Patent application number | Description | Published |
20090016322 | Selecting Transport Addresses to Route Streams Between Endpoints - Selecting a transport address for a call session between a first endpoint of a first region and a second endpoint of a second region includes determining that the call session is being initiated. A relationship between the first region and the second region is determined. One or more transport addresses of the first endpoint are identified in accordance with the relationship to yield one or more selected transport addresses. | 01-15-2009 |
20090325491 | SYSTEM FOR UTILIZING IDENTITY BASED ON PAIRING OF WIRELESS DEVICES - In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data. | 12-31-2009 |
20100205280 | System and Method for Performing Signaling on Behalf of a Stateless Client - A system for, and method for, performing state-based signaling on behalf of a stateless client. In one embodiment, the system includes a controller, couplable to a state-based terminal, that translates at least one stateless signaling message received from the stateless client to at least one state-based signaling message for presentation to the state-based terminal thereby facilitating a media stream communications session between the stateless client and the state-based terminal over an Internet Protocol (IP)-based network. | 08-12-2010 |
20110075883 | Method and System for Recording Automatic Call Distributor Calls - A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file. | 03-31-2011 |
20110302400 | SECURE VIRTUAL MACHINE BOOTSTRAP IN UNTRUSTED CLOUD INFRASTRUCTURES - Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure. | 12-08-2011 |
20120219153 | Intercepting a Communication Session in a Telecommunication Network - Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint. A secure channel is established between the key distribution point and an intercepting point. The intercepting endpoint may be determined to be authorized to intercept the secure communication session. The key is provided to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, where the key provides the intercepting endpoint with access to intercept the secure communication session. | 08-30-2012 |
20120303941 | METHOD AND APPARATUS FOR SECURING CPUS BOOTED USING ATTACHED FLASH MEMORY DEVICES - The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time. | 11-29-2012 |
20130142329 | UTILIZING PHYSICALLY UNCLONABLE FUNCTIONS TO DERIVE DEVICE SPECIFIC KEYING MATERIAL FOR PROTECTION OF INFORMATION - A device specific key is generated within an electronic device by providing a challenge to a physically unclonable function (PUF) structure integrated within the electronic device, where the PUF structure outputs a specific response based upon a specific challenge provided to the PUF structure. The PUF response is provided to a cryptographic module integrated within the electronic device, and a device specific key is generated by the cryptographic module utilizing a cryptographic key generation algorithm. The device specific key is generated based upon a combination of input data including the PUF response and data that is specific to the electronic device. | 06-06-2013 |
20140223530 | Secure Network Deployment - In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile. | 08-07-2014 |