Patent classifications
H04M1/253
Signaling over cellular networks to reduce the Wi-Fi energy consumption of mobile devices
Techniques for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface are described. In one embodiment, the mobile device's Wi-Fi interface is automatically disabled when the device is not engaged. When the device receives a wake up call from a server via its Cellular interface, the Wi-Fi interface is enabled if the device answers the wake up call and the Wi-Fi interface is available. Using its Wi-Fi interface, the mobile device then connects to an IP-based network via a Wi-Fi access point.
CONVERGED COMMUNICATION DEVICE
The present invention is a converged communication device that extends the landline voice service beyond the confines of the home to smartphones and other smart devices. The converged communication device includes a handset, a tablet, a VoIP softphone and a docking station. The docking station, which connects to PSTN and is wirelessly connected to the handset and tablet, communicates with the tablet that has the VoIP softphone installed such that the capability of making and receiving calls via the landline is extended beyond the confines of the home to the tablet or any other registered smart device.
Dynamic dual-mode service access control, location-based billing, and E911 mechanisms
A system that facilitates controlling network access comprises a lookup component that determines a geographic location associated with a public originating IP address, wherein the public originating IP address is associated with a request for dual mode services made by a dual mode client. A comparison component compares the determined geographic location with a retained geographic location associated with the dual mode client and determines whether to enable dual mode services based at least in part upon the comparison.
Load balancing traffic in a MPLS network
A method and system for managing traffic in a network. For each label switch path of at least two logical switch paths, logical paths are identified. Each label switch path begins at a first provider edge and ends at a second provider edge. Most recent data received from the first provider edge is transmitted to the second provider edge via a selected logical path. For each logical path, jitter, packet delay and packet loss are identified. For each logical path, calculating a path usage is calculated as a first function of the jitter, the packet delay, and the packet loss, wherein the path usage is a fraction denoting a highest percentage of total network traffic that each logical path can manage.
METHOD AND SYSTEM FOR ACCESSING AN IPA AGENT FROM A PHONE
A gateway, computer program product and a method for accessing an IPA agent, the method may include (a) receiving, by the gateway and over a wired communication link, a request to initiate a phone call; (b) determining, by the gateway, whether to direct the phone call to the IPA agent or to another agent that differs from the IPA agent; (c) directing the phone call to the IPA agent when determining to direct the phone call to the IPA agent; and (d) directing the phone call to the other agent when determining to direct the phone call to the other agent.
Multi-protocol field device in process control systems
A field device includes components to communicate with a control and/or asset management system of a process control system or with other field devices using any of several different communication protocols such as several different internet protocol (IP) protocols. This architecture allows for a single version of a field device to be provided in automation or plant control systems that use any of these communication protocols, thus saving on inventory and product development costs. Moreover, the multi-protocol field device or a system using the multi-protocol field device can manage the asset (read and write parameterized data from and to the asset) using one protocol while at the same time communicating real-time process/factory automation information using a second and different protocol. Moreover, the field device may be able to communicate to other devices including other field devices and host devices using both of these protocols or other protocols for different purposes.
Voice application network platform
A distributed voice applications system includes a voice application rendering agent and at least one voice applications agent that is configured to provide voice applications to an individual user. A management system may control and direct the voice applications rendering agent to create voice applications that are personalized for individual users based on user characteristics, information about the environment in which the voice applications will be performed, prior user interactions and other information. The voice applications agent and components of customized voice applications may be resident on a local user device which includes a voice browser and speech recognition capabilities. The local device, voice applications rendering agent and management system may be interconnected via a communications network.
Packet-switched telephony
A system and method for providing packet-switched telephony service. The system provides call control, signaling, and/or delivery of voice, video, and other media in substantially real time. One embodiment of the system includes a call client application on a user device, and a call server located at a packet-switched telephony service provider. The call server is preferably operable to communicate with the call client in a non-native protocol and with the gateway in a native protocol.
Blocking undesirable communications in voice over internet protocol systems
Blocking of undesirable voice over internet protocol (VOIP) communications is disclosed. A communication screening service initiates operations to block a threat posed by a VOIP communication upon receiving the communication from a gateway server. The communication may include an audio/video conversation and/or an audio/video conference. Next, metadata and content of the communication is analyzed to detect a threat, such as a scamming scheme and/or a phishing scheme, from a sender of the communication. A rejection of the communication is generated to disrupt the threat associated with the communication. The rejection is transmitted to the gateway server to prompt the gateway server to block the communication.
Converged voice mail services
Novel tools and techniques for providing enhanced services to telephone subscribers with multiple telephone lines, which can include one or more traditional telephone lines, wireless telephone lines, Internet protocol-based telephone lines, and/or the like. For example, certain tools can provide a subscriber with a unified voice mailbox for a plurality of the subscriber's telephone lines. In some cases, the subscriber does not need to check multiple voice mailboxes (each associated with one of the subscriber's telephone numbers) in order to ensure that the subscriber has received all messages intended for that subscriber. Instead, any incoming call on any of the subscriber's lines can be routed to a converged voice mailbox for easy retrieval by the subscriber of all messages from one location. Some tools employ a VoIP switch to handle routing of the incoming call to the correct voice mailbox.