H04M7/0093

Intelligent end user devices for clearinghouse services in an internet telephony system
09614971 · 2017-04-04 · ·

Clearinghouse services architectures that support the use of end user devices, such as personal computers, Internet Protocol (IP) phones, cable multimedia terminal adapters, and residential gateways, in an Internet telephony system. The innovative architectures include a proxy-based system model, a direct communication model, and a hybrid proxy/direct communication model. A user can operate an intelligent end user device. i.e., a device running a client program with knowledge of the architecture particulars, to access a clearinghouse service on an IP network. This enables the user to communicate a telephony call over the IP network and via the combination of a terminating gateway identified by the clearinghouse service and the Public Switched Telephone Network.

Method of reducing size of presence messages

A method in a communication network of delivering messages associated with an information exchange service. A message, to be delivered between two entities is interrogated to determining if the data content has already been delivered to the terminating entity. If the data content has not already been delivered to the second entity, the message is transmitted to the second entity unchanged, while the message is modified, so that the modified message comprises a data identifier, identifying the data content, but no data content. The modified message is then transmitted to the terminating entity, and the data identifier is cached together with the associated data content when a successful transmission of the message has been verified. The suggested versioning mechanism enables transmission of messages with a reduced size.

METHOD AND APPARATUS FOR PRIORITIZING VOICE OVER INTERNET PROTOCOL SIGNALING MESSAGES
20170026989 · 2017-01-26 ·

A method and apparatus for enabling prioritization of signaling messages in a communication network are disclosed. For example, the method receives at least one signaling message, and classifies each of the at least one signaling message. The method schedules each of the at least one signaling message for processing, and discards selectively one or more signaling messages that have been scheduled under an overload condition.

METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
20250071200 · 2025-02-27 · ·

Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.