Patent application number | Description | Published |
20090323677 | SEPARATION OF VALIDATION SERVICES IN VOIP ADDRESS DISCOVERY SYSTEM - In one embodiment, an apparatus may receive at least one call attribute of a public switched telephone network (PSTN) call initiated to a destination telephone number. The apparatus may verify a destination Voice-over-Internet-Protocol (VoIP) call agent for the destination telephone number based on demonstrated knowledge of the PSTN call. The apparatus may transmit an indication the destination VoIP call agent is verified for the destination telephone number. | 12-31-2009 |
20100002686 | RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM - In one embodiment, a system is provided to restrict VoIP communication. The system may validate a Voice over Internet Protocol (VoIP) call initiation message based on demonstrated knowledge of a Public Switched Telephone Network (PSTN) call. | 01-07-2010 |
20100002687 | INTEGRATION OF VOIP ADDRESS DISCOVERY WITH PBXs - A system for verifying VoIP call routing information. The system may include an apparatus integrated with a private branch exchange (PBX). The apparatus may store at least one call attribute of a public switched telephone network (PSTN) call initiated to a destination telephone number. The apparatus may verify a destination Voice-over-Internet-Protocol (VoIP) call agent for the destination telephone number based on demonstrated knowledge of the PSTN call. The apparatus may route a new call either over a VoIP network to the destination VoIP call agent or over a circuit switched network based on whether the destination VoIP call agent is verified for the destination telephone number. | 01-07-2010 |
20100046507 | USING PSTN REACHABILITY IN ANONYMOUS VERIFICATION OF VOIP CALL ROUTING INFORMATION - In one embodiment, an apparatus may verify an identity of a destination Voice-over-Internet-Protocol (VoIP) call agent for a destination telephone number based on demonstrated knowledge of at least one public switched telephone network (PSTN) call initiated to the destination telephone number. The apparatus may also receive the identity of the destination VoIP call agent based on the demonstrated knowledge of the at least one PSTN call initiated to the destination telephone number. | 02-25-2010 |
20100082828 | NODE REPUTATION BASED ON KNOWLEDGE OF PSTN CALLS - A system may provide trust relationship information for a telephone number, where the trust relationship information may indicate whether one or more nodes consider a target node as including or as being associated with a VoIP call agent for the telephone number based on demonstrated knowledge of a PSTN call. The system may determine a target trust relationship to the target node based on the trust relationship information, where the target trust relationship indicates a level of trust a validating node has in the target node being associated with or including the VoIP call agent for the telephone number, and where validating node and the one or more nodes may be in different respective administrative domains of a network. | 04-01-2010 |
20100202438 | AUTO-CONFIGURED VOICE OVER INTERNET PROTOCOL - In one embodiment, an apparatus may receive a call over a Public Switched Telephone Network (PSTN) from a Voice over Internet Protocol (VoIP) adapter. The VoIP adapter may be one or more devices that may create and accept VoIP connections over a network, such as the Internet, and that may transmit a call over the PSTN. The apparatus may store a call detail of the received call in a registry service, where the call detail is associated with a node identifier of the apparatus in the registry service. The apparatus may further determine a dial sequence at which the apparatus may be reached over the PSTN based on corresponding call details also stored in the registry service. | 08-12-2010 |
20100202439 | PREVENTION OF VOICE OVER IP SPAM - In one embodiment, a system is provided to prevent VoIP spam. The system may store call data that is associated with a call to a phone number made over a Public Switched Telephone Network. Subsequently, the system may accept an Internet Protocol telephony connection in response to verification of a demonstrated knowledge of the call. The demonstrated knowledge of the call may be verified based on the call data. | 08-12-2010 |
20120106401 | PREVENTION OF VOICE OVER IP SPAM - In one embodiment, a system is provided to prevent VoIP spam. The system may store call data that is associated with a call to a phone number made over a Public Switched Telephone Network. Subsequently, the system may accept an Internet Protocol telephony connection in response to verification of a demonstrated knowledge of the call. The demonstrated knowledge of the call may be verified based on the call data. | 05-03-2012 |
20120207292 | AUTHORIZING ACCESS BETWEEN COMMUNICATION NETWORKS - Methods and systems of authorising a user of a first packet-based communication network to access a second packet-based communication network are disclosed. A call setup request is received from a user terminal of the user at a first network element of the first packet-based communication network, the authorisation request comprising a first user identity. Responsive to the call setup request, a request is transmitted to create a second user identity from the first network element to a second network element of the second packet-based communication network. The second network element creates the second user identity for use in the second packet-based communication network. The second user identity is derivable from the first user identity according to a predetermined rule. The second user identity is stored in the second packet-based communication network for use with establishing a call associated with the call setup request over the second packet-based communication network. | 08-16-2012 |
20140002578 | Communication System | 01-02-2014 |
20140074944 | Establishing A Communication Event - Methods and computer program products for establishing communication events between an initiator user and a recipient user over a first communication system. The initiator and recipient users are contacts within a second communication system but are not contacts within the first communication system. For the initiator and recipient users, an association between a first user identity in the first communication system and a second user identity in the second communication system is determined. The initiator user device uses the association for the recipient user to determine the first user identity of the recipient user. A setup request to establish the communication event is sent over the first communication system from a first initiator client to a first recipient client. A communication event is authorized to proceed over the first communication system on the basis that the initiator user and the recipient user are contacts within the second communication system. | 03-13-2014 |
20140273990 | Observation Assisted Bandwidth Management - Observation assisted bandwidth management techniques are described. In one or more implementations, a request is received at a terminal to initiate a call with another terminal. Responsive to the request, a communication is formed to be communicated to a service provider for bandwidth parameters, the request including network parameters associated with the terminal. The bandwidth parameters, received form the service provider, are used as part of a model to estimate an amount of bandwidth that is available for the call. The call with the other terminal is initiated, the call configured to at least initially consume the estimated amount of bandwidth. | 09-18-2014 |
20140359408 | Invoking an Application from a Web Page or other Application - Various embodiments provide an application (i.e. “app”) hyperlink that is configured to enable transparent installation of an associated application. The app hyperlink provides a visual representation that can be selected to cause a web platform or operating system to download an application image from a platform app store, install the application, provide the user with visual feedback on the process, and once done, invoke the application by performing an “app switch” or similar operation. | 12-04-2014 |