Patent application number | Description | Published |
20090290695 | Network Telephony Appliance and System for Inter/Intranet Telephony - A network appliance ( | 11-26-2009 |
20100002690 | NETWORK TELEPHONY APPLIANCE AND SYSTEM FOR INTER/INTRANET TELEPHONY - A network appliance ( | 01-07-2010 |
20100074132 | Systems for Providing Feedback to Sending Entities - Systems for providing feedback to sending entities are provided. In some embodiments, systems for providing feedback to at least one sending entity that sends requests are provided, the systems comprising: a receiving entity comprising at least one processor that: determines a number of active sources associated with each of the at least one sending entity; determines a number of sessions that each of the at least one sending entity is able to accept based on the number of active sources determined; and provides an indication of the number of sessions to each corresponding one of the at least one sending entity. | 03-25-2010 |
20100146569 | SET-TOP BOX PEER-ASSISTED VIDEO-ON-DEMAND - A peer-to-peer (P2P) video-on-demand (VoD) system or method use a plurality of LP-enabled VoD set-top box (STB) peers in a pool for providing video content data to a requesting client peer in the pool. One other peer in the pool can be designated as a parent peer for downloading high priority playback content that is substantially immediately needed for playback display. Low priority pre-fetch content can be downloaded to the requesting client peer from another peer in the pool other than the parent peer. Bandwidth at the requesting client peer that is not used by the playback module for downloading the high priority playback video content data can be allocated for downloading the pre-fetch content. Using the requesting client peer, video content data can be served, for the playback display on a video monitor, wherein such served video data content can comprise the playback content and the prefetch content. | 06-10-2010 |
20110010465 | Methods and Systems for Providing Template Based Compression - Methods and systems for providing template based compression are proxided. In some embodiments, methods for providing template based compression on a message having headers and corresponding values are provided, the methods comprising stripping a first portion of the headers and the corresponding values from the message, filtering a second portion of the headers and the corresponding values from the message based on the contents of a template; substituting a third portion of corresponding values in the message with indices from a dictionary corresponding to the third portion of corresponding values; encoding the indices and a fourth portion of the corresponding values into a packet in a different relative order than the corresponding values are arranged in the message, and transmitting the packet to a recipient. | 01-13-2011 |
20110064205 | EMERGENCY TEXT COMMUNICATIONS - A system includes one or more devices connected to or within one of a group of emergency services networks. The one or more devices may generate a text message that includes information identifying a user device, information identifying a geographic location of the user device, and information identifying a particular emergency services network of the group of emergency services networks; establish, based on the text message, a text-based communication session between the user device and a call taker device within the particular emergency services network; store session information regarding the text-based communication session; receive a subsequent text message; and transmit the subsequent text message to the call taker device based on the session information. | 03-17-2011 |
20110107098 | Methods and Systems for Controlling Traffic on a Communication Network - Methods and systems for controlling traffic on a communication network are provided. In accordance with some embodiments, methods for controlling traffic on a communication network are provided, the methods comprising—receiving, at a processor in a receiver, a query message for permission to send a data flow to the receiver; sending a permission message from the receiver; defecting that at least one of a message and a data packet being sent to the receiver has been dropped; and causing the path for sending the data flow to be changed. | 05-05-2011 |
20110216737 | SYSTEMS, METHODS, AND MEDIA FOR IMPLEMENTING CALL HANDOFF BETWEEN NETWORKS - Systems, methods, and media for implementing call handoff between networks are provided, in some embodiments, systems for implementing call handoff between networks are provided, the systems comprising.: at least one device that: receives a call from a first endpoint; establishes a connection between the first end-point and a conference; calls a second endpoint: establishes a connection between the second end point and the conference; and when one of the first endpoint and the second endpoint is able to be connected to a different network from a current network which the one of the first endpoint and the second endpoint is connected to the conference: establishes a connection between the conference and the one of the first endpoint and the second endpoint via the different network; and removes the connection via the current network between the one of the first endpoint and the second endpoint and the conference. | 09-08-2011 |
20120008495 | Methods And Systems For Controlling SIP Overload - Techniques for controlling Session Initiation Protocol (SIP) overload between a sending entity and a receiving entity includes receiving a message at a send buffer at the sending entity and forwarding the message to a receive buffer at the receiving entity if the send buffer is empty of other messages or rejecting the message if the send buffer is not empty of other messages. | 01-12-2012 |
20130016715 | NETWORK TELEPHONY APPLIANCE AND SYSTEM FOR INTER/INTRANET TELEPHONY - A network appliance ( | 01-17-2013 |
20130188783 | EMERGENCY TEXT COMMUNICATIONS - A system includes one or more devices connected to or within one of a group of emergency services networks. The one or more devices may generate a text message that includes information identifying a user device, information identifying a geographic location of the user device, and information identifying a particular emergency services network of the group of emergency services networks; establish, based on the text message, a text-based communication session between the user device and a call taker device within the particular emergency services network; store session information regarding the text-based communication session; receive a subsequent text message; and transmit the subsequent text message to the call taker device based on the session information. | 07-25-2013 |
20140223023 | SYSTEMS FOR PROVIDING FEEDBACK TO SENDING ENTITIES - Systems for providing feedback to sending entities are provided. In some embodiments, systems for providing feedback to a sending entity that sends a request for session are provided, the systems comprising: a receiving entity that receives the request for session from the sending entity, wherein the request for session is used to establish a communication session that takes place after processing the request for session, and wherein the receiving entity comprises at least one hardware processor that: assigns a freed processing slot to the sending entity in response to determining that the request for session has been processed by the receiving entity and that a number of requests for sessions to be processed is less than a first limit. | 08-07-2014 |
Patent application number | Description | Published |
20080222724 | PREVENTION OF DENIAL OF SERVICE (DoS) ATTACKS ON SESSION INITIATION PROTOCOL (SIP)-BASED SYSTEMS USING RETURN ROUTABILITY CHECK FILTERING - A device receives an attack on a Session Initiation Protocol (SIP)-based device, determines a type of the attack, and applies, based on the determined type of the attack, a return routability check filter to the attack. | 09-11-2008 |
20080285520 | METHODS, MEDIA, AND DEVICES FOR MOVING A CONNECTION FROM ONE POINT OF ACCESS TO ANOTHER POINT OF ACCESS - Systems, methods, media, and devices for providing cooperation among digital processing devices in wireless networks are provided. In some embodiments, methods for moving a connection from one point of access to another point of access are provided, sending a request for information from a first mobile node to at least one other node, wherein the request for information contains first information identifying at least one point of access; receiving a response containing second information identifying at least one point of access from the at least one other node; and establishing a connection between the first mobile node and a point of access identified in the second information. In some embodiments, devices that can move a connection from one point of access to another point of access are provided. | 11-20-2008 |
20090006841 | SYSTEM AND METHOD FOR TESTING NETWORK FIREWALL FOR DENIAL-OF-SERVICE (DOS) DETECTION AND PREVENTION IN SIGNALING CHANNEL - A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication; measure a second performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication; and measure a third performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication and return routability filtering. The device may also measure a first performance associated with legitimate traffic of a Session Initiation Protocol (SIP)-based protection device implementing rate-limiting filtering; measure a second performance associated with legitimate traffic and attack traffic of the SIP-based protection device implementing scheme filtering; and measure a third performance associated with legitimate traffic of the SIP-based protection device not implementing rate-limiting filtering without attack traffic. | 01-01-2009 |
20090007220 | THEFT OF SERVICE ARCHITECTURAL INTEGRITY VALIDATION TOOLS FOR SESSION INITIATION PROTOCOL (SIP)-BASED SYSTEMS - A device prevents theft of service attacks on a Session Initiation Protocol (SIP)-based device using an identity assurance protection mechanism, a multiple end-points protection mechanism, and an intrusion detecting protection mechanism. | 01-01-2009 |
20100070600 | METHODS AND MEDIA FOR EXCHANGING DATA BETWEEN NODES OF DISCONNECTED NETWORKS - Methods and media for exchanging data between nodes of disconnected networks are provided, including: determining a query type based on whether a query received at a first node includes at least one keyword or at least a portion of a uniform resource identifier; performing a search of a cache based on the query and the query type; converting the query into a formatted query document; storing the formatted query document in a database, if the search of the cache does not yield at least a predetermined number of data items; retrieving the formatted query document from the database at a predetermined interval; multicasting the retrieved formatted query document from the first node to at least a second node; and receiving, at the first node, a formatted response document from the second node, the formatted response document resulting from a search of a cache of the second node. | 03-18-2010 |
20100135252 | METHODS AND SYSTEMS FOR REDUCING MAC LAYER HANDOFF LATENCY IN WIRELESS NETWORKS - In accordance with the present invention, computer implemented methods and systems are provided for reducing handoff latency in a wireless network. In response to detecting that a handoff is necessary, the present invention uses a selective scanning algorithm that includes the use of a channel mask and/or a caching algorithm for detecting one or more new access points. | 06-03-2010 |
20100296634 | Systems, Methods, and Media for Connecting Emergency Communications - Systems, methods, and media for connecting emergency communications are provided. For example, the methods can include: receiving an emergency communication at a particular public safety answering point from a caller directed to the particular public safety answering point by a location-to-service system; creating a conference on a conference system in response to the particular public safety answering point accepting the emergency communication; selecting a particular call-taker of a plurality of call-takers; sending the particular call-taker an invitation to accept the emergency communication; in response to receiving an indication that the particular call-taker has accepted the emergency communication, connecting the selected call-taker to the conference; connecting the caller to the conference; determining the location of the caller; querying the location-to-service system to identify at least one particular emergency responder of a plurality of emergency responders; and connecting at least one of the at least one particular emergency responder to the conference. | 11-25-2010 |
20120008624 | SYSTEMS AND METHODS FOR IMPLEMENTING A PROTOCOL-AWARE NETWORK FIREWALL - A method may include receiving a first packet; determining, in a first processor, whether the first packet meets a criterion to be forwarded to a destination indicated in the first packet; receiving a second packet; determining whether the second packet is of a type for changing the criterion and sending the second packet to a second processor if the second packets is of the type for changing the criterion; receiving instructions, based on the second packet sent to the second processor, to change the criterion; and changing the criterion. | 01-12-2012 |
20120137357 | SYSTEM AND METHOD FOR TESTING NETWORK FIREWALL FOR DENIAL-OF-SERVICE (DOS) DETECTION AND PREVENTION IN SIGNALING CHANNEL - A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication; measure a second performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication; and measure a third performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication and return routability filtering. The device may also measure a first performance associated with legitimate traffic of a Session Initiation Protocol (SIP)-based protection device implementing rate-limiting filtering; measure a second performance associated with legitimate traffic and attack traffic of the SIP-based protection device implementing scheme filtering; and measure a third performance associated with legitimate traffic of the SIP-based protection device not implementing rate-limiting filtering without attack traffic. | 05-31-2012 |
20120210007 | DENIAL OF SERVICE DETECTION AND PREVENTION USING DIALOG LEVEL FILTERING - A method may include receiving a session initiation protocol (SIP) request message and determining whether a dialog exists corresponding to the request message. The method may also include determining whether the dialog is in a first phase or a second phase when a dialog exists corresponding to the session control protocol message and querying a table indicating valid protocol requests for the determined phase to determine whether the received request message is valid. The method may include rejecting the request message when determined that the request message is not valid. | 08-16-2012 |
20120210421 | MALICIOUIS USER AGENT DETECTION AND DENIAL OF SERVICE (DOS) DETECTION AND PREVENTION USING FINGERPRINTING - A method may include receiving a session control protocol request message and fingerprinting the received session control protocol message. The method may further include comparing the fingerprint of the received request message to a list of fingerprints associated with known malicious user agents and rejecting the request message when the fingerprint of the received message matches any fingerprint in the list of fingerprints associated with known malicious user agents. The method may include comparing the fingerprint of the received request message to the list of fingerprints associated with known non-malicious user agents and accepting the request message when the fingerprint of the received message matches any fingerprint in the list of fingerprints associated with known non-malicious user agents. | 08-16-2012 |
20140023064 | SYSTEMS, METHODS, AND MEDIA FOR CONNECTING EMERGENCY COMMUNICATIONS - Systems, methods, and media for connecting emergency communications are provided. For example, the methods can include: receiving an emergency communication at a particular public safety answering point from a caller directed to the particular public safety answering point by a location-to-service system; creating a conference on a conference system in response to the particular public safety answering point accepting the emergency communication; selecting a particular call-taker of a plurality of call-takers; sending the particular call-taker an invitation to accept the emergency communication; in response to receiving an indication that the particular call-taker has accepted the emergency communication, connecting the selected call-taker to the conference; connecting the caller to the conference; determining the location of the caller; querying the location-to-service system to identify at least one particular emergency responder of a plurality of emergency responders; and connecting at least one of the at least one particular emergency responder to the conference. | 01-23-2014 |
20140254462 | METHODS, MEDIA, AND DEVICES FOR MOVING A CONNECTION FROM ONE POINT OF ACCESS TO ANOTHER POINT OF ACCESS - Systems, methods, media, and devices for providing cooperation among digital processing devices in wireless networks are provided. In some embodiments, methods for moving a connection from one point of access to another point of access are provided, sending a request for information from a first mobile node to at least one other node, wherein the request for information contains first information identifying at least one point of access; receiving a response containing second information identifying at least one point of access from the at least one other node; and establishing a connection between the first mobile node and a point of access identified in the second information. In some embodiments, devices that can move a connection from one point of access to another point of access are provided. | 09-11-2014 |