Patent application number | Description | Published |
20080292077 | Detection of spam/telemarketing phone campaigns with impersonated caller identities in converged networks - A method of detecting a campaign of unwanted telephone calls in a converged telephone network, including populating a first set of caller identifications where no call has been initiated to the caller identification during a predetermined period of time, populating a second set of caller identifications where a call has been initiated to the caller identification during the predetermined period of time, performing a homogeneity statistical test analysis of the first set and the second set, and interpreting the statistical analysis results in order to detect the campaign of unwanted telephone calls in the converged telephone network. Some embodiments include analyzing log messages to determine a source of the most telephone call traffic, and blocking the completion of telephone calls subsequently initiated by the determined source of the most telephone call traffic. | 11-27-2008 |
20080317233 | METHOD OF SETTING UP A CALL-BACK - The invention concerns a method of setting up a call-back ( | 12-25-2008 |
20090067607 | METHOD OF PROVIDING AN IMPROVED CALL FORWARDING SERVICE - The invention concerns a method of providing an improved call forwarding service in a telecommunications network, and a network unit and a computer program product to execute this method. A call initiated by a caller ( | 03-12-2009 |
20090323917 | METHOD FOR RETRIEVING INFORMATION FROM A TELEPHONE TERMINAL VIA A COMMUNICATION SERVER, AND ASSOCIATED COMMUNICATION SERVER - The invention pertains to a method for retrieving at least one piece of information regarding a telephone communication between at least two telephone terminals ( | 12-31-2009 |
20100002851 | METHOD AND EQUIPMENTS FOR ESTABLISHING TELECOMMUNICATION - The present invention relates to a method for establishing telecommunication between at least a first and a second users within a telecommunication network comprising the following steps: | 01-07-2010 |
20100131611 | Fault-tolerance mechanism optimized for peer-to-peer network - A peer-to-peer network including a set of nodes distributed among a set of processing devices and arranged in a circular form in such a way that each node has a unique successor node. Each node has a memory to store data associated with keys and, on reception of a request containing a key, provides data associated with the key. Each data item stored in the memory of a first node is duplicated in the memory of a second node, different from said first node. The second node is chosen from among the nodes deployed on the set of processing devices different from the processing device on which the first node is deployed. | 05-27-2010 |
20100254529 | METHOD OF COMMUNICATION BETWEEN A COMMUNICATION SERVER AND A TERMINAL - This method concerns the terminals (T) comprising at least one alterable function key (K | 10-07-2010 |
20110093547 | ESTABLISHMENT OF A CONFERENCE WITH A COMMUNICATION FLOW MIXING POLICY - To access a communication managed by a host communicating entity between participant communicating entities including the host communicating entity via a packet network (RP), a third-party communicating entity transmits a message (MI) to the host communicating entity, which message comprises at least one parameter (PM) associated with an identifier of at least one participant communicating entity. The third-party entity's access to a peer-to-peer communication established between the host entity and a participant entity may create a conference between the three entities. The third-party entity's access to a conference communication may cause a participant to be added to the existing conference. The host communicating entity applies a restrictive policy on mixing communication flows exchanged between the communicating entities as a function of the parameter and the identifier of the participant communicating entity associated with the parameter. | 04-21-2011 |