Abstract: The device provides protection for VoIP or like time-sensitive traffic. Packets arriving at a network interface in the data link layer are inspected to identify signaling packet, which are then queued for further analysis. The signaling packets are analyzed for compliance with adaptive criteria to determine whether the packets are considered safe to pass to a user, and the signaling packets failing to meet the adaptive criteria are rejected. The adaptive criteria based are updated based on historical data pertaining to the signaling packets from the same source address for the same user account.
Abstract: The present invention provides a method and system for processing media data on a host processor. The method and system involve receiving media data, generating clocking signals, transferring media data to host processor buffers, generating media transfer done interrupts for each media data stream and generating an override interrupt to indicate to the host processor to process the media data. The override interrupt has high priority and effectively indicates to the host processor to forgo all other scheduled tasks and to start processing the media data.
Abstract: A system and method for call handling make use of voiceprinting techniques to identify parties on the call and then allow call functions to be performed in accordance with the identified parties. These systems and methods can be used in conjunction with known call analysis and blocking techniques to reduce the likelihood that a caller from a restricted environment can connect to an unauthorized party by calling an authorized number and then having the call redirected, conferenced or otherwise transferred to the unauthorized party.
Abstract: A data driven communication system has three layers consisting of destination, people or network nodes, and devices. Software agents represent the entities of these layers and relationships between agents are defined by policies or chains of policies. These relationships are used to determine communication paths within the system as well as features associated with a particular communication. A database representation of the objects (agents and policies) is used to configure the system and receive updates to the system by an administrator. A graphical user interface can be used to enter data into the database and facilitates an intuitive understanding of the nature of the relationships involved.