Patents Assigned to Verizon Business Network Services Inc.
-
Publication number: 20090291663Abstract: A method includes receiving subscriber configuration information for an emergency forking/notification service, the subscriber configuration information including criteria for initiating the forking/notification service and contact information for a recipient of the forking/notification service; receiving an emergency call from a calling device; routing the emergency call to a public safety answering point (PSAP); identifying the emergency call as a candidate for the emergency forking/notification service based on information associated with the calling device and the criteria for initiating the forking/notification service; and automatically initiating a forking/notification session to notify the recipient that an emergency call has been initiated from the calling device.Type: ApplicationFiled: May 21, 2008Publication date: November 26, 2009Applicant: VERIZON BUSINESS NETWORK SERVICES INC.Inventors: Paul T. Schultz, Robert A. Sartini, Martin W. McKee
-
Publication number: 20090285381Abstract: A device may process a call, receive a request to forward the call at a call extension point, obtain information about parked calls from a queue that stores information associated with the parked calls, determine whether the call may be parked or forwarded to a terminating device based on the information, park the call at the call extension point when it is determined that the call may not be forwarded, and forward the call to the terminating device when it is determined that the call may be forwarded.Type: ApplicationFiled: May 13, 2008Publication date: November 19, 2009Applicant: VERIZON BUSINESS NETWORK SERVICES INC.Inventors: David E. PHELPS, Curtis E. ALLEN, Frances D.E. TAYLOR
-
Publication number: 20090288157Abstract: A device receives an indication of detected attack traffic associated with a network, identifies a victim of the attack traffic, and selects a security platform for processing the attack traffic. The device also advertises a tunnel and routing tag information in the network for the selected security platform, receives the attack traffic via the advertised tunnel, and forwards the attack traffic to the selected security platform for processing. The device further receives processed traffic from the selected security platform, and forwards, via the network, the processed traffic to the victim.Type: ApplicationFiled: May 13, 2008Publication date: November 19, 2009Applicant: Verizon Business Network Services Inc.Inventors: Dante J. Pacella, Harold J. Schiller, Norman R. Solis
-
Publication number: 20090279432Abstract: A system and method for intercepting and load-balancing information including one or more mediation devices configured to receive intercept instructions for intercepting information for a predetermined period of time, an intercept access device configured to receive the intercept instructions from the one or more mediation devices, wherein the intercept access device may identify and intercept information based on the intercept instructions and may encapsulate the intercepted information, and an intercept load balancer configured to receive the intercepted information and transmit the intercepted information to the one or more mediation devices for distribution to one or more law enforcement device.Type: ApplicationFiled: May 8, 2008Publication date: November 12, 2009Applicant: VERIZON BUSINESS NETWORK SERVICES INC.Inventors: Norman Richard Solis, Dante J. Pacella, Harold Jason Schiller
-
Publication number: 20090279681Abstract: A method includes defining multiple recipient candidates for a media session request; identifying a geographic location of a communication device that initiates the media session request; identifying a geographic location of each of the recipient candidates at the time of the media session request; determining the optimal recipient candidate for the media session request based on the geographic location of the communication device that initiates the media session request and the geographic location of each of the recipient candidates; and automatically routing the media session request over a network to the determined optimal recipient candidate.Type: ApplicationFiled: May 7, 2008Publication date: November 12, 2009Applicant: Verizon Business Network Services Inc.Inventors: Martin W. MCKEE, Paul T. Schultz, Robert A. Sartini
-
Publication number: 20090268605Abstract: A method and system of an embodiment may include receiving network path information identifying one or more network paths, receiving network traffic information specifying a network ingress and a network egress for the network traffic on a first network path of the one or more identified network paths and the network traffic information specifying one or more attributes of the network traffic, emulating failure of one or more components of the first network path, determining a second network path between the specified network ingress and the specified network egress to accommodate the network traffic from the first network path, and providing information associated with the second network path.Type: ApplicationFiled: April 23, 2008Publication date: October 29, 2009Applicant: Verizon Business Network Services, Inc.Inventors: Gary L. CAMPBELL, Oommen MATHEWS
-
Publication number: 20090262917Abstract: A method may include receiving a call having call data, determining that the call data cannot be forwarded along a call path, assigning an identifier to the call data, forwarding the call along the call path without the call data, and storing the call data and the identifier at a device outside the call path.Type: ApplicationFiled: April 21, 2008Publication date: October 22, 2009Applicant: Verizon Business Network Services Inc.Inventors: Charles F. DELACEY, David E. Phelps
-
Publication number: 20090265764Abstract: Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used by authorized context consumers.Type: ApplicationFiled: April 21, 2008Publication date: October 22, 2009Applicant: VERIZON BUSINESS NETWORK SERVICES INC.Inventors: Paul T. SCHULTZ, Robert A. SARTINI, Martin W. McKEE
-
Publication number: 20090265236Abstract: Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user.Type: ApplicationFiled: March 9, 2009Publication date: October 22, 2009Applicant: VERIZON BUSINESS NETWORK SERVICES INC.Inventors: Paul T. SCHULTZ, Robert A. SARTINI, Martin W. MCKEE
-
Publication number: 20090254674Abstract: A device receives a Session Initiation Protocol (SIP) response that includes a load header associated with a downstream Session Initiation Protocol (SIP) device. The device also determines an amount of traffic to send to the downstream Session Initiation Protocol (SIP) device based on the load header. The device further sends the determined amount of traffic to the downstream Session Initiation Protocol (SIP) device.Type: ApplicationFiled: April 8, 2008Publication date: October 8, 2009Applicants: VERIZON BUSINESS NETWORK SERVICES INC., VERIZON SERVICES CORP., VERIZON SERVICES ORGANIZATION INC.Inventors: Stevan H. Leiden, Brian Somes, Timothy W. Bischoff, Arthur Doskow, Kevin V. Bohn, Gary L. Lockhart
-
Publication number: 20090245094Abstract: A device may receiving alarms identifying failures of network elements, create a site table that includes a list of sites at which the alarms are generated and a number of alarms for each of the sites, determine whether an outage has occurred based on the alarms, analyze whether the outage is a false outage based on a failure of a probe that generates the alarms, and provide a notification that includes the site table, an indication of whether the outage has occurred, or an indication whether the outage is a false outage.Type: ApplicationFiled: March 26, 2008Publication date: October 1, 2009Applicants: VERIZON BUSINESS NETWORK SERVICES INC., MCI COMMUNICATIONS SERVICES, INC.Inventors: Jim N. RUSSELL, Kenny M. HAWKINS, Bob E. TAYLOR, Paul P. HULM
-
Publication number: 20090248714Abstract: In one of many possible implementations, an exemplary system includes a plurality of data subsystems configured to store local data associated with an external party, the data subsystems configured to be maintained by an internal party. The system further includes a data integration subsystem configured to store global data and a defined mapping of the global data to the local data, the global data including a global data record mapped to a local data record having a first data schema type, recognize a migration event in the local data, the migration event including migration of the first schema type local data record to a second schema type local data record, and associate a smart mapping record with the global data record, the smart mapping record configured to selectively map the global data record to one of the first schema type local data record and the second schema type local data record.Type: ApplicationFiled: March 31, 2008Publication date: October 1, 2009Applicant: VERIZON BUSINESS NETWORK SERVICES INC.Inventor: Tse-Hsin Jason Liu
-
Publication number: 20090241165Abstract: In an exemplary system, a compliance policy processing subsystem is selectively and communicatively coupled to a rules management subsystem. The rules management subsystem is configured to maintain a rules database. The compliance policy processing subsystem is configured to facilitate selection by a user of a section of text within a compliance policy, direct the rules management subsystem to identify one or more rules within the rules database that are relevant to the section of text, and display a representation of the relevant rules.Type: ApplicationFiled: March 19, 2008Publication date: September 24, 2009Applicant: VERIZON BUSINESS NETWORK SERVICE, INC.Inventors: David S. Tyree, James E. Tomlinson
-
Publication number: 20090186634Abstract: The method and system for SMS/MMS messaging to a connected device may be realized as a system comprising at least one server module. The at least one server module may be adapted to receive from a connected device an outbound messaging message through a packet-based network. The at least one server module may also be adapted to send the outbound messaging message to an external messaging network. The connected device may be communicatively coupled to the packet-based network. The outbound messaging message may be associated with a user account. The user account may be associated with a telephone number.Type: ApplicationFiled: January 18, 2008Publication date: July 23, 2009Applicants: Verizon Data Services, Inc., Verizon Business Network Services, Inc., Verizon Data Services India Private Limited ViceroyInventors: Ashutosh K. Sureka, Michael J. Naggar, Scott A. Evans, Puneet Kalia, Wei X. Liu, Gangadhar Rao Gogineni, Rahim Charania, Shuchi R. Patel
-
Publication number: 20090183149Abstract: A method performed by a network device may include receiving index information from a second network device identifying an updated application, querying a third network device for the identified updated application, receiving the identified updated application from the third network device, storing the identified updated application received from the third network device and applying stored application user settings from memory to the stored updated application.Type: ApplicationFiled: January 16, 2008Publication date: July 16, 2009Applicants: VERIZON SERVICES CORP., VERIZON BUSINESS NETWORK SERVICES INC., VERIZON DATA SERVICES INC.Inventors: Robert T. MILNE, Rocco P. DEMASI, Ronald L. BLAND, Andrew L. HERMAN, Arthur A. TARRICONE, JR.
-
Publication number: 20090169016Abstract: An approach is provided for securely storing sensitive data. A system is provided that includes a central device configured to receive a key from a requester, to obtain a new key associated with the key, and to transmit the new key to the requestor, and a storage device for storing the new key in association with the key. Also, a secure system is provided that includes a parsing unit that parses an actual data value into a first data field and a second data field, a key generation unit that generates a key, a first process that transmits the key to a central manager and receives a new key associated with the key from the central manager, and at least one storage device configured to store the first data field in association with the key, and to store the second data field in association with the new key.Type: ApplicationFiled: December 27, 2007Publication date: July 2, 2009Applicant: Verizon Business Network Services Inc.Inventor: Thomas Lance DODD
-
Publication number: 20090172148Abstract: Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collecting state data from the one or more routers of one or more protocols at discrete time intervals, the state data being associated with one or more routers of a network, analyzing corresponding state data collected at two or more discrete time intervals, and outputting a result of the analysis of the state data collected from the one or more routers of the network.Type: ApplicationFiled: December 26, 2007Publication date: July 2, 2009Applicant: Verizon Business Network Services Inc.Inventor: GERALD E. UNDERWOOD
-
Publication number: 20090169010Abstract: An approach is provided for securely storing and managing sensitive data. A system and method are provided that include a central device that receives an actual data value from a requester, encrypts the actual data value, obtains a replacement value for the encrypted actual data value, obtains a secondary replacement value based on the encrypted actual data value, and transmits the replacement value to the requester for storage by the requester. The system and method also includes a storage device for storing the secondary replacement value in association with the encrypted actual data value at a secure location. The requester can later use the replacement value to retrieve the actual data value from the central device.Type: ApplicationFiled: December 27, 2007Publication date: July 2, 2009Applicant: Verizon Business Network Services Inc.Inventor: Thomas Lance DODD
-
Publication number: 20090165096Abstract: A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the RADIUS server. The authentication request includes at least a user identifier and a device identifier. The RADIUS server determines an authentication format utilized by the network access server based on the received authentication request. The system may also determine an authorization level to provide with an authentication response.Type: ApplicationFiled: December 19, 2007Publication date: June 25, 2009Applicant: Verizon Business Network Services Inc.Inventors: Jeffrey W. Hughes, Andrew L. Bates, Jared M. Allison
-
Publication number: 20090164580Abstract: A device may include a memory and a processor. The memory may store first information relating to a trigger, second information relating to multimedia content, and a destination party identifier. The memory may further associate the first information, the second information, and the one or more destination party identifiers. The processor may detect that the trigger has been satisfied, and obtain, in response to detecting that the trigger has been satisfied, the multimedia content based on the second information. The processor may also establish a session with a user device using the destination party identifier, and provide the multimedia content to the user device.Type: ApplicationFiled: December 20, 2007Publication date: June 25, 2009Applicant: Verizon Business Network Services Inc.Inventors: Paul T. SCHULTZ, Robert A. Sartini