Patent application number | Description | Published |
20100278327 | EFFICIENT AND COST-EFFECTIVE DISTRIBUTION CALL ADMISSION CONTROL - A distributed call control system is provided that can allot bandwidth amongst several call controllers. The distributed call control system includes one or more servers that execute two or more instances of call processing servers that administer call control. The call processing servers form a cluster or group. The cluster members negotiate and determine bandwidth allocation amongst the members. If a member requires more bandwidth, the call processing server, of that member, assesses its own needs and requests more bandwidth from other members. The negotiation and requests for bandwidth are accomplished with a set of dynamic and static bandwidth data that regiment the control of the bandwidth. | 11-04-2010 |
20100319059 | SIP DIGEST AUTHENTICATION HANDLE CREDENTIAL MANAGEMENT - Methods, devices, and systems for controlling access to a password protected resource are provided. More specifically, different communication profiles can be mapped to a single user and that user can utilize a single password to gain access to the password protected resource using any one of his/her communication profiles. Each communication profile may have a unique authentication value associated therewith, but each unique authentication value may be determined based on the single password, thereby eliminating the need for a user to remember multiple passwords for each of his/her communication profiles. | 12-16-2010 |
20100325249 | PLUGGABLE CONTACT RESOLUTION - Methods, devices, and systems are provided for taking a pluggable extension and applying it to a unique set of a user population to handle their preferred and user-centric alerting relationships. More particularly, the pluggable extension allows a user to have their personalized contact resolution algorithm applied by a server to calls initiated by them or directed toward. The contact resolution algorithm is pluggable to any server and does not need to be built into the server itself. Moreover, multiple users can refer to and use the same pluggable contact resolution algorithm. | 12-23-2010 |
20100329121 | INTERNAL/EXTERNAL NETWORK IDENTIFIER - Methods, devices, and systems are provided for marking one or more entities of a call as internal/external such that certain call features can be invoked by servers and other devices residing behind a gateway. More specifically, entities of a call can be marked as internal/external based employing an assessment algorithm to determine whether the calling endpoint is an internal or external endpoint and/or whether a user of the calling or answering endpoint is an internal or external user. Once this determination is made, the call can be marked accordingly such that the appropriate features can be invoked. | 12-30-2010 |
20110066707 | NETWORK FRAMEWORK ASSOCIATING NON-ENTERPRISE PHONE WITH ENTERPRISE USERS - Methods, devices, and systems are provided for identifying unique points in communication processing for substituting and restoring identities associated with the communication. These specific replacements facilitate communication requests to-and-from external identities to be treated similar to communication requests to-and-from enterprise users, thereby allowing enterprise users to access enterprise-based communication preferences and services via non-enterprise devices. | 03-17-2011 |
20110131331 | ALTERNATIVE BANDWIDTH MANAGEMENT ALGORITHM - Methods, systems, and devices are provided that propose allocating bandwidth in a distributed network. According to a decentralized mode of operation, bandwidth between network devices is cooperatively shared and managed, allowing one or more call processing modules to selectively and intelligently place calls or perform activities. A single authoritative mode of operation for a given communication link is also provided, wherein one or more network devices may consult an authoritative member to determine if sufficient bandwidth is available to support an activity. Various triggering events or conditions may facilitate the transition from one mode to another. Audits or accountings are conducted, wherein devices may update or synchronize information stored in a control table related to system bandwidth. | 06-02-2011 |
20140325258 | COMMUNICATION FAILOVER IN A DISTRIBUTED NETWORK - An initial request is received to establish a communication session. The initial request contains a communication address of a first communication device. A communication server detects that the communication session cannot be established across a primary network. In response, the initial request is repurposed by changing the first communication address to a second communication address. The changed request is sent to a communication system, which adds a field to the changed request that indicates that the changed request is to be sent via a secondary network. The changed request is sent with the field to the communication server. The changed request with the second communication address is sent to a gateway to establish the communication session across a secondary network. A portion of the communication session is established using the second communication address. The first communication address is sent in the portion of the communication session using Dual-Tone-Multi-Frequency (DTMF). | 10-30-2014 |
Patent application number | Description | Published |
20120076129 | AUTOMATIC USER REDUNDANCY DETERMINATION - The embodiments presented herein provide an automated process for provisioning a user in a communication system. A session manager, which can be a server in the communication system that provides call connection and routing, may receive registration request from communication device (e.g. a cellular telephone, an IP-enabled phone, etc.). The session manager may determine one or more characteristics about the communication device and/or determine a load on one or more other session managers in a cluster of session managers. Based on both the communication device characteristics and/or the loads on the two or more session managers, the session manager can determine a set of session managers, which may include a primary session manager and a secondary session manager, which can manage the user data for the communication device. This session manager set information may then be sent to the communication device and to other session managers in the cluster. The set of session managers may then manage the user data for the communication device. | 03-29-2012 |
20120096167 | RESOURCE ALLOCATION USING SHARED RESOURCE POOLS - The present disclosure describes methods and systems for managing resources, for example in connection with call admission control or other communications or transactions in a system. In particular, a plurality of resource pools are established. At least a first or priority resource is associated with a minimum resource amount, while at least a second or normal resource pool is associated with a maximum resource amount. From the system resource pools, allocations are made to each of a plurality of system servers. If a server receives a request for priority resources that cannot be satisfied from the allocation of priority resources made to that server, that server may borrow from an allocation of normal resources. Resources can also be shared between servers. Accordingly, if required resources are not available from an allocation made to a server receiving the request for resources, that server can request resources from another server. In responding to a request to share resources, a server can attempt to fill the request as if the request had originally been made to that server. | 04-19-2012 |
20130022192 | EFFICIENT AND COST-EFFECTIVE DISTRIBUTED CALL ADMISSION CONTROL - A distributed call control system is provided that can allot bandwidth amongst several call controllers. The distributed call control system includes one or more access elements that interface with a cloud that execute two or more instances of call processing servers that administer call control. The cloud members negotiate and determine bandwidth allocation amongst the members and the access elements. If an access element requires more bandwidth, the access element assesses its own needs and requests more bandwidth from the cloud. The negotiation and requests for bandwidth are accomplished with a set of dynamic and static bandwidth data that regiment the control of the bandwidth. | 01-24-2013 |
20130173812 | SIP TRANSFER IN A BACK-TO-BACK USER AGENT (B2BUA) ENVIRONMENT - The system generates a change in the SIP INVITE message during a call transfer. Here, a user relation element involved in the call can change the header information in the message to include the endpoint view of the transferring party. Thus, the INVITE message is redirected to the transferring party's user relation element, which can interpret the received message and “unravel” the B2BUAs in the existing call path. The system includes changes in the user relation element to effect the message change and interpret the message once received. Changes to the user relation element forgo the need to change the communication endpoints. | 07-04-2013 |
Patent application number | Description | Published |
20140095530 | CONTAINER DATABASE - A container database may contain multiple database dictionaries, each database dictionary defining a pluggable database. When database sessions are established on a container DBMS, each database session is given access to a pluggable database by establishing the respective database dictionary of the pluggable database as the database dictionary for that database session. Database commands issued through database session can only access the database objects defined in the database dictionary established for the database session. | 04-03-2014 |
20140095546 | COMMON USERS, COMMON ROLES, AND COMMONLY GRANTED PRIVILEGES AND ROLES IN CONTAINER DATABASES - Techniques for common users and roles, and commonly-granted privileges and roles are described. In one approach, the DBMS of a container database allows for the creation of common roles and common users that are shared across the container database. Thus, when a common role or a common user is established, the common role or common user is propagated to each database of the container database. In another approach, the DBMS of a container database allows privileges and roles to be granted commonly or locally. When a privilege or role is granted commonly, the privilege applies in each of the databases of a container database. When a privilege or role is granted locally, the privilege applies only in the database to which the grantor of the privilege or role established a connection. | 04-03-2014 |
20140164331 | TECHNIQUES FOR BACKUP RESTORE AND RECOVERY OF A PLUGGABLE DATABASE - A container database stores redo records and logical timestamps for multiple pluggable databases. When it is detected that a first read-write instance of the pluggable database is opened and no other read-write instances of the pluggable database are open, offline range data associated with the pluggable database is updated. When it is detected that a second read-write instance of the pluggable database is closed, and the second read-write instance is the last open read-write instance, the offline range data associated with the pluggable database is updated. The pluggable database is restored to a logical timestamp associated with a restore request based on the offline range data. | 06-12-2014 |
Patent application number | Description | Published |
20120099443 | PATH DIAGNOSIS IN COMMUNICATION NETWORKS - One embodiment of the present invention provides a system for mapping all possible paths between a source node and a destination node. During operation, the system receives a management frame, determines all possible next-hop nodes based on a destination address carried in the payload of the management frame. The system then selects one of the next-hop nodes, and modifies payload of the received management frame to include information associated with the next-hop nodes and the selected next-hop node. The system then forwards the modified data frame to the selected next-hop node. | 04-26-2012 |
20120218990 | Virtual Port World Wide Names - A network switch allows defining a virtual port worldwide name (VPWWN) and associating the VPWWN with an F_port of the network switch, for use by a host bus adaptor (HBA) connecting to the network switch. Both a default and a user VPWWN may be defined, with the user VPWWN typically taking precedence over the default VPWWN. A database of VPWWN associations may be used to ensure uniqueness of the user VPWWN. Where the HBA allows dynamic assignment of WWNs, the VPWWN may be pushed to the HBA. The VPWWNs may be deleted, and moved to another port as desired. | 08-30-2012 |
20140286194 | Virtual Port World Wide Names - A network switch allows defining a virtual port worldwide name (VPWWN) and associating the VPWWN with an F_port of the network switch, for use by a host bus adaptor (HBA) connecting to the network switch. Both a default and a user VPWWN may be defined, with the user VPWWN typically taking precedence over the default VPWWN. A database of VPWWN associations may be used to ensure uniqueness of the user VPWWN. Where the HBA allows dynamic assignment of WWNs, the VPWWN may be pushed to the HBA. The VPWWNs may be deleted, and moved to another port as desired. | 09-25-2014 |