Patent application number | Description | Published |
20080292077 | Detection of spam/telemarketing phone campaigns with impersonated caller identities in converged networks - A method of detecting a campaign of unwanted telephone calls in a converged telephone network, including populating a first set of caller identifications where no call has been initiated to the caller identification during a predetermined period of time, populating a second set of caller identifications where a call has been initiated to the caller identification during the predetermined period of time, performing a homogeneity statistical test analysis of the first set and the second set, and interpreting the statistical analysis results in order to detect the campaign of unwanted telephone calls in the converged telephone network. Some embodiments include analyzing log messages to determine a source of the most telephone call traffic, and blocking the completion of telephone calls subsequently initiated by the determined source of the most telephone call traffic. | 11-27-2008 |
20080307487 | System and method of network access security policy management for multimodal device - A system and method are provided for management of access security for access by a multimodal device to a converged fixed/mobile network. An inter-technology change-off monitoring entity (ICME) is provided to monitor an inter-technology change-off of the multimodal device and to notify a policy manager of the inter-technology change-off. The policy manager looks up in a policy database, security policies applicable to the user of the multimodal device and the particular technology being used by the multimodal device. The policy manager conveys to various policy enforcement points throughout the converged fixed/mobile network the applicable security policies which take into account the user's identity and the access technology being used. | 12-11-2008 |
20090006867 | System, device and method for providing data availability for lost/stolen portable communication devices - A system, device and method for providing data availability for a portable communication device, including various combinations of the following steps: notifying an operator that the portable communication device is missing; triggering encryption of data on the portable communication device; sending a data retrieval command to the portable communication device; authenticating the data retrieval command; retrieving data from the portable communication device; identifying a portion of the data retrieved from the portable communication device that is confidential; encrypting the identified confidential data on the portable communication device; and erasing the identified confidential data from the portable communication device or recovering the portable communication device and decrypting the confidential data on the portable communication device. | 01-01-2009 |
20090025075 | On-demand authentication of call session party information during a telephone call - A method comprises a plurality of operations. An operation is performed for requesting authentication of a target call session party during a call session between the target party and a call session party requesting said authentication. An operation is performed for receiving authentication information of the target call session party during the call session in response to requesting said authentication. An operation is performed for facilitating authentication of said authentication information during the call session in response to receiving said authentication information. | 01-22-2009 |
20090046839 | Verifying authenticity of called party in telephony networks - A method comprising a plurality of operations. An operation is provided for receiving an authentication certificate of a called party. Telephony apparatus of a party calling the called party performs receiving the authentication certificate. An operation is provided for facilitating authentication of the authentication certificate and called party identification information thereof in response to receiving the authentication certificate. An operation is provided for providing an authentication notification in response to facilitating the authentication of the authentication certificate and the called party identification information. The authentication notification indicates successful authentication in response to the authentication being successful and wherein the authentication notification indicates non-successful authentication in response to the authentication not being successful. | 02-19-2009 |
20090106156 | Network-based DRM enforcement - A method of network-based digital rights enforcement, and related enforcement device, the method including one or more of the following: embedding information into digital content requested by an end user; providing a signature for the digital content to a service provider; providing a key to the service provider, the key being necessary for reading the information embedded into the digital content; providing an algorithm to the service provider for extracting the information embedded into the digital content; providing an identification to the service provider of a content provider that provides the digital content; extracting the signature from the digital content requested by the end user; analyzing the signature to determine whether a signature match exists; and determining whether the end user is a legitimate authorized user of the requested digital content or capable of distributing content. | 04-23-2009 |
20090328071 | SOFT DENIAL OF APPLICATION ACTIONS OVER THE NETWORK COMMUNICATIONS - A soft-denial system for client-server networks is disclosed for translating server authorization denials into responses that are known to be innocuous to the client application. The soft-denial system includes a client-application which originates a service request across a network to a server-application which rejects the request due to lack of authorization and subsequently provides a denial response. A soft-denial application intercepts the denial response, translates the response into a response known to be innocuous to the client-application, and forwards the innocuous response to the client-application. The soft-denial system is particularly useful for overcoming client-application failures due to authorization expectation mismatches. | 12-31-2009 |
20090328095 | MANAGING UNDESIRABLE CONTENT IN IP VIDEO BROADCAST TRAFFIC - A method and apparatus are provided for suppressing display of advertisements within a video over IP stream provided by a content provider. Metadata is prepended to advertisements within the stream. When the stream is received by an access aggregation point, the access aggregation point compares the metadata of an advertisement with preset criteria provided by an enterprise subscriber, and suppresses the advertisement if a comparison of the metadata and the preset criteria indicate that the advertisement is undesirable to the enterprise subscriber. The access aggregation point suppresses the advertisement by switching to a second video channel within the stream for the duration of the advertisement. In this way, the access aggregation point can control display of content provider advertisements without manipulating data within the stream, so as to allow the enterprise subscriber to prevent display of undesirable advertisements to endpoints within the enterprise subscriber site such as set-top boxes within hotel rooms. | 12-31-2009 |