Verizon Services Corp. Patent applications |
Patent application number | Title | Published |
20140341084 | METHOD FOR PROVIDING CUSTOM RING-BACK TONES - A method is provided for providing customized ring-back tones to callers on a wireline network such as a public switched telephone network having an advanced intelligent network or a VoIP network. When a call request is received from a calling party to connect to a called party through a wireline telephone network it is determined if the calling party is identified in a screening list for the called party. If so, then a customized audible ring-back tone is played to the calling party until the called party is connected to the calling party or until the call request is terminated. | 11-20-2014 |
20140233587 | SYSTEMS AND METHODS FOR POLICY-BASED INTELLIGENT PROVISIONING OF OPTICAL TRANSPORT BANDWIDTH - Policy-based, on-demand provisioning of optical transport bandwidth is disclosed. In one of many possible embodiments, a system is provided for policy-based, on-demand provisioning of optical transport bandwidth. The system includes a layer-specific operation support subsystem (OSS) configured to manage network elements that form a sub-network over an optical transport network. The optical transport network provides bandwidth-on-demand provisioning capabilities. The layer-specific OSS includes one or more predefined bandwidth provisioning policies. The layer-specific OSS is configured to selectively request on-demand provisioning of bandwidth on the sub-network based on the predefined bandwidth provisioning policies. | 08-21-2014 |
20140201791 | ON-SCREEN PROGRAM GUIDE WITH INTERACTIVE PROGRAMMING RECOMMENDATIONS - A subscriber to a video service generally has available to them an on-screen program guide. The program guide lists programming (e.g., TV shows) that are available to the subscriber for a certain upcoming time period. The programming guide may sort the listings by channel and time, areas of interest, age appropriateness and/or MPAA or TV rating, free or additional cost, etc. In an embodiment, the programming guide includes an ability to make a selection to see which TV shows are recommended by reviewers. Such reviewers may be individuals or panels or institutions to which some credibility may be attached—a trusted source. After selecting a reviewer, the subscriber is made aware of the programs recommended by the selected reviewer. | 07-17-2014 |
20140142952 | ENHANCED INTERFACE FOR USE WITH SPEECH RECOGNITION - Improved methods of presenting speech prompts to a user as part of an automated system that employs speech recognition or other voice input are described. The invention improves the user interface by providing in combination with at least one user prompt seeking a voice response, an enhanced user keyword prompt intended to facilitate the user selecting a keyword to speak in response to the user prompt. The enhanced keyword prompts may be the same words as those a user can speak as a reply to the user prompt but presented using a different audio presentation method, e.g., speech rate, audio level, or speaker voice, than used for the user prompt. In some cases, the user keyword prompts are different words from the expected user response keywords, or portions of words, e.g., truncated versions of keywords. | 05-22-2014 |
20140029740 | SYSTEMS AND METHODS FOR USING THE ADVANCED INTELLIGENT NETWORK TO REDIRECT DATA NETWORK TRAFFIC - A method and system are disclosed for providing a low cost mechanism for remotely rerouting queries in a telecommunications network. A service control point (SCP) executes an application which causes a queries to be launched over a LAN or WAN to a remotely located data center. The system contains a primary and secondary data center, in which the secondary data center operations on a ‘hot-standby’ basis. Based on a manually provided indication, maintenance personnel may telephone and interact with a voice response unit or a web-based interface, which indicates that the SCP or SCP application should route queries to the secondary data center. Similarly, the same mechanism can be used to indicate that queries should be re-routed back to the primary data center. This allows remote management for controlling the queries without having to extensively modify the related infrastructure. | 01-30-2014 |
20130244707 | METHOD AND SYSTEM FOR SENDING RING SETTING REMINDERS TO MOBILE DEVICES WITHIN A PREDETERMINED AREA - A method and a system for sending a ring setting reminder to one or more mobile devices within a predetermined area are provided. The ring setting reminder may be a reminder signal sent to cell phones and other mobile devices within a movie theater complex or other predetermined area to remind the users of the mobile devices to silence the ringers of the mobile devices before the start of the movie or other event. The identification of the mobile devices may occur at the predetermined area or through a wireless communication network. The wireless communication network may be configured to identify the predetermined area within the wireless communication network, identify one or more of the mobile devices located within the predetermined area, and send the reminder signal to correspond with the start of an event at the predetermined area. | 09-19-2013 |
20120222062 | PARENTAL CONTROLS IN A MEDIA NETWORK - Access to media content is restricted. A message may be sent to a remote computer requesting access to the media content, wherein the message is based at least in part on user input. A response to the message may be received from the remote computer. It may be determined whether to provide access to the media content based on the response. | 08-30-2012 |
20120166568 | METHOD AND APPARATUS FOR GROUP MESSAGING - Methods, systems, and apparatuses for group messaging are disclosed. An exemplary method includes a group messaging system receiving a broadcast message from an originating user, imposing a limit on a number of text characters included in the broadcast message, identifying a group of intended recipients of the broadcast message, determining contact information for an intended recipient included in the group, determining at least one broadcast message sending method for the intended recipient, and sending the broadcast message to the intended recipient using the at least one broadcast message sending method. | 06-28-2012 |
20120123727 | SELF-SERVICE CIRCUIT TESTING SYSTEMS AND METHODS - In one of many possible embodiments, an exemplary system includes a test management subsystem configured to provide a user portal to a user of a circuit provided by a service provider, the user portal including a tool enabling the user to select a signal loop for testing at least a section of the circuit, the signal loop being selected from a plurality of signal loop options. The system also includes a network management subsystem communicatively coupled to the test management subsystem, the network management subsystem being configured to receive data representative of the selection from the test management subsystem and instruct, based on the selection, a network device along the circuit to execute a loop-back mode. In certain embodiments, the selected signal loop defines a test pattern signal flow for testing a subsection of the circuit. | 05-17-2012 |
20120106728 | METHODS AND SYSTEMS FOR INTEGRATING COMMUNICATIONS SERVICES - Methods and systems providing access to integrated communications services are disclosed. A notification of a call to a user is received at a device associated with the user, the device being connected to a data network and including a base unit, a handset, and a user interface, wherein the device is determined based on retrieved data corresponding to the user, and the retrieved data was retrieved using information pertaining to the call. Input from the user indicative of a response to the notification is also received at the device. Response information reflective of the response to the notification is then sent to the server, wherein the server instructs a service control point to connect the call based on the response to the notification. | 05-03-2012 |
20120102535 | CONTENT STORAGE AND DELIVERY SYSTEM AND ASSOCIATED METHOD AND DEVICE - A system is provided for the storage of content on a network and the delivery of content to subscriber locations. The system includes routers and subscriber set-top boxes in communication with each other and a main content source. Content is delivered over a packet-switching network according to a peer to peer file distribution protocol and is stored in a storage area of the subscriber set-top box, such that each subscriber set-top box is configured to transmit and receive content to and from the main content source and other set-top boxes connected to the network. The set-top boxes may identify a preferred source of content based on various factors, such as geographic distance, Internet Protocol (IP) distance, available bandwidth, integrity of the content, etc. An associated method for accessing content and a set-top box for facilitating the storage and delivery of content are also provided. | 04-26-2012 |
20120008624 | SYSTEMS AND METHODS FOR IMPLEMENTING A PROTOCOL-AWARE NETWORK FIREWALL - A method may include receiving a first packet; determining, in a first processor, whether the first packet meets a criterion to be forwarded to a destination indicated in the first packet; receiving a second packet; determining whether the second packet is of a type for changing the criterion and sending the second packet to a second processor if the second packets is of the type for changing the criterion; receiving instructions, based on the second packet sent to the second processor, to change the criterion; and changing the criterion. | 01-12-2012 |
20110317562 | METHOD AND SYSTEM FOR SIMPLIFYING PROTOCOL ANALYSIS - A system and method in accordance with exemplary embodiments may include receiving, from a user system, one or more protocol analysis request messages via a network, transmitting, to one or more multipurpose interface devices, one or more control signals based on the one or more protocol analysis request messages, receiving, from the one or more multipurpose interface devices, protocol analysis data associated with data traffic transmitted on one or more test networks in response to the transmitted control signals, and outputting, to the user system, the protocol analysis data via the network. | 12-29-2011 |
20110158100 | EARLY TRAFFIC REGULATION TECHNIQUES TO PROTECT AGAINST NETWORK FLOODING - Methods and apparatus for providing an Anti-Flooding Flow-Control (AFFC) mechanism suitable for use in defending against flooding network Denial-of-Service (N-DoS) attacks is described. Features of the AFFC mechanism include (1) traffic baseline generation, (2) dynamic buffer management, (3) packet scheduling, and (4) optional early traffic regulation. Baseline statistics on the flow rates for flows of data corresponding to different classes of packets are generated. When a router senses congestion, it activates the AFFC mechanism of the present invention. Traffic flows are classified. Elastic traffic is examined to determine if it is responsive to flow control signals. Flows of non-responsive elastic traffic is dropped. The remaining flows are compared to corresponding class baseline flow rates. Flows exceeding the baseline flow rates are subject to forced flow rate reductions, e.g., dropping of packets. | 06-30-2011 |
20110138456 | SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION - A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall. | 06-09-2011 |
20110135298 | OPTICAL SIGNAL SHUTOFF MECHANISM AND ASSOCIATED SYSTEM - A mechanism for adjusting or shutting off an optical signal within a network system is provided. The system may include a generating element for providing an optical signal and a bi-directional coupler for transmitting the optical signal to downstream components and fiber links and for transmitting a reflected optical signal based on the reflection characteristics of the downstream components to a converter element. The converter element converts the reflected optical signal to an electrical trigger signal that is used by a processing element to monitor the degradation or operational conditions within the network system. Based on the electrical trigger signal the processing element may adjust or shut off the optical signal at the generating element or at another element within the network system or another network system. The processing element may also send a communication signal to other elements or an operator to indicate unacceptable noise within the network system. | 06-09-2011 |
20110069140 | FACILITATION OF A CONFERENCE CALL - There is provided a system for facilitating a conference call. The system includes a module to generate a real-time voiceprint from a voice input of a participant in the conference call, and a module to provide information indicative of the participant based on the real-time voiceprint. | 03-24-2011 |
20110067119 | IP BASED SECURITY APPLICATIONS USING LOCATION, PORT AND/OR DEVICE IDENTIFIER INFORMATION - Methods and apparatus for determining, in a reliable manner, a port, physical location and/or device identifier, such as a MAC address, associated with a device using an IP address and for using such information, e.g., to support one or more security applications is described. Supported security applications include restricting access to services based on the location of a device seeking access to a service, determining the location of stolen devices, and verifying the location of the source of a message or other IP signal, e.g., to determine if a prisoner is contacting a monitoring service from a predetermined location. | 03-17-2011 |
20100297986 | PRESENCE LITE - A service is provided to cell phone subscribers to improve reachability. A home location register node maintains state information on a subscriber's cell phone status. Cell phone status information includes: off; on, registered and available to receive calls; on, registered but busy participating in an ongoing call; on, registered but temporarily unavailable; and on, registered but unattended. Temporarily unavailable is further qualified: poor reception location, high interference, cell throughput saturation, intentional user disposition. Long term unavailability may also be inferred and indicated depending on the device and/or system status. When a call to a subscriber's cell phone cannot be completed or is not answered, the service annunciates the reason to the calling party. The calling party can then make a more informed decision as to when to reattempt the call and is more likely to reattempt the call. The service is provided in conjunction with call forwarding to landlines phones and/or voicemail. | 11-25-2010 |
20100290341 | SYSTEMS AND METHODS FOR PROVIDING MULTIPLE COMMUNICATION SERVICES OVER EXISTING TWISTED PAIR ACCESS LINES - Systems and methods are described for providing a plurality of communication services over existing access lines such as twisted pair access lines. These services include voice, audio/video, and data communication services, the so-called “triple play” of services. The use of existing communication lines enables these services to be provided at a relatively low cost. Remote terminals are located close to subscriber premises to reduce the length of the existing communication lines connecting subscribers to the network. Data associated with a plurality of communication services may be statistically multiplexed onto the communication lines. Subscribers are provided with the capability to dynamically select services, including the capability to select audio/video signals from a set containing audio/video broadcast signals. The systems and methods enable data to be transported efficiently through the backbone network interconnecting central offices. Capabilities comparable the capabilities of coaxial cable systems are provided at a lower cost than alternative approaches, such as running fiber all the way to the subscriber premises. | 11-18-2010 |
20100271982 | METHODS AND APPARATUS FOR PROVIDING EMERGENCY TELEPHONE SERVICE TO IP-BASED TELEPHONE USERS - For purposes of servicing emergency calls, such as 911 calls, a telephone number is associated with each edge router port used to provide IP service to a customer premise location. A telephone number is associated with the edge router port and the corresponding customer location. The telephone number and location information are stored in a database used for providing emergency calling party location information. When a switch used for routing IP calls detects a telephone call to an emergency call center it determines the edge router port from which the call was placed and the telephone number associated with the port for emergency call purposes. The call is then forwarded to the emergency call service center with the determined telephone number being supplied as the calling party number. Performing a lookup operation using the supplied telephone number the emergency service operator determines the location from which the call was placed. | 10-28-2010 |
20100238810 | Methodology for Measurements and Analysis of Protocol Conformance, Performance and Scalability of Stateful Border Gateways - Testing of Internet-Protocol packet network perimeter protection devices, e.g., Border Gateways such as Session Border Controllers, including dynamic pinhole capable firewalls are discussed. Analysis and testing of these network perimeter protection devices is performed to evaluate the ability of such device to perform at carrier class levels while being subjected to many different protocol test cases. The efficiency of state look table functions as well as call signaling processing capacity, implemented in a particular perimeter protection device, are determined and evaluated. Proper performance and efficiency of such perimeter protection devices are evaluated as a function of: incoming call rate, total pre-existing active calls, and different protocol test cases. Various different network perimeter protection devices, e.g., of different types and/or from different manufactures, can be benchmarked for degree of protocol stack implementation/suitability to carrier class environments and comparatively evaluated. Test equipment devices, e.g., Integrated Intelligent End Points (IIEPs), for fault testing, evaluating and stressing the network perimeter protection devices in a system environment are described. Typically these specialized test devices are used in pairs, one on each side of the firewall under test. These test equipment devices include a traffic generator module, a protocol compliance testing module, monitoring and analysis capability including a CPU utilization analysis module, a protocol analysis module, and a graphical output capability. | 09-23-2010 |
20100161779 | SYSTEM AND METHOD FOR PROVIDING QUALITY-REFERENCED MULTIMEDIA - A system and method for providing quality-referenced multimedia including a receiver configured to receive multimedia from at least one multimedia source, and one or more processors configured to generate a quality reference based on the multimedia, format the quality reference into an elementary stream, and associate the elementary stream with the multimedia to form quality-referenced multimedia. The system and method may also include a transmitter configured to transmit the quality-referenced multimedia for output at one or more output devices and one or more storage systems for storing the quality-referenced multimedia. | 06-24-2010 |
20100158221 | METHODS AND APPARATUS FOR INTEROPERATING COMMUNICATION NETWORKS - PSTN functionality is enhanced by the addition of an external service bridging device (ESBD) between one or more devices, e.g., signal switching points (SSPs), and a service control point (SCP). The ESBD serves as a coupling device to one or more control devices, e.g., other SCPs or IP servers, in addition to the SCP. To support the passing of messages between the SS7 network and the control devices, the ESBD includes message reformatting capabilities. The ESBD monitors for messages directed to SCPs and/or replies to messages directed to an SCP. In response to detecting a message the ESBD checks to determine if the detected message is to be processed or simply forwarded to the SCP. Messages to be processed are intercepted, duplicated, modified, replaced, broadcast, redirected, etc. Replies to broadcast query messages are detected and processed so that a single reply, in the format of an SCP response, is returned. | 06-24-2010 |
20100150142 | Telephone Service Via Packet-Switched Networking - A system and method for providing telephone type services over the internetwork commonly known as the Internet. Public switched telephone networks utilizing program controlled switching systems are arranged in an architecture with the Internet to provide a methodology for facilitating telephone use of the Internet by customers on an impromptu basis. Provision is made to permit a caller to set-up and carry out a telephone call over the Internet from telephone station to telephone station without access to computer equipment, without the necessity of maintaining a subscription to any Internet service, and without the requiring Internet literacy or knowledge. Calls may be made on an inter or intra LATA, region or state, nationwide or worldwide basis. Billing may be implemented on a per call, timed, time and distance or other basis. Usage may be made of common channel interoffice signaling to set up the call and establish the necessary Internet connections and addressing. Calls may be made from telephone station to telephone station, from telephone station to computer or computer to telephone station. | 06-17-2010 |
20100142941 | System and method for obtaining optical signal information - A system is provided for identifying signal propagation information. The system includes at least one component configured to receive an optical input signal and to emit an optical output signal. The emitted optical output signal is representative of the optical input signal, and is associated with characteristic information indicative of the component. A processor is also included, the processor being configured to sense the optical output signal and correlate the characteristic information with said component. | 06-10-2010 |
20100100622 | METHOD, COMPUTER PROGRAM PRODUCT, AND APPARATUS FOR PROVIDING A DISTRIBUTED ROUTER ARCHITECTURE - An apparatus for providing distributed router architecture includes a processing element and a resource availability element. The processing element may be configured to receive indications of receipt of data associated with a service for routing to a destination address. The resource availability element may be in communication with the processing element and may be configured to monitor resource usage over a plurality of distributed resource planes. The processing element may be further configured to allocate a resource associated with routing the data based on the monitored resource usage. | 04-22-2010 |
20100083335 | AUTOMATIC PROVISIONING OF SET-TOP BOXES - A set-top box (STB) detects activation of the STB, and performs, in response to the activation of the STB, a health check of the STB. The STB also detects connection of the STB with a network, and performs, in response to the connection of the STB, the following: a pre-provisioning of the STB, a provisioning of the STB, and a service check of the STB. | 04-01-2010 |
20100074124 | METHOD AND SYSTEM FOR SIMPLIFYING PROTOCOL ANALYSIS - A system and method in accordance with exemplary embodiments may include receiving, from a user system, one or more protocol analysis request messages via a network, transmitting, to one or more multipurpose interface devices, one or more control signals based on the one or more protocol analysis request messages, receiving, from the one or more multipurpose interface devices, protocol analysis data associated with data traffic transmitted on one or more test networks in response to the transmitted control signals, and outputting, to the user system, the protocol analysis data via the network. | 03-25-2010 |
20100064320 | Integrating data on program popularity into an on-screen program guide - A subscriber to a digital cable or satellite TV service generally has available to them an on-screen program guide. The program guide lists programming (e.g., TV shows) that are available to the subscriber for a certain upcoming time period, typically two weeks. The programming guide may sort the listings by channel and time, areas of interest, age appropriateness and/or MPAA or TV rating, free or additional cost, etc. In the embodiments of the present invention, the programming guide includes an ability to make a selection to see which TV shows are currently (or typically) most watched. In one embodiment, this information is presented as a simple “top 10” list by displaying the actual number of television sets having a set top box with an integrated internet protocol (IP) channel that are tuned to that program. In other embodiments, other web-based services (e.g., Nielsen Ratings) are accessed to determine the popularity of television shows. Results may be provided audibly and/or graphically on a subscriber's television display. | 03-11-2010 |
20100058457 | Methodology, Measurements and Analysis of Performance and Scalability of Stateful Border Gateways - Methods and apparatus for testing of Internet-Protocol packet network perimeter protection devices, e.g., Border Gateways such as Session Border Controllers, including 5 dynamic pinhole capable firewalls are discussed. Analysis and testing of these network perimeter protection devices is performed to evaluate the ability of such device to perform at carrier class levels. The efficiency of state look table functions as well as call signaling processing capacity, implemented in a particular perimeter protection device, are determined and evaluated. Proper performance and efficiency of such perimeter protection devices are evaluated as a function of incoming call rate and as a function of total pre-existing active calls. Various different network perimeter protection devices, e.g., of different types and/or from different manufactures, can be benchmarked for suitability to carrier class environments and comparatively evaluated. Test equipment devices, e.g., enhanced Integrated Intelligent End Points (IIEPs), for fault testing, 15 evaluating and stressing the network perimeter protection devices in a system environment are described. Typically these specialized test devices are used in pairs, one on each side of the firewall under test. These test equipment devices include a heavy duty traffic generator module, monitoring and analysis capability including a utilization analysis module, and a graphical output capability. | 03-04-2010 |
20100054316 | DIGITAL SUBSCRIBER LINE (DSL) NETWORK UPGRADE TOOL - A network upgrade tool creates an upgrade project designating a source digital subscriber line access multiplexer (DSLAM), a target DSLAM, and an upgrade type and determines whether the source DSLAM and target DSLAM are eligible for upgrade based on the upgrade type. At least one new digital subscriber line (DSL) path associated with the target DSLAM is identified when the source DSLAM and target DSLAM are eligible for upgrade. Pre-provisionable elements associated with the at least one new DSL path are identified and the identified pre-provisionable elements are provisioned prior to transition from at least one existing DSL path to the at least one new DSL path. A cutover selection is received that indicates that physical network changes associated with the target DSLAM have been made and non-pre-provisioned elements are provisioned following receipt of the cutover selection. | 03-04-2010 |
20100037187 | METHODS AND APPARATUS FOR CONTROLLING A USER INTERFACE BASED ON THE EMOTIONAL STATE OF A USER - Methods and apparatus for modifying a user interface as a function of the detected emotional state of a system user are described. In one embodiment, stress analysis is performed on received speech to generate an emotional state indicator value, e.g., a stress level indicator value. The stress level indicator value is compared to one or more thresholds. If a first threshold is exceeded the user interface is modified, e.g., the presentation rate of speech is slowed. If a second threshold is not exceeded, another modification to the user interface is made, e.g., the speech presentation rate is accelerated. If the stress level indicator value is between first and second thresholds, user interface operation continues unchanged. The user interface modification techniques of the present invention may be used in combination with known knowledge or expertise based user interface adaptation features. | 02-11-2010 |
20090296895 | METHODS AND APPARATUS FOR REDUCING DATA CAPTURE AND STORAGE REQUIREMENTS FOR CALL AND TRANSACTION RELATED MESSAGE MONITORING AND FRAUD DETECTION - Systems for monitoring, storage, and analysis of information in signaling messages, communicated from originating networks to a destination network through one or more intermediate networks are described. Correlation and comparison between signaling messages of interest sent from an origination network to signaling messages received by the destination network allows for the detection of inconsistent information, e.g., information fields in a communicated message that have been altered, either intentionally or unintentionally, by an intermediate carrier. The introduction of an additional communications path over which notification messages are forwarded from signaling monitoring equipment in the origination network to signaling monitoring equipment in the destination network allows for a significant reduction in the memory storage requirements at the destination network and in the amount of processing required to match, compare, and evaluate signaling messages. In addition, the reduction in stored messages and processing time allows the monitoring system to operate in near-real time allowing for fraud detection while a call is still in progress. | 12-03-2009 |
20090276664 | METHOD AND APPARATUS FOR MONITORING BIT-ERROR RATE - A test set for evaluating network performance is described, and which may include an output device, a processor, a power supply, a memory unit, and a control terminal. The test set may be configured to receive a user-entered selection of one of a plurality of different bit-error rate profiles and generate a test signal exhibiting the selected bit-error rate profile. The test set may also supply the test signal exhibiting the selected bit-error rate profile to a network under test. In addition, the test set may receive as an input, an output from the network under test. The output may include the test signal exhibiting the selected bit-error rate. The test set may evaluate the received test signal and determine the performance of the network in response to the received test signal exhibiting the bit-error rate. The test set may then output the results of the evaluation. | 11-05-2009 |
20090254674 | SESSION INITIATION PROTOCOL (SIP) OVERLOAD PROTECTION - A device receives a Session Initiation Protocol (SIP) response that includes a load header associated with a downstream Session Initiation Protocol (SIP) device. The device also determines an amount of traffic to send to the downstream Session Initiation Protocol (SIP) device based on the load header. The device further sends the determined amount of traffic to the downstream Session Initiation Protocol (SIP) device. | 10-08-2009 |
20090244290 | Systems and methods for monitoring, troubleshooting and/or controlling a digital television - A system for monitoring, troubleshooting, controlling, calibrating and/or configuring a digital television is provided. The system includes a functionality module configured to perform one or more functions of a digital television. The system includes a testing module associated with the digital television, communicatively coupled to the functionality module and being configured to receive from the functionality module, data indicative of the one or more functions of the digital television. The testing module is configured to perform processing using the received data to determine whether to alter one or more parameters associated with the one or more functions of the digital television. | 10-01-2009 |
20090238169 | CALL INTERCEPT FOR VOICE OVER INTERNET PROTOCOL (VoIP) - A device receives, from a calling party, a call to a Voice over Internet Protocol (VoIP) subscriber, and generates a request for the calling party to record information. The device also receives information from the calling party based on the request, and provides the information from the calling party and call handling options to the VoIP subscriber. The device further receives a response from the VoIP subscriber to the call handling options, and handles the call based on the VoIP subscriber response. | 09-24-2009 |
20090222577 | BYPASSING AN APPLICATION LAYER GATEWAY - A device may include a client configured to select a network address that an application layer gateway does not recognize, create a message that includes the selected network address as a source address of the message and excludes any address that the application layer gateway will overwrite when the application layer gateway receives the message, and send the message from within a private network through a router to a remote device outside the private network. | 09-03-2009 |
20090220059 | DEFINING THIRD-PARTY VOICE MAIL ACCESS NUMBERS IN VIEW OF LATA BOUNDARIES - A method may include selecting a voice mail out-dial access number corresponding to a local access transport area (LATA) boundary, storing the voice mail out-dial access number on a voice mail system, and providing, by the voice mail system, voice mail out-dial service based on the LATA boundary associated with the voice mail out-dial access number. A method for providing toll-free access to the voice mail system that may be used by customers from both on-network and off-network end points. | 09-03-2009 |
20090205039 | SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION - A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall. | 08-13-2009 |
20090183149 | DATA IMAGING SYSTEM AND METHODS - A method performed by a network device may include receiving index information from a second network device identifying an updated application, querying a third network device for the identified updated application, receiving the identified updated application from the third network device, storing the identified updated application received from the third network device and applying stored application user settings from memory to the stored updated application. | 07-16-2009 |
20090171718 | SYSTEM AND METHOD FOR PROVIDING WORKFORCE AND WORKLOAD MODELING - Workforce and workload prediction is provided. A portal is configured to receive input from a user, wherein the input relates to forecasting workload and workforce for providing a communication service. The workload includes ticket loads relating to repair and provisioning, and the workforce includes human resources and equipment. A load prediction is output in response to the input, wherein the load prediction is generated by a forecast model that utilizes regression analysis of historical data and real-time information that includes workforce availability data and one or more factors impacting the workload. | 07-02-2009 |
20090169167 | FIBER DROP RECEIVING DEVICE - An optical fiber drop receiving device may include a housing assembly including a duct entry port for receiving a drop conduit. A drop receiving cylinder may be rotatably mounted in the housing assembly and connected to the duct entry port. The drop receiving cylinder may be configured to receive a fiber drop and a flow of pressurized air from the duct entry port. The drop receiving cylinder may include an escape port for providing an outlet for the flow of pressurized air. The flow of pressurized air through the escape port may cause the drop receiving cylinder to rotate within the housing assembly. The rotation of the drop receiving cylinder may enable winding of the received fiber drop inside the drop receiving cylinder. | 07-02-2009 |
20090166597 | FIBER DROP INSTALLATION DEVICE - An optical fiber installation device may include a housing having a drop receiving channel extending therethrough. A drive wheel may be rotatably positioned in the housing and configured to rotatably engage a fiber optic drop provided in the drop receiving channel. The housing may include an air pathway for applying a first flow of pressurized air from an air source to the drive wheel. The first flow of pressurized air may cause the drive wheel to rotate and propel the fiber optic drop through the drop receiving channel. | 07-02-2009 |
20090161851 | ORIGINATING SIMULTANEOUS RING SERVICES - A device receives information associated with a calling party, and validates the calling party for an originating simultaneous calls service based on the calling party information. The device also receives information associated with a called party, retrieves called party destination information based on the called party information, and sends an instruction to originate two or more simultaneous calls to the called party based on the called party destination information. | 06-25-2009 |
20090154685 | APPARATUS, METHOD, AND COMPUTER PROGRAM PRODUCT FOR GEOGRAPHIC CALL CENTER STATUS AND SECURITY - An apparatus, method, system, and computer program product are provided for producing a geographical mapping of the status, activity, security, work-force, and other information of call centers. The systems and methods may receive call center data and call data, generate a geographical data, and display at least a portion of the geographical data. | 06-18-2009 |
20090132328 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MANAGING TROUBLE TICKETS OF A NETWORK - Methods, systems, and computer program products are provided for managing the trouble tickets of a network. One or more problems within the network along a plurality of lines of the network may be identified and trouble tickets may be opened for the problems. Each trouble ticket may be for dispatching a technician to the field to address the problem that is the subject of the trouble ticket. A certain amount of time may elapse from when the trouble ticket is opened and when the technician is dispatched. During that time the underlining problem may be resolved for various reasons. To detect the resolution of the problem before the dispatching of the technician, the line may be tested at a predetermined interval. If a test indicates that the problem has been resolved the trouble ticket is closed reducing the likelihood that a technician is dispatched for an already resolved problem. | 05-21-2009 |
20090112917 | METHOD AND COMPUTER PROGRAM PRODUCT FOR USING DATA MINING TOOLS TO AUTOMATICALLY COMPARE AN INVESTIGATED UNIT AND A BENCHMARK UNIT - Sources of operational problems in business transactions often show themselves in relatively small pockets of data, which are called trouble hot spots. Identifying these hot spots from internal company transaction data is generally a fundamental step in the problem's resolution, but this analysis process is greatly complicated by huge numbers of transactions and large numbers of transaction variables to analyze. A suite of practical modifications are provided to data mining techniques and logistic regressions to tailor them for finding trouble hot spots. This approach thus allows the use of efficient automated data mining tools to quickly screen large numbers of candidate variables for their ability to characterize hot spots. One application is the screening of variables which distinguish a suspected hot spot from a reference set. | 04-30-2009 |
20090098860 | METHOD AND SYSTEM OF PROVIDING NAVIGATION SERVICE WITH DIRECTORY ASSISTANCE - An approach is disclosed for providing navigation information for a requested listing to a mobile device caller of a directory assistance call. If the caller selects an option to receive driving directions to the listing destination, the directory assistance provider forwards the listing address to a platform that correlates the address with location coordinates. The platform can poll the calling device to obtain GPS identifying data for the mobile device and derive mapping and routing information. | 04-16-2009 |
20090094133 | ORDERING ASSISTANT - A request is received to configure an order for services. A question tree is accessed, the question tree being related to a form that may be used to place the order. User responses are received to two or more questions included in the question tree. A configuration output is provided that identifies fields in the form to be populated and values for the fields in the form that are to be populated. | 04-09-2009 |
20090089747 | METHOD AND SYSTEM FOR MANAGING CONFIGURATION INFORMATION - An approach is provided for managing a software environment. A system file that includes information of a software environment is built. The system file is validated against one or more rules. A script is output and used to generate standardized configuration information for the software environment. | 04-02-2009 |
20090087179 | MULTI-INTERFACE PROTOCOL ANALYSIS SYSTEM - A device may include a first network module to capture network data at a first location in a network and a second network module to capture network data at a second location in the network different from the first location in the network. The device may include a control module to receive control commands relating to the first network module and the second network module. The control module may forwarded the control commands to the first network module and the second network module. The control module may receive the captured network data from the first network module and the second network module. | 04-02-2009 |
20090086639 | TESTING DYNAMICALLY ADDRESSED NETWORK DEVICES - A method may include receiving, at a first network device, a message from a second network device. The method may include determining whether the message is a test setup message, where the test setup message includes a network address associated with the second network device. A test sequence may be initiated with the second network device based on the network address when it is determined that the message is a test setup message. | 04-02-2009 |
20090083845 | NETWORK FIREWALL TEST METHODS AND APPARATUS - A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall. | 03-26-2009 |
20090083303 | NETWORK USAGE COLLECTION SYSTEM - A system includes a first database to associate a sub-interface identifier with customer information, a second database to store a history of customer usage records, and a first device. The first device may receive information from a routing device, where the information includes the sub-interface identifier for a sub-interface of the routing device and information identifying an amount of network traffic received at or transmitted from the sub-interface over a time period, use the sub-interface identifier to obtain the associated customer information from the first database, associate the customer information with the information identifying an amount of network traffic received at or transmitted from the sub-interface over a time period to create a new customer usage record, and store the new customer usage record in the second database. | 03-26-2009 |
20090067838 | HIGH PERFORMANCE GIGABIT PASSIVE OPTICAL NETWORK - A device determines a bandwidth demand for traffic provided between a line terminal (LT) and multiple optical network terminals (ONTs), and dynamically tunes, based on the determined bandwidth demand, one or more tunable filters provided in the LT and the multiple ONTs to one of balance the traffic, protect the traffic, or increase available bandwidth for the traffic. | 03-12-2009 |
20090064260 | Methods and systems for implementing a universal set top box - A system is disclosed. The system has a first receiver, a second receiver, and an input device configured to transmit a command signal in response to user input. The system also has an input waveguide having a first end in communication with the input device and terminating at the first receiver, and a second end in communication with the second receiver. The input waveguide is arranged to receive and route the command signal to the second receiver. The system also has an output waveguide having a first end in communication with the first receiver, and a second end in communication with the second receive. The second receiver is configured to determine whether the command signal is directed to the first receiver and/or the second receiver based a code contained in the command signal. The second receiver is further configured to execute the command signal when it is determined that the command signal is directed to the second receiver, and relay the command signal through the output waveguide to the first receiver for execution when it is determined that the command signal is directed to the first receiver. | 03-05-2009 |
20090060155 | METHODS AND SYSTEMS FOR CALL MANAGEMENT WITH USER INTERVENTION - Methods and systems for managing a call in real-time are disclosed. Methods and systems consistent with the present invention manage a call in real-time based on input from a user. A service center receives information pertaining to a call to the user from a service control point and sends a notification of the call to a device associated with the user. The service center receives a response to the notification from the user. Thereafter, the service center instructs the service control point to connect the call based on the response. | 03-05-2009 |
20090052889 | OPTICAL NETWORK TERMINAL BACKUP BATTERY CENTRALIZED MONITORING AND VOLTAGE ALERT - An optical network terminal (ONT) battery backup unit (BBU) battery voltage alert system (BVAS). This alert is provided as a supplement to an audio alarm which sounds when the backup battery is discharging because that alarm may not be heard in sufficient time if the alarm is remotely located relative to its customer, e.g., in the customer's basement or outside. A battery monitoring facility, located in a telecommunication service provider's centralized serving office, or remotely located elsewhere, monitors the voltage of each of a plurality of batteries deployed in customers' premises within the geographical area served by that centralized serving office. That battery monitoring facility receives packets via a communication network from each such customer's premises, each of those packets representing a battery voltage measurement. That battery monitoring facility stores these on-going measurements thereby creating a trending database to point to any potential future battery failures. The battery monitoring facility alerts a particular customer via the communication network when its battery is about to fail by email/text, fax, telephone or other similar mechanism. | 02-26-2009 |
20090051556 | OPTICAL NETWORK TERMINAL BACKUP BATTERY VOLTAGE ALERT - An optical network terminal (ONT) battery backup unit (BBU) battery voltage alert system (BVAS). The BVAS can send multiple alerts via email, pager, land-line telephone, wireless telephone, fax, personal digital assistant (PDA), etc. when the backup battery voltage is less than its full voltage. The alerts can be categorized as “marginal” or “bad” depending on degree of battery voltage depletion. Less than full battery voltage can result from battery usage if there is a utility company power outage, or if a cell in the battery fails even if there is no power outage. The alerts can be sent to the customer of the ONT, to the ONT supplier company so it can offer any assistance it can and to a third party monitoring service which can keep track of the history of all such deployed batteries in the customer base of the ONT supplier. This alert is provided as a supplement to an audio alarm which sounds when the backup battery is discharging because that alarm may not be heard in sufficient time if the alarm is remotely located relative to its customer, e.g., in the customer's basement or outside. | 02-26-2009 |
20090028139 | AUTOMATED CONFIGURATION OF A DIGITAL CROSS CONNECT - A request is received to establish a requested connection in a digital cross connect between a first port and a second port. It is determined whether each of the first port and the second port are on a list of ports that are available for the connection. A command is issued to the digital cross connect to establish the requested connection. | 01-29-2009 |
20090028131 | TEST AUTOMATION FOR AN INTEGRATED TELEPHONY CALL MANAGEMENT SERVICE - A test application includes instructions for configuring a digital cross connect. A first modem and a second modem are each connected to at least one telecommunications network and a digital cross connect. An integrated telephony call management service (ITCMS) client includes computer-executable instructions stored on a computer-readable medium included in the test computer. | 01-29-2009 |
20090022115 | MOBILITY LABEL-BASED NETWORKS - A device may receive a discovery signal from a mobile node, register the mobile node in response to receiving the discovery signal from the mobile node, assign a mobility label to the mobile node after the registration, distribute messages describing the mobility label and the mobile node to edge routers in the network to create a label switched path, and route communication messages from a remote node to the mobile node along the label switched path in the network. | 01-22-2009 |
20090019155 | TOKEN-BASED CREDITING OF NETWORK USAGE - A method may include providing content or a service accessible via a network to a user, and issuing a usage token having a usage credit that corresponds to a usage restriction associated with the user's network access subscription. | 01-15-2009 |
20090007220 | THEFT OF SERVICE ARCHITECTURAL INTEGRITY VALIDATION TOOLS FOR SESSION INITIATION PROTOCOL (SIP)-BASED SYSTEMS - A device prevents theft of service attacks on a Session Initiation Protocol (SIP)-based device using an identity assurance protection mechanism, a multiple end-points protection mechanism, and an intrusion detecting protection mechanism. | 01-01-2009 |
20090006841 | SYSTEM AND METHOD FOR TESTING NETWORK FIREWALL FOR DENIAL-OF-SERVICE (DOS) DETECTION AND PREVENTION IN SIGNALING CHANNEL - A device may measure a first performance, associated with legitimate traffic without attack traffic, of a Session Initiation Protocol (SIP)-based protection device implementing authentication; measure a second performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication; and measure a third performance, associated with legitimate traffic and attack traffic, of the SIP-based protection device implementing authentication and return routability filtering. The device may also measure a first performance associated with legitimate traffic of a Session Initiation Protocol (SIP)-based protection device implementing rate-limiting filtering; measure a second performance associated with legitimate traffic and attack traffic of the SIP-based protection device implementing scheme filtering; and measure a third performance associated with legitimate traffic of the SIP-based protection device not implementing rate-limiting filtering without attack traffic. | 01-01-2009 |
20090003793 | FIBER OPTIC CONNECTOR - A fiber optic connector may include a first cover with an integral restraining mechanism and a second cover with a reciprocal restraining mechanism. A fiber optic cable having a ferrule at a terminating end may be placed within the fiber optic connector. A dust cap may be placed on the terminating end of the fiber optic cable. The integral restraining mechanism and the reciprocal restraining mechanism may detachably mate and enclose the terminating end of the fiber optic cable within the fiber optic connector. The fiber optic connector may include one or more gaskets to assist in sealing the connector. | 01-01-2009 |
20090003782 | FIBER OPTIC DROP RIBBON, SYSTEM, AND ASSOCIATED METHOD - A fiber optic drop ribbon is described that can be attached to structures, such as the walls of multi-dwelling units (MDUs), for connecting subscribers to a fiber optic communications network. A number of coated optical fibers are supported by a backing strip of the article having a first and second surface. The first surface is attached to the structure, and the optical fibers are attached to the second surface. A cover strip attaches to the second surface of the backing strip to cover the optical fibers. The cover strip may be removable to provide access to the optical fibers and may reattach to the backing strip following removal. Associated systems and methods are also provided that may include additional components, such as furcation sections, furcation splints, and fiber trays, to facilitate the installation of the article and the connection of subscribers to the fiber optic network. | 01-01-2009 |
20090002149 | SYSTEM AND METHOD FOR PROVIDING ALARM CONNECTIVITY WITHIN A NETWORK - A system is provided for connecting an alarm system to a monitoring center through a fiber optic network. The alarm signals may be transmitted through the electrical wiring within a house or other facility through a fiber optic network and the PSTN and/or Internet to the monitoring center. The connection may include a reverse polarity in a pair of ring and tip lines between an interface device of the fiber optic network and a junction element of the alarm system or between the junction element and a controller of the alarm system. The reverse polarity may be created by connecting an end of a ring line into a tip adapter and connecting an end of a tip line into a ring adapter. | 01-01-2009 |
20080317411 | APC ADAPTER - Optical signals are transmitted via fiber optic cables. The cable ends have connectors that connect to fiber-optic adapters. The interface between a connector and its adapter typically creates unwanted signal reflections. These unwanted signal reflections are mitigated by including an eight degree angle-offset of one face of an optical fiber within the adapter itself, the other face of the optical fiber having no angle offset, and the adapter being contained within a rigid housing. The angle offset of the fiber optic face in the adapter is mated with a complementary angle offset of the optical fiber in the cable connector. Embodiments of the present invention avoid cable management issues presented by previous adapters that included flexible cable between its input and output the previous adapters being designed primarily as jumpers and not suitable for use in tight, crowded spaces. | 12-25-2008 |
20080317038 | MULTIPROTOCOL LABEL SWITCHING (MPLS) INTERFACE WITH VIRTUAL PRIVATE NETWORK (VPN) APPLICATION - A method comprising receiving, from a first node, a first packet at a network application server via a first local area network (LAN); receiving, from a second node, a second packet at the network application server via a second LAN; associating the first packet with a first VPN based on receiving the first packet via the first LAN; and associating the second packet with a second VPN based on reception of the second packet via the second LAN, wherein the first VPN and the second VPN include overlapping network address spaces. | 12-25-2008 |
20080292074 | AUTOMATIC ROUTING OF COMMUNICATIONS TO USER ENDPOINTS - A system may receive configuration information relating to forwarding of communications in a network from a first endpoint to other endpoints. Presence information may also be received for the endpoints. The presence information may include proximity information indicating whether pairs of the endpoints are in physical proximity to one another. The system may forward communications destined for a first of the plurality of endpoints to a second of the plurality of endpoints based on the configuration information and the presence information. | 11-27-2008 |
20080279512 | Fiber optic cable with detectable ferrimagnetic components - A fiber optic cable with detectable ferromagnetic components may include a plurality of detectable ferromagnetic components distributed longitudinally along the cable and insulated from each other. The fiber optic cable may contain the typical layers of fiber core, cladding, coating, strengthening fibers, and cable jacket. Each of the detectable ferromagnetic components may be a ferromagnetic metal strip forming a band around the cable. The metal bands may be distributed at different locations of the cable. Other ferromagnetic materials than metal may be used, as long as they are detectable by a metal detector. The detectable ferromagnetic components may form patterns that may be identified by the metal detector. | 11-13-2008 |
20080273691 | Communication line interface - A communication cable interface having a plurality of interface input jacks, each interface input jack capable of receiving an input connector of a service provider communication cable. The interface has an interface output jack for outputting a plurality of service provider signals onto another communication cable and into a distribution panel for distribution of signals to cabling that has been run throughout a residence. The signals are combined from the interface input jacks onto the interface output jack in a one-to-one relationship among terminals of the respective jacks. | 11-06-2008 |
20080268947 | CROSS PLATFORM GAMING - A first game server is configured to provide a game to a first category of user device. A second game server is configured to provide the game to a second category of user device. A game manager is configured to receive a request from a user device for the game application and to assign the request to one of the first game server and the second game server according to whether the user device is included in the first category of user device or the second category of user device. | 10-30-2008 |
20080244518 | Telecom Business-Oriented Taxonomy for Reusable Services - A method, system, and computer program product for a management and development framework of shared business service assets within a common services oriented architecture strategy are provided. The framework comprises a multi-dimensional business oriented taxonomy that is aligned with organizational business services requiring software support. The framework affords advantageous placement of business service assets using a product publication schema and rapid search and discovery of business service assets through a product discovery schema. Implementation of the framework across multiple units of an organization facilitates business service asset reuse, thereby enabling a minimization of asset redundancy, reduction in business application development time and cost, and rapid market entry for organizational products. | 10-02-2008 |
20080243853 | METHOD AND SYSTEM FOR NOTIFYING AN INVITEE USER WHEN AN INVITING USER ACCESSES A SOCIAL NETWORKING APPLICATION - A system and method may include receiving an access from an inviting terminal requesting access to a social networking application, the access request may be associated with a user identifier, searching a contact database, based on the user identifier and on an application identifier of the social networking application, to identify contact information associated with an invitee terminal, and generating a notification message based on the contact information, the notification message may be useable to indicate to the invitee terminal that the inviting terminal has accessed the social networking application. | 10-02-2008 |
20080243692 | CONTENT INGEST, MAINTENANCE, AND DELIVERY - A method may include receiving content in a server from a remote device; receiving a request to manufacture an optical medium including the content by a manufacture remote from the device; burning the optical medium including the content by the manufacturer; and receiving an identity of an intended recipient of the medium for delivering the optical medium. A method may include receiving first content in a first format and storing the first content in a server; receiving a request for the first content from a first user device; determining format information associated with the first user device; transcoding the first content for the first user device, wherein transcoding includes changing the first format of the first content based on the format information associated with the first user device; and transmitting the transcoded first content to the first user device. | 10-02-2008 |
20080240730 | FIBER CONNECTIVITY FOR EMERGENCY RESPONSE PERSONNEL - A network may include fiber optic lines and fiber distribution panels connected by the one or more fiber optic lines. At least one of the fiber distribution panels may include an optical fiber connector designated as a connector that is for emergency use. The network may further include a plurality of optical network terminals located at premises of subscribers to the network. | 10-02-2008 |
20080240383 | CALLING PARTY NAME PROVISIONING - A system may receive a telephone call request for a Voice over Internet Protocol (VoIP) user. The telephone call request omits a name of a calling party. The system may further determine if the VoIP user has a calling party name feature enabled and obtaining, when the VoIP user has a calling party name feature enabled, the name of the calling party from a Public Switched Telephone Network (PSTN) based repository of calling party names. | 10-02-2008 |
20080240367 | OPTICAL NETWORK TERMINAL BATTERY BACK-UP CONTROL - A system and method for permitting a customer of a telecommunication company, for whom fiber to the premises (FTTP) has been installed, to continue to use the telephone during utility company power failure, by powering both the optical network terminal (ONT) and the customer's telephone(s). The battery backup unit (BBU) maintains telephone usage for a pre-determined period of time after power failure, e.g., two hours, consistent with duration of most utility company power outages. This permits non-interrupted telephone service for most outages and, after that period of time, if utility company power has not been restored, the BBU provides power in order to provide telephone service only on demand by the customer, for up to approximately two more cumulative hours of usage. At the end of each usage on demand, the BBU powers the telephone for approximately five more minutes to permit return phone calls, if any, after which telephone service is shut off until any next usage on demand. | 10-02-2008 |
20080240087 | HYBRID INTERNET PROTOCOL BASED SESSION CONTROL PROTOCOL AND PSTN COMMUNICATIONS - In one of many possible embodiments, a hybrid end-user communication apparatus includes a Public Switched Telephone Network (“PSTN”) interface enabling communication over a Public Switched Telephone Network (“PSTN”) and a packet-switched network interface enabling signaling over a packet-switched network. The apparatus is configured to use the signaling to control a communication over the PSTN. In certain embodiments, the signaling includes Session Initiation Protocol (“SIP”) signaling. In certain embodiments, the communication over the PSTN includes a Public Switched Telephone Network (“PSTN”) media stream transmission over a Public Switched Telephone Network (“PSTN”) media bearer path. | 10-02-2008 |
20080239972 | SYSTEM AND METHOD OF PERFORMANCE MONITORING OF MULTICAST SERVICES WITH MOBILITY SUPPORT - An approach is disclosed for monitoring performance of a network providing multicast and mobility services. A test profile is generated for determining performance of the multicast network. The test profile is uploaded on a mobile host that is configured to communicate over the multicast network, wherein the mobile host is further configured to participate in a test session according to the test profile. Test session information tracked by the mobile host is collected for evaluation of metrics for the performance of the multicast network. | 10-02-2008 |
20080238742 | REMOVING MALICIOUS CODE IN MEDIA - A method may include receiving untrusted digital media; converting the untrusted digital media into an analog signal; converting the analog signal into trusted digital media; and storing the trusted digital media. | 10-02-2008 |
20080238206 | UNIVERSAL INTERFACE FOR BATTERY CHARGER - A battery pack module having a battery and a battery charger suitable for re-charging the battery. The battery pack powers a network terminal such as an optical network terminal (ONT) upon utility-company power failure. Upon return of power from the power utility company the battery charger automatically re-charges the battery. A different battery pack having different battery charger and battery with different battery chemistry can be exchanged for the original battery pack housed within the ONT without requiring any mechanical or electrical modification to the ONT. A battery temperature sensing device in cooperation with a microprocessor, both included with the battery pack, ensures that the recharging of the battery is performed efficiently. | 10-02-2008 |
20080231684 | VIDEO STREAMING SYSTEM - A streaming video system may include a video capture terminal configured to communicate with a first communications network and a video receiving terminal configured to communicate with a second network operatively connected to the first network. The video capture terminal may be configured to capture video data and stream the video data to the receiving terminal via the first network and the second network in substantially real-time. | 09-25-2008 |
20080205627 | METHOD AND APPARATUS FOR PROVIDING TELEPHONE SUPPORT FOR INTERNET SALES - Methods and apparatus for providing manned, e.g., live customer support to customers, e.g., people using the Internet to purchase goods and/or services are described. A person viewing a Web Site, e.g., a customer, is presented with a button which provides the opportunity to talk to a customer service representative. Upon activating the button, e.g., by clicking on it, the customer's computer or other Internet browser device sends a signal, e.g., a call request message, over the Internet indicating that the customer wants to talk with a service representative. The call request message includes the customer's telephone number and/or IP address. In response to the call request message, calling equipment is used to establish a customer service call between the customer and a customer service representative. The equipment can be owned by the telephone company thereby avoiding the need for E-business companies to make investments in telephone equipment. In addition, a customer service representative can be located either at the E-business site or remotely, e.g., at the customer service representative's private home or other site, with the representative being called by the conference equipment as required to service a customer. Voice over IP conference equipment may be used instead or in conjunction with telephone conference equipment where one or both of the customer and service representative have voice over IP capability. | 08-28-2008 |