Abstract: Techniques are described for enabling authentication and/or key agreement between communications network stations and service networks. The techniques described include the negotiation and use of a cryptographic primitive shared between a service network and a home environment of a station. The techniques described also feature a key usage indicator, such as a sequence number, maintained by the service network and a station. Comparison of the key usage indicators can, for example, permit efficient authentication of the service network.
Abstract: A system and method can enable a user of a communications network, such as a Public Switched Telephone Network (PSTN), wireless and/or voice over IP network to participate in Presence Availability Management (PAM) and Instant Messaging (IM) activities of a PAM/IM network. In response to phone network triggers, a phone network Service Control Point (SCP) can generate requests to a web server. The web server can translate the requests to presence information that can be forwarded to presence user agents for participants of the PAM/IM network. The presence user agents can present the user's presence information to participants having the user on their “buddy list”. In turn, the presence user agent for the user can forward the presence information for participants on the user's “buddy list” to a media server that can communicate the information to the user through Automatic Speech Recognition, Text to Speech and/or Dual Tone MultiFrequency technology.
Type:
Grant
Filed:
December 20, 2007
Date of Patent:
November 3, 2009
Assignee:
Verizon Laboratories Inc.
Inventors:
Piotr Boni, Michael A. Weintraub, Alex Tserkovny
Abstract: Embodiments of the invention may be used to provide an authentication and key agreement protocol that is more robust against base station, replay and other attacks compared to previously known systems. The nonce-based authentication and key agreement protocol provides security against such attacks while avoiding the problems that arise in systems that use sequence number counters on the home environment and mobile station-sides. In an embodiment, a nonce that is transmitted from the user to the home environment through the serving network, as well as subsequent values for the nonce that are derived from the initial nonce, are used as indices for authentication vectors.
Abstract: A system (130) improves network management. The system (130) associates an event in the network with a network device and provides a geographical map (710). The geographical map (710) displays locations of network devices and indicates which network devices are associated with at least one event.
Type:
Application
Filed:
March 6, 2009
Publication date:
September 17, 2009
Applicant:
VERIZON LABORATORIES, INC.
Inventors:
Weiya LUO, Anthony Wogrin CONFREY, Michael L. TUROK, Bruce WILSON
Abstract: A data link layer switch includes a switching mechanism coupled to a plurality of port interface controllers. Each of the port interface controllers comprises a multicast address table, a multicast matcher, and a timer. The multicast address table stores multicast addresses for hosts attached to the port interface controller. The multicast matcher matches an incoming packet to a target pattern, generates a multicast address from the incoming packet if the incoming packet matches the target pattern, and stores the generated multicast address in the multicast address table. The timer determines an amount of time that the generated multicast address remains in the multicast address table.
Abstract: Embodiments of the invention may be used to provide an authentication and key agreement protocol that is more robust against base station, replay and other attacks compared to previously known systems. The nonce-based authentication and key agreement protocol provides security against such attacks while avoiding the problems that arise in systems that use sequence number counters on the home environment and mobile station-sides. In an embodiment, a nonce that is transmitted from the user to the home environment through the serving network, as well as subsequent values for the nonce that are derived from the initial nonce, are used as indices for authentication vectors.
Abstract: Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can input distribution parameters for the messages. Expiration dates can be associated with the messages such that messages can be deleted once expired.
Abstract: A method for generating business targets includes accessing data (300) corresponding to a number of customers. The data includes variables (310-330) associated with each of the customers and an observed value for each of the customers. The observed value for a customer may represent revenue associated with that particular customer. The method also includes identifying a neighborhood that includes a first customer and a number of the other customers. The method further includes calculating a target for each of the customers in the neighborhood, where the target may represent the potential revenue from each of the customers.
Abstract: A method for estimating end-to-end quality of service (QOS), such as packet loss, delay, and delay jitter, in a packet-switched communications network includes steps for calculating packet loss and packet delay each router output link in a network path and using the packet loss and packet delay calculations for each individual router output link to estimate end-to-end QOS. The method includes calculating the loss probability for all possible numbers of active sources to take into account changes in the number of active sources as active sources connect to and disconnect from the network. As a result, the inventive method allows the number of active sources to vary in its estimation of end-to-end packet loss, delay, and delay jitter for enhanced Internet Protocol network planning.
Abstract: An approach is provided for developing customized games. Customization information is obtained from a user (or someone preparing the game for the user) in response to a menu of options relating to a game, or is automatically collected from customization information already collected. Gaming information, including rules and design layout, is output in response to the customization information for playing the game.
Abstract: An approach is disclosed for sharing images using a mobile device. An image is captured by the mobile device, which can establish a voice call over a wireless network. A menu of options is presented to a user for sharing the image with other users, wherein one of the options includes uploading the image to a remote platform configured to store the image in a folder among a plurality of folders. A text message is generated, in response to selection of the one option, according to a messaging protocol for transmitting the image over the wireless network to a gateway coupled to the remote platform. The text message includes information specifying one of the folders for storing the image. At least one of the folders is identified to indicate how the image is to be shared.
Type:
Application
Filed:
November 30, 2007
Publication date:
June 4, 2009
Applicant:
Verizon Laboratories Inc.
Inventors:
Xi Zhang, Albert L. Schmidt, Stephen D. Morrison, Christopher M. Martin
Abstract: In a node (110) communicating with other nodes in a network (150), a system and method for performing cryptographic-related functions is provided. The node (110) receives and transmits inputs and outputs requiring cryptographic-related processing. When cryptographic processing is required, the node (110) transmits a predefined message to a cryptographic processing component in the node (110) that then performs the desired cryptographic-related processing.
Type:
Application
Filed:
January 22, 2009
Publication date:
May 28, 2009
Applicant:
VERIZON LABORATORIES, INC.
Inventors:
Stuart J. JACOBS, Francis Leo MANNIX, JR., Thomas William CHRISTOFFEL, Scott Andrew BELGARD
Abstract: Methods and devices for the installation of a fiber optic cable to a house or other building structure are provided. The method may include identifying a preferred location of a customer through an indication left by the customer either on the interior side or exterior side of a wall, forming a through opening in the wall near or at the preferred location, and installing the in-wall termination device in the opening. The in-wall termination device may include a wall plate for attaching to an interior surface of the wall. The wall plate includes one or more connectors for receiving ends of cables extending from the exterior and connecting those cables to other cables extending through the interior of the building structure. The method may allow for the installation of the cable without requiring the presence of the customer or requiring access to the interior of the building structure.
Type:
Application
Filed:
July 28, 2008
Publication date:
April 30, 2009
Applicants:
Verizon Laboratories Inc., Verizon New England Inc.
Abstract: A system identifies a location of a user based on a location of a mobile device associated with the user, associates the location of the user to a location having a collection of attractions relating to shopping or entertainment, retrieves layout information associated with the location having the collection of attractions, and provides the layout information to the user on the mobile device.
Type:
Application
Filed:
October 23, 2007
Publication date:
April 23, 2009
Applicant:
Verizon Laboratories Inc.
Inventors:
Hannah Y. MOON, D. Beau Morley, Andrew J. Afram
Abstract: The disclosed methods and systems can employ internet messaging protocols to transmit an alphanumeric message to one or more destination addresses in response to a telephone service customer's notification service request. The request can include a string having a feature code trigger and one or more digits. The destination address can be an electronic mail address, an instant messaging address, a pager number, and/or a telephone number.
Abstract: A food ordering system may receive, from a user, a request to place a food order, identify the user, identify a type of user device used by the user to place the request, identify a user interface client that is tailored to the type of the user device, receive, via the user interface client, input from the user to establish the food order, and provide the food order to a restaurant.
Type:
Application
Filed:
September 27, 2007
Publication date:
April 2, 2009
Applicant:
Verizon Laboratories, Inc.
Inventors:
Andrew J. Afram, D. Beau Morley, Hannah Y. Moon, Joel S. Angiolillo
Abstract: A system and method for ordering and distributing multimedia content including a receiver to receive data for ordering multimedia content, a decoder to decode the data in the event the data is encoded, and distributing the multimedia content based on the data to one or more output devices at a predetermined time.
Abstract: An apparatus and system for recording and managing conversation data occurring over a wireless network via a wireless communication device includes a data interface that transfers conversation data from the communication device to a storage location and a user interface that allows the user to edit and manage the conversation data. In one embodiment, the communication device includes on-board memory to provide temporary storage of the communication data before it is transferred to a playback device or long-term storage device. The inventive service may include playback and/or editing functions as well as an audio-to-text conversion option.
Abstract: A system (130) improves network management. The system (130) associates an event in the network with a network device and provides a geographical map (710). The geographical map (710) displays locations of network devices and indicates which network devices are associated with at least one event.
Type:
Grant
Filed:
October 17, 2006
Date of Patent:
March 10, 2009
Assignee:
Verizon Laboratories, Inc.
Inventors:
Weiya Luo, Anthony W. Confrey, Michael L. Turok, Bruce Wilson
Abstract: An approach is disclosed for providing sharing of content relating to an event. Detection of a plurality of mobile communication devices within a predetermined location is performed. An event is identified corresponding to the predetermined location and a current time. The mobile communication devices are notified to enable exchange of content about the event. The content is received from one or more of the mobile communication devices, wherein the content is accessible by the mobile communication devices.
Type:
Application
Filed:
August 31, 2007
Publication date:
March 5, 2009
Applicant:
Verizon Laboratories Inc.
Inventors:
Albert L. Schmidt, Stephen D. Morrison, Xi Zhang