Access Restricting Patents (Class 379/93.02)
-
Patent number: 8300782Abstract: A security plan for telephone clients allows the client to authenticate itself by sending a coded sequence of DTMF digits to a PBX at the beginning of each call. When the idle client telephone receives a call, it sends a coded DTMF sequence to the PBX. If the client makes a feature invoking call to the PBX while active on the first call, the client will be prompted for the security sequence. The client must send the same sequence of DTMF digits as for the first call. The first call is authenticated by virtue of being a call from the PBX to the telephone. The second call is authenticated by sending a DTMF sequence that matches the one sent with the first call. A call that fails authentication is dropped. The security plan for clients constrains the client to using a callback to originate a call from an idle telephone.Type: GrantFiled: February 20, 2009Date of Patent: October 30, 2012Assignee: Avaya Inc.Inventor: Stephen M. Milton
-
Publication number: 20120230480Abstract: The disclosed embodiments include a method of initiating a call. The method includes receiving, at a network device over a first network, an identifier associated with a called party. The method determines a first security level associated with the first network and identifies a plurality of networks associated with the called party using the identifier. The method queries a database to determine a second security level for each network in the plurality of networks and automatically selects an identified network from the plurality of networks associated with the called party having the second security level at least equal to the first security level. The method completes a call to the called party using the identified network.Type: ApplicationFiled: May 23, 2012Publication date: September 13, 2012Inventor: Carl M. Coppage
-
Publication number: 20120225642Abstract: A method and system are disclosed to proxy mobile and network originated call sessions. A system that incorporates teachings of the present disclosure may include, for example, a method to access a phone directory using a mobile device including transmitting on a data channel of a wireless communications network a request for access to the phone directory, transmitting on the data channel one or more selective requests to search the phone directory, receiving on the data channel one or more successive portions of the phone directory according to the one or more selective requests, and transmitting on the data channel an abbreviated identifier associated with an entry of the phone directory for establishing voice communications with a terminal device. Other embodiments are disclosed.Type: ApplicationFiled: May 17, 2012Publication date: September 6, 2012Applicant: AT&T Intellectual Property I, LPInventor: James GEWECKE
-
Patent number: 8259914Abstract: In one aspect, communication link established from a communication unit to a communications system. A request message is transmitted from a communication unit to the work connection computer and checked with the aid of a user profile of the communication unit, to verify whether the communication unit has log-on authorization. If the verification of the request message is positive, the request message is forwarded from the network connection computer to the connection handling computer in the form of a modified request message. The modified request message is analyzed by the connection handling computer with the aid of an authentication profile of the network connection computer. Once the modified request message has been positively analyzed and the communication unit has been successfully registered, a response message is transmitted from the connection handling computer to the communication unit.Type: GrantFiled: May 11, 2005Date of Patent: September 4, 2012Assignee: Siemens Enterprise Communications GmbH & Co. KGInventors: Jens-Uwe Buβer, Steffen Fries
-
Publication number: 20120220268Abstract: A method of generating device-specific configuration data during the initial set up of a device (12) comprises, during a configuration process running on the device (12), sending from the device (12) a first message and including a device identifier to a server (40) using a first mode of communication associable with a service identifier, sending from the device (12) a second message including the device identifier to a server (46) using a second mode of communication not associable with said service identifier, processing the first message to associate the device identifier with the service identifier, and processing the second message to query if the device identifier has been previously associated with the service identifier, and if so, sending device-specific configuration data to the device (12) for use during the configuration process, wherein after the configuration process is completed, the device-specific configuration data enables authentication using said service identifier when the device uses saiType: ApplicationFiled: September 9, 2010Publication date: August 30, 2012Inventors: Fraser Smith, Mohit Punwani, Micheal I. Strange, Trevor Mensah
-
Publication number: 20120213348Abstract: In one embodiment, a translation gateway is for use between a network of a messaging service provider and a hostile data network. The gateway is to forward messages using a secure connection through the hostile network, to a customer's network. Different types of inbound messages (e.g., voice; fax) can be delivered to a single client process running on a customer machine on the customer network. In addition, the translation gateway may be used to securely forward different types of outbound messages originating from the client process to the service provider's network (where the messages are retransmitted as voice calls or facsimiles into a telephone network). Other embodiments are also described and claimed.Type: ApplicationFiled: May 3, 2012Publication date: August 23, 2012Applicant: j2 Global CommunicationsInventors: Leo A. D'Angelo, Kamran Izadpanah, John J. Bell
-
Publication number: 20120213347Abstract: In certain embodiments, the present invention comprises a system and method for providing feature services in a multimedia communication environment. The system and method comprise comparing signaling messages with control data to identify one or more service enablers and application servers that are responsive to the signaling message. Each responsive service enabler is invoked in accordance with an associated policy hook.Type: ApplicationFiled: April 30, 2012Publication date: August 23, 2012Applicant: Cisco Technology, Inc.Inventors: Jonathan D. Rosenberg, Fleming S. Andreasen
-
Publication number: 20120213219Abstract: In one embodiment, a voicemail system stores a voicemail message left by a first caller for a second caller. The voicemail system facilitates the transfer of a call out of a playback of the voicemail to the first caller and generates a credential that is coupled with the call. If the first caller is not available for the call, the second caller is transferred to the voicemail mailbox of the first caller where second caller records a second voicemail, which is placed in the mailbox of the first caller. The call may be transferred back to the mailbox of the first caller in response to a transfer code entered by the second caller. The voicemail system verifies the second caller based on the credential and returns the second caller to the appropriate location in the queue of voicemails.Type: ApplicationFiled: February 22, 2011Publication date: August 23, 2012Inventors: Shmuel Shaffer, Amit Barave
-
Patent number: 8249238Abstract: In some embodiments, a call forking dynamic key exchange system may include one or more of the following features: (a) a memory comprising, (i) a dynamic key exchange program that allows a caller to initiate a call having a security request to multiple subscribers and selecting at least one subscriber who answers the call, and (b) a processor coupled to the memory that executes the dynamic key exchange program.Type: GrantFiled: September 21, 2006Date of Patent: August 21, 2012Assignee: Siemens Enterprise Communications, Inc.Inventors: Mallikarjuna Samayamantry, Johannes Ruetschi, Dennis L. Kucmerowski, Holger Prange
-
Publication number: 20120207292Abstract: Methods and systems of authorising a user of a first packet-based communication network to access a second packet-based communication network are disclosed. A call setup request is received from a user terminal of the user at a first network element of the first packet-based communication network, the authorisation request comprising a first user identity. Responsive to the call setup request, a request is transmitted to create a second user identity from the first network element to a second network element of the second packet-based communication network. The second network element creates the second user identity for use in the second packet-based communication network. The second user identity is derivable from the first user identity according to a predetermined rule. The second user identity is stored in the second packet-based communication network for use with establishing a call associated with the call setup request over the second packet-based communication network.Type: ApplicationFiled: April 19, 2012Publication date: August 16, 2012Applicant: MICROSOFT CORPORATIONInventors: Jonathan David Rosenberg, Andres Kütt
-
Patent number: 8233602Abstract: An authentication device for fitting at the entrance to a property includes an externally facing interface including a speaker and a microphone; an internally facing interface comprising a speaker, a microphone and a keypad; and a processing unit including electrical interfaces to both the internally and externally facing interfaces and to a telephone unit. The internally facing keypad includes a button which permits a user to cause the processing unit to initiate a call using the telephone unit to a remote voice verification center via the telephone unit and the PSTN to which it is interfaced when in use (via standard telephone socket). The processing unit is additionally operable to communicate audio signals between the remote voice verification center and at least the externally facing interface (i.e. the speaker and microphone thereof), whereby a visitor may be remotely verified by the remote voice verification center before the householder grants the visitor admission to the property.Type: GrantFiled: July 21, 2006Date of Patent: July 31, 2012Assignee: BRITISH TELECOMMUNICATONS public limited companyInventor: Paul J Kearney
-
Publication number: 20120170723Abstract: There is described a provides a method for selecting a buddy with which a user wants to connect. The buddy having a buddy identification being listed in a pre-identified group of Internet-accessible destinations. The user using a user telephone means to which is associated identification information. The method comprises: initiating a call from the user telephone means to an Internet-enabled computing device, the call having associated thereto calling line identification (CLID) information; comparing the CLID information to the user telephone means identification information; validating the CLID information using the comparison upon positive validation, the user providing the buddy identification; consulting the pre-identified group of Internet-accessible destinations for a match between the buddy identification and one of the Internet-accessible destinations; and advising the user of a successful or unsuccessful match.Type: ApplicationFiled: March 12, 2012Publication date: July 5, 2012Inventor: Eric Reiher
-
Publication number: 20120170726Abstract: Two or more users can be connected over the internet or through the world-wide web or other network without the users exchanging access numbers and/or user identifications. Moreover an instant voice communication channel may be established based on the caller's device identification number or electronic signature without the need to create dedicated telephony paths or user names/passwords.Type: ApplicationFiled: January 4, 2012Publication date: July 5, 2012Applicant: PARLOR.FM., INC.Inventor: Joel Schwartz
-
Patent number: 8213589Abstract: In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The system includes a network, computer, and database. Incoming communications to the network are monitored and when matched to a phone number corresponding to the seed data, the system plays back a pre-recorded voice message and stores a caller identification phone number and/or records a caller voice message from the incoming phone call. The information is sent to a user to determine if the incoming phone call was conducted by breaching the secured private information database listing.Type: GrantFiled: December 15, 2011Date of Patent: July 3, 2012Assignee: Protect My Database, Inc.Inventors: Trent Martin, Karolyn Tincher, Philip Tincher, Robert B. Rich
-
Patent number: 8213583Abstract: A system may generate an access number, provide the access number to a user via a telephone call, and provide the access number to an authentication server. The system may regulate access by the user to a restricted resource based on the access number provided to the user and the access number provided to the authentication server.Type: GrantFiled: November 22, 2006Date of Patent: July 3, 2012Assignee: Verizon Patent and Licensing Inc.Inventor: Alexander Finogenov
-
Publication number: 20120163571Abstract: A highly scalable and distributed call/media modeling and control framework is described. In particular, a plurality of anchor point servers are provided which enable one or more applications to exert call and media control over in-progress communication sessions even though the applications were not originally bound to the communication session during its setup.Type: ApplicationFiled: December 27, 2010Publication date: June 28, 2012Applicant: AVAYA INC.Inventors: Gordon R. Brunson, Joel M. Ezell, Harsh V. Mendiratta, Owen D. Williams
-
Patent number: 8208612Abstract: Systems, methods and apparatus are presented for facilitating account-based transactions. In an embodiment, the method includes associating a first person with an account, associating a second person with the account, receiving a request from a third party to authorize a transaction between the second person and the third party, determining a first communication address of the first party, and contacting the first party. The process also includes determining that the first person desires to communicate with the second person, determining a second communication address of the second person, initiating a communication between the first person and the second person, and receiving a signal from the first person that authorizes the transaction or declines the transaction.Type: GrantFiled: October 6, 2008Date of Patent: June 26, 2012Assignee: Walker Digital, LLCInventors: Jay S. Walker, Daniel E. Tedesco, Andrew S. Van Luchene, James A. Jorasch
-
Publication number: 20120155623Abstract: A method is provided for providing customized ring-back tones to callers on a wireline network such as a public switched telephone network having an advanced intelligent network or a VoIP network. When a call request is received from a calling party to connect to a called party through a wireline telephone network it is determined if the calling party is identified in a screening list for the called party. If so, then a customized audible ring-back tone is played to the calling party until the called party is connected to the calling party or until the call request is terminated.Type: ApplicationFiled: February 27, 2012Publication date: June 21, 2012Inventors: James E. Haley, Douglas R. Jones, John H. Wurster, Susan M. Middleswarth
-
Publication number: 20120148037Abstract: An in-progress call can be manipulated such that user devices in proximity to the in-progress call, but not initially part of the call, are enabled to join the in-progress call. Determining that a user device is in proximity to an in-progress call may include detection, by the user device, of an in-progress call. Alternatively, or in addition, a communication device involved in the in-progress call may detect a user device and query the user device as to whether it has permissions to join the in-progress call and, if so, whether it wants to join the in-progress call.Type: ApplicationFiled: December 13, 2010Publication date: June 14, 2012Applicant: AVAYA INC.Inventor: Gordon R. Brunson
-
Patent number: 8199890Abstract: In one embodiment, a method includes obtaining a request for a notification regarding an event associated with a first party and a first location. The request is received or otherwise obtained from a second party. The method also includes determining whether the second party is permitted to receive the notification, determining whether the event has occurred, sending the notification if the event has occurred and the second party is permitted to receive the notification. Sending the notification regarding the event includes sending the notification to the second party.Type: GrantFiled: February 6, 2007Date of Patent: June 12, 2012Assignee: Cisco Technology, Inc.Inventor: Shamim S. Pirzada
-
Publication number: 20120140911Abstract: A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service representative are monitored. At least one tone from a telephone keypad of the customer is detected. The at least one tone represents sensitive data for the customer. An audio output channel directed to the customer service representative is prevented from outputting a detectable tone from the telephone keypad of the customer. An indicator is provided to the customer service representative when detection of the at least one tone occurs.Type: ApplicationFiled: December 6, 2010Publication date: June 7, 2012Applicant: KomBea CorporationInventors: Ronnie D. Johansen, Kolby M. Olsen
-
Publication number: 20120106719Abstract: This application relates to providing an end user control of temporary numbers established and linked to a trusted phone number using traditional forwarding mechanisms. Temporary phone numbers can be created and assigned to individuals to provide them with a unique point of contact. The temporary numbers are then linked to the individual's private number. The temporary numbers can be shared with individuals and organizations with whom the individual has an interest in communicating with. However, these numbers will often find their way into the hands of third parties with whom the individual has no interest in talking with. When the user simply no longer feels that the numbers are being properly used, the user can remove the temporary numbers linked with their private number so no further calls can be made and routed to their private number. The temporary numbers can be used to uniquely identify the calling party.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Inventors: Peter Matthew Hillier, Katayoun Hillier
-
Publication number: 20120106720Abstract: A call processing method, system and communication device for providing call authorization features. Generally described, the present application relates to authorizing communications between devices during call setup time. In one illustrative embodiment, communications within a telephone network configured within a private branch exchange or carrier are filtered using an authorizing device. The authorizing device can be activated using different procedures including, but not limited to, feature access codes and pin numbers. When a call is received from a calling device, the telephone network can reserve a line for the call to the intended restricted device. The authorizing device can thereafter be alerted about the call. A user of the authorizing device can answer the call or direct the telephone network to block the call, connect the call with the restricted device through the reserved line, or forward the call to a third device.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Inventors: Peter Matthew Hillier, Katayoun Hillier
-
Patent number: 8170185Abstract: A method of authorising a user of a first packet-based communication network to access a second packet-based communication network. The method comprises: receiving an authorization request from a user terminal of the user at a first network element of the first packet-based communication network, the authorization request comprising a first user identity; responsive to the authorization request, transmitting a request to create a second user identity from the first network element to a second network element of the second packet-based communication network; the second network element creating the second user identity for use in the second packet-based communication network, the second user identity being derivable from the first user identity according to a predetermined rule; and storing the second user identity in the second packet-based communication network for use with subsequent communication events over the second packet-based communication network.Type: GrantFiled: December 21, 2007Date of Patent: May 1, 2012Assignee: Skype LimitedInventor: Andres Kütt
-
Patent number: 8150005Abstract: A method and system authenticates an authenticatee and provides an authentication to a recipient. The authenticatee may be either the called party or the calling party. A network platform or customer premise equipment may be utilized to provide information for authentication. Customer premise equipment provides the authentication to the recipient.Type: GrantFiled: May 23, 2007Date of Patent: April 3, 2012Assignee: AT&T Intellectual Property II, L.P.Inventors: Robert Sayko, Martin Sliwicki
-
Patent number: 8150013Abstract: A system and method of telephony resource management and security for monitoring and/or controlling incoming and outgoing calls between an enterprise's end-user stations and a public circuit-switched network and/or a public packet-switched network. A security policy is made up of one or more rules designating at least one action to be performed based on at least one attribute of the incoming or outgoing call. Calls are detected and sensed on the line, trunk and/or cabling, and analyzed to determine attributes associated with each call. Actions are performed based upon the determined attributes, in accordance with the security policy rules.Type: GrantFiled: November 3, 2006Date of Patent: April 3, 2012Assignee: Securelogix CorporationInventors: David L. Buntin, Keith S. Pickens, Mark D. Collier, Kirk E. Smith
-
Patent number: 8144846Abstract: A system and method for interrupting a transmitting communication unit in a communication system. When a call is first initiated, the call is assigned to a communication channel and broadcast from a base site using the assigned communication channel. If it is determined that a transmitting communication unit should be interrupted, a zone controller signals a base site to generate an interrupt message. The base site generates an interrupt message containing an identification code for the transmitting communication unit and broadcasts the interrupt message on an outbound link of the communication channel. The transmitting communication unit, while transmitting on an inbound link of the communication channel, continuously monitors the outbound link. If the transmitting communication unit receives, on the outbound link, an interrupt message containing an identification code matching its own identification code, the transmitting communication unit stops transmitting.Type: GrantFiled: January 8, 2007Date of Patent: March 27, 2012Assignee: Motorola Solutions, Inc.Inventors: John M. Gilbert, Gary P. Hunsberger, Daniel J. McDonald
-
Publication number: 20120063577Abstract: In general, techniques are described for sharing information about a client device phone call to enhance other services. In one example, a method includes receiving, at a server device, voice call parameters that describe at least one characteristic of a voice call in which a user of a first device is participating wherein the first device is physically separate from the server device, and responsive to receiving the voice call parameters, determining, by the server device, a status of the user based on the received voice call parameters. The method further includes storing an account for the user on the server device, wherein the account includes a user profile for the user and identifies contacts of the user, and modifying, by the server device, the user profile to reflect the status of the user, and sending the modified user profile to a device associated with a contact of the user.Type: ApplicationFiled: December 8, 2010Publication date: March 15, 2012Applicant: Google Inc.Inventor: Marcus Foster
-
Publication number: 20120027186Abstract: In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a central server that is accessed via one or more lines for audio communication, or as a stand-alone unit. The system operates by encrypting communicated data (e.g., audio signals), storing the encrypted information, and providing at least one user with a key that can be used to decrypt the stored information.Type: ApplicationFiled: October 11, 2011Publication date: February 2, 2012Applicant: WALKER DIGITAL, LLCInventors: Jay S. Walker, Thomas M. Sparico, James A. Jorasch
-
Publication number: 20110317822Abstract: A communication device includes a call unit, a transmitter, a network transmission unit and a display unit. The call unit can generate a call request based on a phone number of a phone device of a called party. The transmitter can send the call request to the phone device. The network transmission unit is responsive to the call request for acquiring current status information of the called party from at least one social network server through Internet. The display unit can render the current status information.Type: ApplicationFiled: June 24, 2011Publication date: December 29, 2011Inventor: Shao-Puo CHEN
-
Publication number: 20110299672Abstract: A system is provided for leveraging a Web service to provide access to information for telephone users. The system includes a first network service node for hosting the Web service, an information database accessible from the service node, a voice terminal connected to the first service node, and a service adaptor for integrating a voice application executable from the voice terminal to the Web service. In a preferred aspect, the service adaptor subscribes to data published by the Web service and creates code and functional modules based on that data and uses the created components to facilitate creation of a voice application or to update an existing voice application to provide access to and leverage of the Web service to telephone callers.Type: ApplicationFiled: December 2, 2010Publication date: December 8, 2011Applicant: Apptera, Inc.Inventors: Leo Chiu, Arumugam Appadurai
-
Publication number: 20110293080Abstract: A processing apparatus, including: a query statistics unit which inputs a query request for querying a destination for first telephone number, and counts the number of input query requests; and a restriction control unit which transmits to a restriction control apparatus which performs outgoing call restriction, a restriction request to restrict a telephone call by second telephone number, when the counted number of the query requests is equal to or greater than a restriction start threshold, wherein the telephone call by the second telephone number is restricted by transmission of the restriction request, and a telephone call by the first telephone number is performed.Type: ApplicationFiled: March 30, 2011Publication date: December 1, 2011Applicant: Fujitsu LimitedInventors: Yukio Katakura, Hiroaki Komine, Yasuo Maeda, Katsuyoshi Tsuhara
-
Patent number: 8064583Abstract: System and methods for authenticating access to multiple data stores are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method receives a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.Type: GrantFiled: September 21, 2006Date of Patent: November 22, 2011Assignee: Seven Networks, Inc.Inventors: Jay Sutaria, Brian Daniel Gustafson, Robert Paul van Gent, Ruth Lin, David Merriwether, Parvinder Sawhney
-
Patent number: 8054952Abstract: Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database. The system comprises a processor; and a memory coupled to the processor. The memory comprises a list of telephone numbers associated with one or more destinations implementing IVR, wherein the destinations are grouped based on at least one category; instructions executable by the processor for automatically communicating with at least one user; and instructions executable by the processor for at least one personal record from the at least one user and for storing the at least one personal record in the IVR database.Type: GrantFiled: June 13, 2011Date of Patent: November 8, 2011Inventors: Zvi Or-Bach, Tal Lavian
-
Publication number: 20110261807Abstract: A system and method for managing and controlling telephone activity in a correctional facility comprises providing a first communicative connection between a caller and a recipient, delivering the conversation between the caller and the recipient over the first communicative connection and executing speech recognition software to identify a plurality of conversation words delivered over the first communicative connection. By comparing the conversation words with a database of trigger words, a determination can be made as to whether the recipient is attempting to create an unauthorized call connection. Based on that comparison step, a detection response is executed.Type: ApplicationFiled: April 27, 2010Publication date: October 27, 2011Inventors: Jay D. Walters, Randy L. Reeves, William L. Pope
-
Publication number: 20110243313Abstract: A system for accessing scheduling information. In one illustrative embodiment, a user can log into a phone system by entering their extension number and passcode, which allows the phone to assume their profile. The user then enters the credentials required to access their PC based calendar information, which is stored by a server application. The server application can look up the scheduling information that is stored in the user's PC based calendar application on a message server. The information can then be provided to the phone by the server application where it is displayed. Application programming interfaces can facilitate communications between the phone and the server application and the server application and the message server. Other information located on the message server can also be retrieved through the server application and is not limited to scheduling information.Type: ApplicationFiled: March 31, 2010Publication date: October 6, 2011Inventors: Peter Francis Couse, Ron Wellard
-
Publication number: 20110235790Abstract: In one implementation a computer-implemented method includes generating a group of telephone contacts for a first user, wherein the generating includes identifying a second user as a contact of the first user based upon a determination that the second user has at least a threshold email-based association with the first user; and adding the identified second user to the group of telephone contacts for the first user. The method further includes receiving a first request to connect a first telephone device associated with the first user to a second telephone device associated with the second user. The method also includes identifying a contact identifier of the second telephone device using the generated group of telephone contacts for the first user, and initiating a connection between the first telephone device and the second telephone device using the identified contact identifier.Type: ApplicationFiled: March 26, 2010Publication date: September 29, 2011Applicant: GOOGLE INC.Inventors: Brian Strope, Francoise Beaufays, Hy Murveit
-
Patent number: 8014501Abstract: A method of authenticating an authorized entity via the telephone network is disclosed. A telephone call is placed from a telecommunications terminal to a server that comprises a valuable resource and that only provides the resource to authorized entities. When the terminal has already demonstrated its authorization to the server, the server indicates to the terminal that the terminal need not provide its authorization credentials. In contrast, when the terminal has not yet demonstrated its authorization to the server, the server indicates to the terminal that the terminal does need to provide its authorization credentials. The server indicates to the terminal whether or not it needs to provide its authorization credentials by deliberating waiting to establish the call with the terminal, wherein in the length of the wait is indicative of whether or not the terminal needs to provide its authorization credentials.Type: GrantFiled: November 27, 2006Date of Patent: September 6, 2011Assignee: Avaya Inc.Inventors: Sandra R. Abramson, Stephen M. Milton
-
Publication number: 20110158393Abstract: A communication apparatus that enables to appropriately perform IP filtering even when communication via a network is performed by a user inputting a destination phone number. An IP filter permits or rejects communication on the basis of a set IP address. An input unit inputs a phone number. An acquisition unit acquires an IP address corresponding to the phone number inputted by the input unit from a server connected to the network. A setting unit sets the IP filter so that communication using the IP address acquired by the acquisition unit is permitted.Type: ApplicationFiled: December 17, 2010Publication date: June 30, 2011Applicant: CANON KABUSHIKI KAISHAInventor: Hidenori YOKOKURA
-
Patent number: 7965873Abstract: Changing of setting of a predetermined function or file that is selected is controlled only be performing fingerprint authentication while data regarding the predetermined function or file is displayed on a display unit. While data regarding a function arbitrarily selected by an input unit from a plurality of functions is displayed on the display unit, a control unit authenticates a user based on fingerprint information representing a fingerprint pattern read by a fingerprint sensor and registered fingerprint information pre-stored in a fingerprint information area. If the authentication is successful, the control unit changes a “user restriction flag” associated with the function selected by the input unit in protection setting information stored in a user restriction flag storage area to an effective state or an ineffective state.Type: GrantFiled: May 10, 2007Date of Patent: June 21, 2011Assignee: Casio Hitachi Mobile Communications Co., Ltd.Inventor: Yoshihiro Goto
-
Publication number: 20110142212Abstract: Provided is an access node including: a receiver to receive subscriber information associated with a subscriber from a residential gateway of the subscriber and a service request from the subscriber; a storage unit to store registration information comprising the subscriber information and service information received from a plurality of service providers; and a processor to provide, to the residential gateway, a service corresponding to the service request based on the subscriber information.Type: ApplicationFiled: September 28, 2010Publication date: June 16, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Tae Yeon KIM, Dong Guk JE, Ho Young SONG
-
Publication number: 20110142213Abstract: Subscriber profile data is managed. The subscriber profile data is associated with a communications service subscribed to by a subscriber. A request to retrieve the subscriber profile data is received based upon a client sending a request for the subscriber profile data. The client hosts a user interface configured to allow the subscriber to obtain and update the subscriber profile data. The subscriber profile data is retrieved from the communications network in response to the request to retrieve the subscriber profile data. A request to update the subscriber profile data is received based upon the client sending a request to update the subscriber profile data. An update for the subscriber profile data is forwarded to the communications network based upon receiving the request to update the subscriber profile data.Type: ApplicationFiled: January 6, 2011Publication date: June 16, 2011Applicant: AT&T LABS, INC.Inventors: Paul G. BANIAK, Kristin CHAMBERS, Katherine L. KREIN, Christopher H. ROLWES, Terry L. VIETH, Tracy L. BROKAW, Mary B. CLARK
-
Publication number: 20110135074Abstract: A method for providing access to a passive optical network for services to homes or businesses from two or more telecommunications service providers and a billing means is described. A first service provider connects to a point of presence at one side of passive optical network. The provider transmits the appropriate services through this network to an authorization receiver. The authorization receiver is used to receive a periodic authorization code from the network provider to enable the appropriate services from the service provider to be transmitted to a subscriber at a home or business. The authorization receiver enables an optical fiber path to be established for the services to flow to and from the home or business.Type: ApplicationFiled: December 7, 2009Publication date: June 9, 2011Inventors: James Lloyd McNaughton, Randall Lee Markway
-
Publication number: 20110135073Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. An authorized device registry is created in an electronic database, wherein the authorized device registry identifies one or more authorized devices permitted to access the conference calling system. A request to access the conference calling system is received from a device; and, a processor determines whether the device is included in the authorized device registry. If the device is included in the authorized device registry, the device is granted access to the conference calling system. If the device is not included in the authorized device registry, however, are performed by the processor.Type: ApplicationFiled: December 4, 2009Publication date: June 9, 2011Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
-
Publication number: 20110123008Abstract: Method and system for authenticating a telecommunication session request provides the steps of receiving the telecommunication session request, sending an authentication trigger request, receiving at least one authentication character encoded by a DTMF tone that is not capable of being generated via a keypad stroke and performing an authentication operation upon the at least one received authentication character. In one embodiment of the invention, the at least one authentication character is a string of authentication characters. The string may further include a first non-numeric DTMF tone (indicative of the beginning of the string of authentication characters), one or more alpha-numeric DTMF tones and a second non-numeric DTMF tone (indicative of the end of the string of authentication characters). Additional information may also be appended to the at least one authentication character during the receiving step (i.e., callerID information or a destination number for the telecommunication session).Type: ApplicationFiled: November 24, 2009Publication date: May 26, 2011Inventor: Tomasz Sarnowski
-
Patent number: 7945251Abstract: A portable communication device (10) may send a service device locating request (42) including a position associated with the portable communication device to a service device locating device (12). The service device locating device (12) may determine at least one service device located close to the indicated position and respond to the request by sending a response (46) including at least one network identifier of a service device (16) capable of handling the desired service. The portable communication device may then directly contact (48) the service device (16).Type: GrantFiled: June 16, 2006Date of Patent: May 17, 2011Assignee: Sony Ericsson Mobile Communications ABInventors: Magnus Jendbro, William O. Camp, Jr., Brett A. Pantalone
-
Publication number: 20110110364Abstract: A portal system for secure, aggregated and centralized management and access of disparate customer service and social networking environments is disclosed. A user interface provides multiple, parameter-based automated service scripts, each configured to utilize customer information. The scripts link to vendor-specific, scenario-specific, and social networking-specific interfaces that have common user interface elements. Shared and dedicated reverse automation gateways are configured to emulate the step-by-step self-service aspects of web sites and interactive voice response systems. The portal system eliminates or reduces inbound toll-free telephone charges for vendor contact centers and additionally links the same to social networking systems.Type: ApplicationFiled: April 26, 2010Publication date: May 12, 2011Inventors: Lance Fried, Joseph Katz, Edwin Kenneth Margulies
-
Publication number: 20110110504Abstract: A first network comprising: one or more first end-user computer terminals; a gateway to a second, packet-based network comprising one or more second end-user computer terminals installed with a communication client of the second network; one or more telephone units for performing calls with one of the second end-user computer terminals over the second network; wherein each of the one or more first end-user terminals is installed with a communication client for performing calls with the second end-user computer terminals over the second network; and wherein the gateway comprises switching apparatus configured to detect a user selection between a first state in which one of said calls is to be performed using one of said first end-user computer terminals and a second state in which the call is to be performed using one of said telephone units; and on condition of detecting the first state, to route both call set-up signalling and call media to the first end-user computer terminal; and on condition of detectingType: ApplicationFiled: November 8, 2010Publication date: May 12, 2011Applicant: Skype LimitedInventors: Madis Kaal, Henn Ruukel
-
Publication number: 20110103561Abstract: Methods, systems, devices, and software are disclosed for providing controlled access to network characteristic data stored at a subscriber premises. In one embodiment, Internet services are provided to a subscriber through a subscriber's modem, connected to the Internet through an access network, and to a number of data terminals on a local network. The modem is adapted to receive and/or generate data from the connected networks and devices for use in generating network characteristic data. This data is stored in an access-controlled data storage module. Content providers may then login to the modem and query network characteristic data. The modem is configured to authenticate the content provider, and, if authorized and available, return the queried data to the content provider. The content provider may then communicate information to the subscriber's data terminal through the modem, according to the network characteristic data returned by the query.Type: ApplicationFiled: December 14, 2010Publication date: May 5, 2011Applicant: QWEST COMMUNICATIONS INTERNATIONAL INC.Inventors: Steven M. Casey, Felipe Castro, Charles I. Cook, Michael D. Sprenger
-
Publication number: 20110091025Abstract: A system is described in which, in some embodiments, a centralized service entry device may be used to coordinate communications going into and out of a home or premises. The service entry device may be physically connected to a plurality of external access networks, such as a cable television coaxial or fiber connection and a twisted-pair wire connection, and may coordinate access to those networks by a plurality of in-home devices. Within the home, the system may include a plurality of client devices to assist in the coordination of communications with devices in different rooms within the home.Type: ApplicationFiled: October 21, 2009Publication date: April 21, 2011Applicant: COMCAST CABLE COMMUNICATIONS, LLCInventor: Mark Francisco