Abstract:
An object of the present invention is to realize an electronic mail system wherein related electronic mail is automatically displayed when a telephone call is placed. The electronic mail system of the invention is constructed by linking an electronic mail system composed of a plurality of terminals and an electronic mail center, with a telephone system composed of a plurality of telephones and a telephone exchange, the telephones being associated in advance with individual users. The electronic mail center is equipped with means for storing a table of correspondence between user IDs and telephone numbers, a terminal interface capable of identifying the users using the terminals, and a status variable management table for managing status variables by which to recognize the mail currently displayed. The telephone exchange notifies the calling and called telephone numbers to the electronic mail center upon the reception of a call request, and the electronic mail center then identifies the user IDs in accordance with the correspondence table and transmits the related electronic mail for display on the terminals of the calling user and called user.
Abstract:
A mail center management system includes a first network accommodating a plurality of subscriber terminals via lines, and a plurality of mail devices connected to the first network. Each of the mail devices, which has a device number and subscriber information about all the subscriber terminals, includes a storage medium for storing mails received from the subscriber terminals. A second network connects the mail devices to each other and transfers the mails between the mail devices. Each of the mail devices includes a first part for determining whether a request to transfer from a first one of the subscriber terminals to a second one of the subscriber terminals includes a subscriber number of the second one of the subscriber terminals or the device number of one of the mail devices together with the subscriber number. Further, each of the mail devices includes a second part for storing, via the second network, the mail in the storage medium of one of the mail devices to which the first and second ones of the subscriber terminals are connected when the first means determines that the request includes no device number and for storing, via the first and second networks, the mail in the storage medium of one of the mail devices to which the second one of the mail devices is connected when the first means determines that the request includes the device number together with the subscriber number.
Abstract:
Voice, facsimile, and electronic mail messaging is integrated in a system (FIG. 1 ) that converts e-mail messages into voice-and-fax messages. An e-mail message (400) is parsed into voiceable, prose, segments (403) and non-voiceable, non-prose, segments (404). Prose segments are converted into voice message segments (503) via text-to-speech facilities. Each non-prose segment is converted into a fax segment (504). Voice pointers (505) to fax segments are inserted into the voice message, in places corresponding to the non-prose segments in the e-mail message. The voice file (500) and fax file (510) are then stored for subsequent delivery of the message as an integrated voice-and-fax message. Conversion of integrated voice-and-fax messages into e-mail messages is likewise envisioned.
Abstract:
A text mail system in which a pseudo destination subaddress randomly generated at a call receiver side at the time of receiving an incoming call from an integrated services digital network is used to manage the storing or reading out operation of various sorts of messages in a mail box. The text mail system, which uses the pseudo destination subaddress as a box number based on the property that the pseudo destination subaddress is randomly given for each incoming call, can secure a high mail confidence.
Abstract:
A network is disclosed that includes a message originator computer and a message recipient computer, for secure electronic mail delivery. In accordance with the invention, the network includes a message delivery server that can distinguish between real and phantom messages. In operation, the message originator computer waits a random time and then transmits a first encrypted phantom message to the message delivery server. This message is to spoof an eavesdropper into believing that there is a steady stream of messages being sent from the originator computer. However, the message delivery server recognizes the message as a phantom message and discards it. When the message originator computer receives a user request to transmit a real message to the recipient computer, it waits a random time and then encrypts and transmits the real message to the message delivery server. The message delivery server recognizes the message as a real message and forwards the real message to the recipient computer. Meanwhile, the message originator computer can continue transmitting encrypted phantom messages to the message delivery server. In this manner, an eavesdropper will be tricked into believing that there is a steady stream of messages being sent from the originator computer.
Abstract:
Techniques for detecting and/or handling target attacks in an enterprise's email channel are provided. The techniques include receiving aspects of an incoming email message addressed to a first email account holder, selecting a recipient interaction profile and/or a sender profile from a plurality of predetermined profiles stored in a memory based upon the received properties, determining a message trust rating associated with the incoming email message based upon the incoming email message and the selected recipient interaction profile and/or the sender profile; and generating an alert identifying the incoming email message as including a security risk based upon the determined message trust rating. The recipient interaction profile includes information associating the first email account holder and a plurality of email senders from whom email messages have previously been received for the first email account holder, and the sender profile includes information associating a sender of the incoming email message with characteristics determined from a plurality of email messages previously received from the sender.
Abstract:
Systems and methods are provided for efficient communication through a fabric network of devices in a home environment or similar environment. For example, an electronic device may efficiently control communication to balance power and reliability concerns, may efficiently communicate messages to certain preferred networks by analyzing Internet Protocol version 6 (IPv6) packet headers that use an Extended Unique Local Address (EULA), may efficiently communicate software updates and status reports throughout a fabric network, and/or may easily and efficiently join a fabric network.
Abstract:
Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include receiving a request to begin a new communication session, determining one or more desired parameters of the session, and determining whether the desired parameters of the message match proposed parameters provided by the entity requesting the new communication session. When the one or more proposed parameters match the one or more desired parameters, a secure communication session is established between the entities, using shared password information.
Abstract:
Disclosed are a method and apparatus for keeping orders among messages when transmitting and receiving messages within a Converged IP Messaging (CPM) session. A message transmission and reception method in a network comprises receiving a message including sequential identification information and a cumulative size, and outputting the received message, wherein the sequential identification information is an identifier allowing identification of orders managed within a session, transmission and reception being performed in the session, and the cumulative size is the sum of sizes of messages, the messages being sent by a subject having sent the received message within the session, wherein the output order of the received message is decided based upon the sequential identification information and sequential identification information relating to messages received prior to the received message.
Abstract:
Systems and methods are provided for efficient communication through a fabric network of devices in a home environment or similar environment. For example, an electronic device may efficiently control communication to balance power and reliability concerns, may efficiently communicate messages to certain preferred networks by analyzing Internet Protocol version 6 (IPv6) packet headers that use an Extended Unique Local Address (EULA), may efficiently communicate software updates and status reports throughout a fabric network, and/or may easily and efficiently join a fabric network.