurality of call rejection options is selected, where the plurality of call rejection options permit a called party to intelligently reject a voice over data communication session. | 12-11-2008 |
20080281980 | PSEUDOWIRE CIRCUIT EMULATION - A method includes establishing a first pseudowire between a first switching device and a second switching device. The method also includes receiving customer traffic that includes time division multiplexed data and formatting the time division multiplexed data as packets. The method further includes identifying a destination for the customer traffic, identifying the first pseudowire for forwarding the customer traffic and forwarding the customer traffic via the first pseudowire to the second switching device. | 11-13-2008 |
20080263188 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING OF ROUTING IN IP NETWORKS - Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collect data associated with the one or more probe modules associated with a network, store the data associated with the one or more probe modules, analyze the data associated with the one or more probes modules, and output a result of the analysis of the data associated with the one or more probe modules to one or more user devices. | 10-23-2008 |
20080244644 | MANAGING MULTIPLE MEDIA CONTENT SOURCES - Media content is received through a plurality of inputs, each input being associated with one of a plurality of media content sources. Media content is provided to a media player for display in a first viewing frame based on a first one of the media content sources. A request is received for a second viewing frame. A list of available media content sources is provided. A source selection of a second one of the media content sources is received. Media content from the selected second one of the media content sources is provided in the second viewing frame. | 10-02-2008 |
20080243902 | METHOD AND SYSTEM FOR PROVIDING A GRAPHICAL WORKFLOW MONITOR - A browser based workflow monitor uses a graphical user interface (GUI) to display workflow status information and to create log information. The monitor presents the log information to a user in a format that is easily understood. Workflow information is accessed from a user workstation via a data network and displayed within a browser application. | 10-02-2008 |
20080240125 | INTERCONNECTING MULTIPLE MPLS NETWORKS - A network may include a first customer edge (CE) router and a second CE router. The first CE router may run an external border gateway protocol (EBGP) to exchange routing information with a first provider edge (PE) router that is in a first multi-protocol label switching (MPLS) network and may run an interior gateway protocol (IGP) to exchange routing information with the second CE router. The second CE router may run the IGP to exchange routing information with the first CE router and may run the EBGP to exchange routing information with a second PE router in a second MPLS network. | 10-02-2008 |
20080240077 | METHOD AND SYSTEM FOR MEASURING LATENCY - A system and method for measuring latency of an optical transport network includes generating a time stamp, transmitting the time stamp in an optical transport network, and processing the time stamp to measure latency of the optical transport network. | 10-02-2008 |
20080238670 | SECURITY DEVICE WITH DISPLAY - A security card may include a printed portion that includes printed data fixed to a first portion of an outer surface of the card, an interface configured to receive digitally signed information from an external device, and a display located on a second portion of the outer surface of the card and configured to display a digital image based on the received digitally signed information. | 10-02-2008 |
20080235019 | AGE DETERMINATION USING SPEECH - A device may include logic configured to receive voice data from a user, identify a result from the voice data, calculate a confidence score associated with the result, and determine a likely age range associated with the user based on the confidence score. | 09-25-2008 |