摘要:
In one embodiment, a method includes automatically detecting occurrence of an event at an endpoint that suggests checking whether a public safety answering point (PSAP) currently associated with the endpoint is correctly associated with the endpoint. The method further includes, in response to the occurrence of the event, automatically prompting through the endpoint a user to provide input indicating whether data identifying a current location of the endpoint is correct. The method further includes receiving input from the user through the endpoint indicating whether the data is correct and, if the input from the user indicates that the data is not correct, automatically initiating an update of the data to correctly identify the current location of the endpoint.
摘要:
Combining signals includes receiving signals from communication devices, where each signal is associated with a content describing the signal. The following is repeated for each signal: the content associated with a signal is examined, whether the signal is a voice signal is determined in accordance with the content, and the signals are sent to a signal combiner in accordance with the determination of whether the signal is a voice signal. The signals are combined at the signal combiner.
摘要:
In one embodiment, a method for presence-based management in a communication network includes, using IM, discovering one or more network devices in a communication network. The network devices couple two or more endpoints to each other and enable communication between a first one of the endpoints and one or more second ones of the endpoints. The method also includes, using IM, obtaining presence information on the discovered network devices from the discovered network devices and, using the presence information on the discovered network devices from the discovered network devices, maintaining presence data associated with the discovered network devices.
摘要:
In one embodiment, a system is provided to prevent VoIP spam. The system may store call data that is associated with a call to a phone number made over a Public Switched Telephone Network. Subsequently, the system may accept an Internet Protocol telephony connection in response to verification of a demonstrated knowledge of the call. The demonstrated knowledge of the call may be verified based on the call data.
摘要:
A system may generate from a first value, based on rounding information, a first security key that matches a second security key whenever the first value and a second value from which the second security key is generated differ by less than a non-zero predetermined amount. The second security key may be generated from the second value rounded to a multiple of a rounding interval that is nearest to the second value. The rounding information may include a rounding direction indication. The rounding direction indication may indicate the direction in which the second value is rounded to the multiple of the rounding interval nearest to the second value.
摘要:
A system may protect against Sybil attacks on a peer-to-peer (P2P) network based on each one the nodes in the P2P network being identified by a corresponding certificate. In particular, a node may receive a license key, where the license key is evidence of a purchased product license. The node may transmit a message included in the license key to a certificate authority. The node may receive a certificate from the certificate authority in response to authentication of the message. The node may be identified in the P2P network with a node identifier included in the certificate.
摘要:
In one embodiment, a system is provided to restrict VoIP communication. The system may validate a Voice over Internet Protocol (VoIP) call initiation message based on demonstrated knowledge of a Public Switched Telephone Network (PSTN) call.
摘要:
An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify certain fields in the message after a signature is inserted. The originating endpoint's agent may create the signature over some fields of the message using an enterprise network's private key. The agent may insert the signature into the message and send the message to a recipient endpoint's authentication agent. The recipient agent may verify the signature, receive a certificate including a second public key, and challenge the identity of the originating endpoint in order to confirm that identity. This challenge may request a confirmation that the originating endpoint knows the private key corresponding to the second public key and may occur while running encrypted media at the endpoints. After the originating endpoint is authenticated, the endpoints may exchange encrypted and/or unencrypted media.
摘要:
A VoIP call routing information registry including a hash access mechanism. In particular implementations, a method includes receiving a telephone number; computing a hash of the telephone number; accessing a registry wherein the registry comprises a plurality of entries, and wherein each entry comprises a hash of a telephone number and data associated with that telephone number, or a prefix and data associated with that prefix; searching the registry for a matching entry; and until a matching entry is found or the telephone number has been stripped down to a minimum number of digits, stripping the last digit of the telephone number, re-computing a hash of the stripped-down telephone number, and re-searching the registry for a matching entry.
摘要:
In accordance with a particular embodiment of the present invention, a method for providing security information associated with a prospective communication session to a user includes providing at least one communication network for the establishment of a prospective communication session between a first network device and a second network device. A security rating is assigned to the prospective communication session, and security information is provided to a user associated with the first network device that includes the security rating.