Patent application number | Description | Published |
20080198045 | Transmission of a Digital Message Interspersed Throughout a Compressed Information Signal - A method is disclosed that enables the transmission of a digital message along with a corresponding media information signal, such as audio or video. A telecommunications device that is processing the information signal from its user, such as a speech signal, encodes the information signal by using a model-based compression coder. One such device is a telecommunications endpoint. Then, based on an evaluation of the perceptual significance of each encoded bit, or on some other meaningful characteristic of the signal, the endpoint's processor: (i) determines which encoded bits can be overwritten; and (ii) intersperses the digital message bits throughout the encoded signal in place of the overwritten bits. The endpoint then transmits those digital message bits as part of the encoded information signal. In this way, no additional bits are appended to the packet to be transmitted, thereby addressing the issue of compatibility with existing protocols and firewalls. | 08-21-2008 |
20080199009 | Signal Watermarking in the Presence of Encryption - A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as “watermarking.” The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues. | 08-21-2008 |
20080313737 | Stateful and Cross-Protocol Intrusion Detection for Voice Over IP - A method for detecting intrusions that employ messages of two or more protocols is disclosed. Such intrusions might occur in Voice over Internet Protocol (VoIP) systems, as well as in systems in which two or more protocols support some service other than VoIP. In the illustrative embodiment of the present invention, a stateful intrusion-detection system is capable of employing rules that have cross-protocol pre-conditions. The illustrative embodiment can use such rules to recognize a variety of VoIP-based intrusion attempts, such as call hijacking, BYE attacks, etc. In addition, the illustrative embodiment is capable of using such rules to recognize other kinds of intrusion attempts in which two or more protocols support a service other than VoIP. The illustrative embodiment also comprises a stateful firewall that is capable of employing rules with cross-protocol pre-conditions. | 12-18-2008 |
20080319940 | Message Log Analysis for System Behavior Evaluation - A technique is disclosed that enables the run-time behavior of a data-processing system to be analyzed and, in many cases, to be predicted. In particular, the illustrative embodiment of the present invention comprises i) transforming the messages that constitute an unstructured log into a numerical series and ii) applying a time-series analysis on the resultant series for the purpose of pattern detection. Indeed, it is recognized in the illustrative embodiment that the problem really is to detect patterns that depict aspects of system behavior, regardless of the textual content of the individual log messages. In other words, by analyzing the totality of the messages in the log or logs—as opposed to looking for pre-defined patterns of the individual messages—system behavior can be mapped and understood. The mapping helps in characterizing the system for the purposes of predicting failure, determining the time required to reach stability during failure recovery, and so forth. | 12-25-2008 |
20090024989 | Security Vulnerability Monitor - A method and apparatus for automatically determining whether a security vulnerability alert is relevant to a device (e.g., personal computer, server, personal digital assistant [PDA], etc.), and automatically retrieving the associated software patches for relevant alerts, are disclosed. The illustrative embodiment intelligently determines whether the software application specified by a security vulnerability alert is resident on the device, whether the version of the software application on the device matches that of the security vulnerability alert, and whether the device's hardware platform and operating system match those of the security vulnerability alert. | 01-22-2009 |
20090024990 | Security Vulnerability Monitor - A method and apparatus for automatically determining whether a security vulnerability alert is relevant to a device (e.g., personal computer, server, personal digital assistant [PDA], etc.), and automatically retrieving the associated software patches for relevant alerts, are disclosed. The illustrative embodiment intelligently determines whether the software application specified by a security vulnerability alert is resident on the device, whether the version of the software application on the device matches that of the security vulnerability alert, and whether the device's hardware platform and operating system match those of the security vulnerability alert. | 01-22-2009 |
20090070874 | Signature-Free Intrusion Detection - An apparatus and method are disclosed for detecting intrusions in Voice over Internet Protocol systems, without the use of an attack signature database. In particular, the illustrative embodiment is based on the observation that some VoIP-related protocols (e.g., the Session Initiation Protocol [SIP], etc.) are simple enough to be represented by a finite-state machine (FSM) of compact size. A finite-state machine is maintained for each session/node/protocol combination, and any illegal state or state transition—which might be the result of a malicious attack—is flagged as a potential intrusion. | 03-12-2009 |
20090070875 | Distributed Stateful Intrusion Detection for Voice Over IP - An apparatus and method are disclosed for detecting intrusions in Voice over Internet Protocol systems without an attack signature database. The illustrative embodiment is based on two observations: (1) various VoIP-related protocols are simple enough to be represented by a finite-state machine (FSM) of compact size, thereby avoiding the disadvantages inherent in signature-based intrusion-detection systems.; and (2) there exist intrusions that might not be detectable locally by the individual finite-state machines (FSMs) but that can be detected with a global (or distributed) view of all the FSMs. The illustrative embodiment maintains a FSM for each session/node/protocol combination representing the allowed (or “legal”) states and state transitions for the protocol at that node in that session, as well as a “global” FSM for the entire session that enforces constraints on the individual FSMs and is capable of detecting intrusions that elude the individual FSMs. | 03-12-2009 |
20090103701 | Call Screening Via Observing Called-Party Behavior - A method is disclosed that enables the screening of unwanted telephone calls, such as voice or video calls, for one or more called parties. In accordance with the illustrative embodiment of the present invention, an anti-SPAM system receives signaling information for one or more telephone calls made to one or more called parties by a calling party. Although the calling party can be a human caller, in a SPAM-over-Internet-Telephony context the calling party can alternatively be a server or other network element that originates SPAM voice calls for advertising purposes; both possibilities are accounted for in the illustrative embodiment. The anti-SPAM system then observes the behavior of the called party or parties that is exhibited in response to receiving the telephone calls. Based on the observed behavior, the anti-SPAM system then updates one or more rules for handling future telephone calls made to the protected called parties. | 04-23-2009 |
20090254970 | MULTI-TIER SECURITY EVENT CORRELATION AND MITIGATION - The present invention is directed to the use of a multi-tiered security architecture that includes vendor-operated global security services and policy servers able to exchange security events and mitigation measures. | 10-08-2009 |
20090274143 | State Machine Profiling for Voice Over IP Calls - An apparatus and method for detecting potentially-improper call behavior (e.g., SPIT, etc.) are disclosed. The illustrative embodiment of the present invention is based on finite-state machines (FSMs) that represent the legal states and state transitions of a communications protocol at a node during a Voice over Internet Protocol (VoIP) call. In accordance with the illustrative embodiment, a library of FSM execution profiles associated with improper call behavior is maintained. When there is a match between the behavior of a finite-state machine during a call and an execution profile in the library, an alert is generated. | 11-05-2009 |
20090274144 | Multi-Node and Multi-Call State Machine Profiling for Detecting SPIT - An apparatus and method for detecting potentially-improper call behavior (e.g., SPIT, etc.) are disclosed. The illustrative embodiment of the present invention is based on finite-state machines (FSMs) that represent the legal states and state transitions of communications protocols at nodes during Voice over Internet Protocol (VoIP) calls. In accordance with the illustrative embodiment, a library of FSM execution profiles associated with improper call behavior and a set of rules (or rule base) associated with improper FSM behavior over one or more calls are maintained. When the behavior of one or more finite-state machines during one or more calls matches either an execution profile in the library or a rule in the rule base, an alert is generated. | 11-05-2009 |
20100278325 | Annoying Telephone-Call Prediction and Prevention - A method for predicting whether a telephone call that is being set up will be considered annoying by the called party and, if so, for preventing it from being established. The illustrative embodiment predicts whether a telephone call will be considered annoying by the called party based on temporal characteristics of previous calls from the same caller. For example, when a called party receives an unwanted telephone solicitation, he or she will usually hang up within the first minute. If many telephone calls are made from the same caller, and all of these calls last under a minute, then it is reasonable to predict that future calls from this caller will be considered annoying. | 11-04-2010 |
20100290601 | Method for Characterizing System State Using Message Logs - A method that enables the run-time behavior of a system to be analyzed is disclosed. By analyzing the totality of the messages in the log or logs system behavior can be better understood. The illustrative embodiment of the present invention detects patterns in message logs, clusters similar messages, and determines system behavior based on the clustering of messages. | 11-18-2010 |
20110035749 | Credit Scheduler for Ordering the Execution of Tasks - A method for scheduling the execution of tasks on a processor is disclosed. The purpose of the method is in part to serve the special needs of soft real-time tasks, which are time-sensitive. A parameter Δ is an estimate of the amount of time required to execute the task. Another parameter Γ is the maximum amount of time that the task is to spend in a queue before being executed. In the illustrative embodiment, the preferred wait time Γ | 02-10-2011 |
20110035751 | Soft Real-Time Load Balancer - The present disclosure is based on a multi-core or multi-processor virtualized environment that comprises both time-sensitive and non-time-sensitive tasks. The present disclosure describes techniques that use a plurality of criteria to choose a processing resource that is to execute tasks. The present disclosure further describes techniques to re-schedule queued tasks from one processing resource to another processing resource, based on a number of criteria. Through load balancing techniques, the present invention both (i) favors the processing of soft real-time tasks arising from media servers and applications, and (ii) prevents “starvation” of the non-real-time general computing applications that co-exist with the media applications in a virtualized environment. These techniques, in the aggregate, favor the processing of soft real-time tasks while also reserving resources for non-real-time tasks. These techniques manage multiple processing resources to balance the competing demands of soft real-time tasks and of non-real-time tasks. | 02-10-2011 |
20110035752 | Dynamic Techniques for Optimizing Soft Real-Time Task Performance in Virtual Machines - Methods are disclosed that dynamically improve soft real-time task performance in virtualized computing environments under the management of an enhanced hypervisor comprising a credit scheduler. The enhanced hypervisor analyzes the on-going performance of the domains of interest and of the virtualized data-processing system. Based on the performance metrics disclosed herein, some of the governing parameters of the credit scheduler are adjusted. Adjustments are typically performed cyclically, wherein the performance metrics of an execution cycle are analyzed and, if need be, adjustments are applied in a later execution cycle. In alternative embodiments, some of the analysis and tuning functions are in a separate application that resides outside the hypervisor. The performance metrics disclosed herein include: a “total-time” metric; a “timeslice” metric; a number of “latency” metrics; and a “count” metric. In contrast to prior art, the present invention enables on-going monitoring of a virtualized data-processing system accompanied by dynamic adjustments based on objective metrics. | 02-10-2011 |
20110078383 | Cache Management for Increasing Performance of High-Availability Multi-Core Systems - An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance. | 03-31-2011 |
20110225586 | Intelligent Transaction Merging - An apparatus and methods are disclosed for intelligently determining when to merge transactions to backup storage. In particular, in accordance with the illustrative embodiment, queued transactions may be merged based on a variety of criteria, including, but not limited to, one or more of the following: the number of queued transactions; the rate of growth of the number of queued transactions; the calendrical time; estimates of the time required to execute the individual transactions; a measure of importance of the individual transactions; the transaction types of the individual transactions; a measure of importance of one or more data updated by the individual transactions; a measure of availability of one or more resources; a current estimate of the time penalty associated with shadowing a page of memory; and the probability of rollback for the individual transactions, and for the merged transaction. | 09-15-2011 |
20110239120 | ON-DEMAND FEATURE SERVER ACTIVATION IN THE CLOUD - A feature activation system provides a mixed computing environment that includes a server and cloud computing. The hybrid model splits the execution of a communication feature between the cloud and the enterprise server installed at or with the enterprise. Service activation is linked to a portal that can communicate with either an intermediary system or directly with an entity executing computer programs in the cloud. When the customer desires to use a feature, the customer accesses the portal and activates the feature the enterprise desires. In the background, the portal instantiates a virtual machine, on any cloud platform, and then installs the feature with virtual machine on that cloud server. To execute feature, the enterprise server and the virtual machine exchange information between the server and the cloud and allow the feature to access the enterprise server or enterprise data. When the user has completed feature execution, the instance of the feature may be stopped and discarded and any data may be saved either at the enterprise or within the cloud. | 09-29-2011 |
20110307402 | CONTACT CENTER EXPERT IDENTIFICATION - A system evaluates callers, into a contact center, for possible employment. The evaluations occur while the caller waits in a contact center queue and provide a rating of the callers as potential employees. Ratings may be generated or accumulated from one or more interactions with the contact center, where each interaction with the caller can provide information about the caller's suitability as an employee. Good candidates may be interviewed automatically and/or by a manager. Those candidates that receive good ratings/evaluations and are interested in the position may be hired or provided incentives to help the call center respond to calls. | 12-15-2011 |
20120163576 | SYSTEM AND METHOD FOR CHANGING CONFERENCE MODERATORS DURING A CONFERENCE CALL - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for changing moderators during a e-conference. To change moderators during an e-conference, a system identifies a departure of the original moderator from the e-conference. A moderator can indicate his intention to leave an e-conference through the conferencing system. A participant to replace the original moderator is identified and subsequently promoted to replacement moderator while maintaining the e-conference. Additionally, changing moderators during an e-conference is accomplished by creating a new conference bridge and transferring each participant to the new conference bridge. This method allows for a seamless transfer between moderators during an e-conference without the inconvenience of reconnecting. | 06-28-2012 |
20120166242 | SYSTEM AND METHOD FOR SCHEDULING AN E-CONFERENCE FOR PARTICIPANTS WITH PARTIAL AVAILABILITY - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for scheduling an e-conference for participants with partial availability. Initially, a system identifies a group of participants for the e-conference. The system receives a declaration of availability for the e-conference from at least one participant of the group. The declaration contains the partial availability of the participant based on time restrictions and topics of interest to the participant. Next, a schedule is determined for the e-conference based on the availability of the participants. Finally, the declarations of availability are displayed to the group of participants. In one aspect, participants update their declarations of availability during the e-conference and a schedule is updated to reflect the new declaration of availability. | 06-28-2012 |
20120166534 | SYSTEM AND METHOD FOR GROUPING CONFERENCE PARTICIPANTS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for grouping e-conference participants. A system identifies participants for an e-conference and identifies groups based on e-conference participant characteristics. Participant characteristics such as job function, skill set, department, business unit or physical location are used to group participants. Each of the e-conference participants is associated with at least one group and the system visually displays participants in groups through an e-conference user interface. Additionally, the system retrieves a stored list of e-conference participants and groups from a previous e-conference and restores the list of participants and groups for a current e-conference. | 06-28-2012 |
20120216207 | DYNAMIC TECHNIQUES FOR OPTIMIZING SOFT REAL-TIME TASK PERFORMANCE IN VIRTUAL MACHINE - Methods to dynamically improve soft real-time task performance in virtualized computing environments under the management of an enhanced hypervisor comprising a credit scheduler. The enhanced hypervisor analyzes the on-going performance of the domains of interest and of the virtualized data-processing system. Based on the performance metrics disclosed herein, some of the governing parameters of the credit scheduler are adjusted. Adjustments are typically performed cyclically, wherein the performance metrics of an execution cycle are analyzed and adjustments may be applied in a later execution cycle. In alternative embodiments, some of the analysis and tuning functions are in a separate application that resides outside the hypervisor. The performance metrics disclosed herein include: a “total-time” metric; a “timeslice” metric; a number of “latency” metrics; and a “count” metric. In contrast to prior art, the present invention enables on-going monitoring of a virtualized data-processing system accompanied by dynamic adjustments based on objective metrics. | 08-23-2012 |
20130063543 | SYSTEM AND METHOD FOR VIRTUAL CALL HOLD - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for accomplishing a virtual call on hold. A client communication device, such as a telephone, smartphone, or computer, receives a notification of a communication session to which the user is invited, and establishes a relationship with the communication session. Alternatively, a server associated with the communication session can establish the relationship with the client communication device. Then, the communication device can present an indication of the relationship with the communication session for a duration of the communication session, such that the user can join the communication session at will via a communication channel, and such that the communication channel is not occupied by the communication session unless or until the user joins the communication session. The communication session can be a conference call, video conference, a multi-modal chat wherein multiple users communicate via different modalities. | 03-14-2013 |
20130066978 | SYSTEM AND METHOD FOR A COMMUNICATION SESSION IDENTIFIER - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for a communication session identifier. A communication session identifier can act as a virtual relay between conference participants, forwarding emails, phone calls, attachments, messages, and other information from a central address associated with the communications session identifier. In this manner, a user who desires to communicate with other conference participants only needs to send the communication to the communication session identifier, which in turn distributes the communication to the other parties. These communications can include emails, social networking messages, instant messaging, voice messages, and other forms of communication. | 03-14-2013 |
20130103910 | CACHE MANAGEMENT FOR INCREASING PERFORMANCE OF HIGH-AVAILABILITY MULTI-CORE SYSTEMS - An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance. | 04-25-2013 |
20130254279 | SYSTEM AND METHOD FOR CONCURRENT ELECTRONIC CONFERENCES - Method for scheduling and implementing an electronic meeting conducted among remotely-located users communicating with an agenda server, including: accepting a meeting agenda that includes a plurality of topics, a quorum, an identification of resources used by each topic, an identification of data used by each topic, and an identification of data produced by each topic; partitioning the meeting agenda into at least a first and second group of topics; searching for data dependencies between the first and second groups of topics; searching for resource dependencies between the first and second groups of topics; if data dependencies or resource dependencies are found between the first and second groups of topics, then repartitioning the meeting agenda until the data dependencies and resource dependencies between the first and second groups of topics are reduced below a predetermined dependency threshold; and concurrently scheduling and executing the first and second groups of topics. | 09-26-2013 |
20140064471 | ENHANCING CONFERENCING USER EXPERIENCE VIA COMPONENTS - An enhanced user experience during a telecommunications conference may be achieved by using components of devices associated with users as ephemeral adjuncts to a conferencing system. These components may be associated with equipment in a conference room or location such that other participants in the conference may not recognize the use of the device. The quality of a user's experience may thus be improved by using a device and associated components in close proximity to the user. Other participants in a conference may also perceive a benefit from improved intelligibility. | 03-06-2014 |
20140075493 | SYSTEM AND METHOD FOR LOCATION-BASED PROTECTION OF MOBILE DATA - System and method to provide location-based levels of data protection, the method including: receiving, by a receiver, login credentials of a user of a mobile device; authenticating, by use of a policy server, a credentials-based level of data access as configured by a policy; retrieving, by a geo-location module, a location of the mobile device; determining, by use of the policy server, a location-based level of data access as configured by the policy; and granting sensitive data access based upon a more restrictive limitation of the credentials-based level of data access and the location-based level of data access. | 03-13-2014 |
20140211929 | METHOD AND APPARATUS FOR IDENTIFYING AND MANAGING PARTICIPANTS IN A CONFERENCE ROOM - Systems and methods for identifying participants present in a communication session are disclosed. More particularly, the identification of participants using a shared communication endpoint is enabled. Identification can include receiving information from a first participant that identifies a second participant. The identification of the second participant can include receiving a selection of the second participant from a list of expected conference participants presented to the first participant through a communication device associated with the first participant, after the first participant has been registered as a participant in the communication session. | 07-31-2014 |
20140308970 | DYNAMIC GUIDANCE TO A TARGET CONVERSATION AREA WITH A COMMUNICATION DEVICE - Embodiments disclosed herein provide systems and methods for dynamically guiding a user to a target conversation area with a communication device. In a particular embodiment, a method provides receiving a call request to establish a call with a communication device and determining a location of the communication device. The method further provides determining a target conversation area for a user of the communication device to participate in the call based on the location of the communication device. The method also provides directing the user to the target conversation area. | 10-16-2014 |
20140310347 | PRESENTATION DELAY FEEDBACK IN A WEB CONFERENCING SESSION - Embodiments disclosed herein provide methods and systems for providing presentation delay feedback to a presenter in a web conferencing session. In a particular embodiment, a method includes receiving, from a presenter client, a request to initiate a web conferencing session. The method further includes establishing the web conferencing session between the presenter client and at least one viewing client. During the web conferencing session, the method includes determining delays in presenting a view of the web conferencing session at each of the at least one viewing clients and providing an indication of the delays to a user at the presenter client. | 10-16-2014 |
20150055772 | FACILITATING A CONTACT CENTER AGENT TO SELECT A CONTACT IN A CONTACT CENTER QUEUE - The system and method enable an agent to be able to select a contact (e.g., a voice call or email from a customer) from a contact queue in a contact center. As contacts come into a contact center, the contacts are placed in the contact queue. An agent in the contact center is presented with the contacts along with a profile that is associated with each of the contacts. The profile may contain information about the contacts such as an attitude of the contact, a conversation style of the contact, a sentiment of the contact, and the like. The agent selects one of the contacts in the contact queue. The selected contact is then sent to the agent for handling. | 02-26-2015 |