Abstract: A method includes electronically identifying a first item that a customer intends to purchase while the customer is shopping and electronically providing content to the customer in response to the identifying to entice the customer to purchase a second, different item.
Type:
Grant
Filed:
October 16, 2009
Date of Patent:
July 12, 2011
Assignee:
Verizon Business Global LLC
Inventors:
Todd Clark, David J. O'Neill, Ethan Fox
Abstract: A method and system of provisioning resources installed in a network element. Resources are installed in the network element. As resources are placed into service, a notification is transmitted to the vendor. The vendor generates an invoice, and the service provider generates a purchase order. Furthermore, a capacity planning system may monitor the system as resources are placed into service. If the amount of spare resources fall below a predetermined limit, the capacity planning system may transmit a request to the vendor for the additional equipment. In this manner, resources may be installed prior to the actual need for the resources. The resources may then be paid for by the service provider as the resources are needed and placed into service, thereby enabling a risk-sharing arrangement between the service provider and the vendor.
Abstract: The present invention is an intelligent services network that uses a switch controller. The switch controller controls the operation of one or more programmable switches to accept calls from a public switched telephone network. The intelligent service network comprises intelligent service network components that are used for enhanced service processing, interconnection to external networks, and other call functions. Communication between the components allows for call set-up, connection to a terminating party, transfer to an alternate intelligent service network component, and termination of the call.
Type:
Application
Filed:
March 16, 2011
Publication date:
July 7, 2011
Applicant:
Verizon Business Global LLC
Inventors:
Timothy Darland, Daniel W. Foelker, George Kult, Sharadha Vijay
Abstract: A Voice User Interface (VUI) or Interactive Voice Response (IVR) system utilizes three levels of navigation (e.g. Main Menu, Services, and Helper Commands) in presenting information units arranged in sets. The units are “spoken” by a system in a group to a human user and the group of information at each level is preceded by a tone that is unique to the level. When navigating the levels, the tones of the levels are in a musical progression, e.g. the three-note blues progression I, IV, V, for preceding the groups of information, respectively. The musical progression returns to the tonic of the musical key when the navigation returns to the level one of the first group of information.
Abstract: An approach provides editing of digital media. A platform, as maintained by a service provider, provides a remote proxy editing capability of a plurality of media streams. A first one of the media streams is transmitted to a player of a first customer of the service provider. Further, the method comprises transmitting a second one of the media streams to a player of a second customer of the service provider.
Type:
Grant
Filed:
September 7, 2006
Date of Patent:
June 28, 2011
Assignees:
Verizon Business Global LLC, Verizon Business Network Services Inc., Verizon UK Limited
Inventors:
Maxime G. G. Haot, Richard G. Moore, Sreenivas Rachamadugu
Abstract: An approach provides fraud detection in support of data communication services. A usage pattern associated with a particular account for remote access to a data network is monitored. The usage pattern is compared with a reference pattern specified for the account. A fraud alert is selectively generated based on the comparison.
Type:
Grant
Filed:
May 12, 2004
Date of Patent:
June 28, 2011
Assignee:
Verizon Business Global LLC
Inventors:
Michael F. Caslin, Matthew J. Gilbert, Thomas E. Stepp, Arthur Lance Springer, John Hans Van Arkel
Abstract: An approach provides interdomain traversal to support packetized voice transmissions. A signaling message is received for establishing a voice call from a first endpoint associated with a first domain to a second endpoint associated with a second domain. The first endpoint queries a STUN (Simple Traversal of UDP (User Datagram Protocol)) server to determine information relating to a firewall and network address translator that the first endpoint is behind, and to log into a TURN (Traversal Using Relay NAT (Network Address Translation)) server configured to establish a media path between the first endpoint and the second endpoint. A first proxy server serving the first endpoint communicates with an ENUM (Electronic Number) server to convert a directory number corresponding to the second endpoint to a network address. The first proxy server communicates with a second proxy server serving the second endpoint to establish the voice call.
Abstract: A resilient interface architecture may include at least two interface switches and at least two interface routers. The at least two interface switches may provide connectivity between a subnetwork and a main network. If one of the switches fails, the connectivity otherwise provided by the failed interface switch may be provided by another one of the interface switches. Each interface router may be individually coupled to at least one interface switch. The interface routers may select a transmission path between the subnetwork and the main network through the interface switches. If one of the interface routers fails, the selection of transmission paths otherwise provided by the failed interface router may be provided by another one of the interface routers.
Abstract: A method for analyzing a network element may include assigning values to each of a plurality of vulnerabilities. The method may also include identifying a vulnerability associated with the network element and generating a risk indicator for the network element based on the assigned value associated with the identified vulnerability.
Abstract: An approach is provided for supporting telephony services over a data network. A communication network establishes a voice session from a calling station to a called station associated with a user. A service platform, in communication with the communication network, obtains Caller ID information corresponding to the voice session, and determines an instant communication client of the user. The Caller ID information is transmitted over the data network to the instant communication client for display of the Caller ID information.
Abstract: The present invention is directed to a method for managing transactions in a telecommunications network. The method includes creating an XML transaction detail file. At least one transaction detail record is stored in the XML transaction detail file in response to a telecommunications transaction. The at least one transaction detail record includes transaction data corresponding to the telecommunications transaction.
Abstract: An approach is provided for supporting a plurality of communication modes through universal identification. A core identifier is generated for uniquely identifying a user among a plurality of users within the communication system. One or more specific identifiers are derived based upon the core identifier, wherein the specific identifiers serve as addressing information to the respective communication modes. The specific identifiers and the core identifier are designated as a suite of identifiers allocated to the user.
Type:
Application
Filed:
January 12, 2011
Publication date:
May 12, 2011
Applicant:
VERIZON BUSINESS GLOBAL LLC
Inventors:
Richard G. Moore, Guna D. Gunasekar, Philip E. Lawson-Shanks, Darryl W. Shaw
Abstract: An approach provides detection of unauthorized use of data services. A determination is made as to whether connections supporting remote access to a data network are completed. The number of completed connections associated with a selected attribute is tracked over a time period. It is then determined whether the number of completed connections satisfies a connection frequency threshold. A fraud alert is generated if the connection frequency threshold is satisfied.
Type:
Application
Filed:
January 11, 2011
Publication date:
May 5, 2011
Applicant:
Verizon Business Global LLC
Inventors:
Saralyn M. Mahone, Matthew J. Gilbert, Thomas E. Stepp, Arthur L. Springer, John Hans Van Arkel
Abstract: A system and method are provided for designing ring cover candidates for a network. A ring cover candidate is generated based on configuration information and traffic demand information associated with the network. The ring cover candidate includes a group of rings, where each ring includes a group of network spans. In some implementations consistent with the principles of the invention, a report including characteristics of a ring cover candidate may be generated.
Abstract: An approach is described for providing shared trunking between a telephony gateway and an end office switch. The telephony gateway processes a packetized voice call, and interfaces a shared trunk to an end office switch (e.g., Class 5 switch) configured to switch calls over a circuit-switched telephone network. The trunk utilizes out-of-band signaling (e.g., Primary Rate Interface (PRI) signaling) in support of call establishment or teardown of the packetized voice call.
Type:
Application
Filed:
December 14, 2010
Publication date:
April 14, 2011
Applicant:
VERIZON BUSINESS GLOBAL LLC.
Inventors:
Joel M. Krause, Gary Lance Lockhart, Carl T. Leonard
Abstract: A method and system for providing quality of service in an IP telephony session between a calling party and a called party establishes a high quality of service ATM virtual circuit for the session between first and second devices, each of the devices having ATM capability and IP capability. The first and second devices provide bidirectional translation between IP media and ATM media. The system transports IP media for the session between the calling party and the first device, and between said called party and a second device. The virtual circuit transports ATM media for the session between the first and second devices. An intelligent control layer provides IP and ATM signaling to set up the session.
Abstract: An approach is provided for supporting integrated voice and data services over a common Session Initiation Protocol (SIP)-based Customer Premise Equipment (CPE) device. The device includes a network interface that receives a call from a calling party device to a called party device. Also, the device has signaling conversion logic configured to convert between Session Initiation Protocol (SIP) signaling and circuit-switched telephony signaling to support the call, wherein addressing information of the calling party device is preserved in the conversion. The called party device includes one of a telephone station and a SIP client. The device further includes a voice port coupled to the signaling conversion logic and configured to communicate selectively with the telephone station; and a data port configured to communicate selectively with the SIP client.
Type:
Grant
Filed:
February 23, 2006
Date of Patent:
April 12, 2011
Assignee:
Verizon Business Global LLC
Inventors:
Joel M. Krause, G. Lance Lockhart, John L. Truetken, Christopher A. Martin, Jeffery A. Haltom
Abstract: An approach provides interdomain traversal to support packetized voice transmissions. A signaling message is received for establishing a voice call from a first endpoint associated with a first domain to a second endpoint associated with a second domain. The first endpoint queries a STUN (Simple Traversal of UDP (User Datagram Protocol)) server to determine information relating to a firewall and network address translator that the first endpoint is behind, and to log into a TURN (Traversal Using Relay NAT (Network Address Translation)) server configured to establish a media path between the first endpoint and the second endpoint. A first proxy server serving the first endpoint communicates with an ENUM (Electronic Number) server to convert a directory number corresponding to the second endpoint to a network address. The first proxy server communicates with a second proxy server serving the second endpoint to establish the voice call.
Abstract: A digital signature is applied to digital data in real-time. The digital signature serves as a mark of authenticity assuring a recipient that the digital data did in fact originate from an indicated source. The digital signature may be applied to any digital data, including video signals, audio signals, electronic commerce information, data pertaining to land vehicles, marine vessels, aircraft, or any other data that can be transmitted and received in digital form.