H04M3/2263

Method, device, network entity and computer program product for providing an IP service application

Method, device, network and network entity for providing at least one Internet Protocol, IP, service application from a subscriber's multimedia device in an IP multimedia network. The method comprises executing at least one IP service application on the device and/or on an auxiliary device associated with the device. A Domain Name System, DNS, service is provided being executed on the device the DNS service relating to a domain associated with the subscriber. The DNS service has a memory associated therewith. In the memory information is stored relating to DNS resource records in accordance with the at least one IP service application that is being executed on the device and/or in the auxiliary device at that moment. An indication of the device's capability to execute a DNS service is deposited with the IP multimedia network. The indication comprises a network address on which the DNS service can be reached for a DNS query.

Administration of a context-based cloud security assurance system

A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., high security) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.

INFORMATION SPREAD IN SOCIAL NETWORKS THROUGH SCHEDULING SEEDING METHODS
20180018709 · 2018-01-18 ·

A method for information spread in one or more social networks, the method may include receiving or generating social network information that represents members of the one or more social networks and links between the members; repeating, for each point in time out of multiple points in time, the steps of: determining, in response to budget constraints and current statuses of the members, and the current influence vectors of the members social circle, at least one target member that is non-infected during the point of time and should be infected before the next point in time, to provide an increase in the final number of infected members; wherein the statuses of the members comprises (i) infected and infectious, (ii) non-infected and (iii) infected and non-infectious; and sending, at a cost, the information to the at least one target member, before the next point in time.

Deployment using a context-based cloud security assurance system

A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., high security) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.

Method for processing non-access stratum message, user equipment, and network side device
09866682 · 2018-01-09 · ·

The present application discloses a method for processing a non-access stratum message, user equipment, and a network side device. The user equipment includes a configuration module, at least one non-access stratum module, and at least two access stratum modules, and the at least two access stratum modules separately support different network standards, where the configuration module is configured to acquire configuration information, and map the at least one non-access stratum module to at least one of the access stratum modules according to the configuration information, so that the at least one non-access stratum module transfers a non-access stratum message with the access stratum module to which mapping is performed. According to the present invention, a technical problem that a mapping relationship between an access stratum and a non-access stratum in prior-art user equipment is fixed can be resolved, signaling interactions can be reduced, and a delay can be shortened.

CONTROL OF COMMUNICATION SERVICES MANAGEMENT
20240414267 · 2024-12-12 ·

A computer-implemented method, system and computer program product, implementing management of a telephony system comprising: one or more PBX systems (PBX) having data repositories comprising entity information; a temporary data repository comprising entity information from entities in the PBX; and a management repository comprising site information, the method comprising: obtaining a rule matching entities explicitly defined in the PBX to sites not explicitly defined in the PBX; obtaining entity identifier; obtaining entity information using the entity identifier, comprising querying the temporary repository; applying the rule against the entity, to match a site with which the entity is associated; obtaining site information; performing an action with respect to the entity based on the site information; wherein update to device information to be persistently available is implemented in the data repository of the PBX; and content of the temporary data repository is periodically replaced with data obtained from the data repositories.

Context-based cloud security assurance system

A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., high security) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.

Toll-tree numbers metadata tagging, analysis and reporting
09800742 · 2017-10-24 · ·

A toll-free tagging service is provided that includes a subscription-based service that is made available to responsible organizations, consumers and businesses. The toll-free tagging service may provide the ability to tag a toll-free number (or group of numbers), and once a number is tagged, to track updates to that number that may then be distributed to customers through emails/text messages or other means. Subscribers of the toll-free tagging service may also have the ability to create, view, update and delete tags through a web application, mobile application, or some other user interface.

IP TELEPHONY NETWORK USING A CONFIGURATION MAP FOR ORGANIZING SITES

A system and method for managing an IP telephony network that uses a configuration map for organizing sites in a tree-like hierarchy. The system is capable of managing the addition, removal and movement of IP telephony elements within an IP telephony network and locating services and IP telephony elements within the IP telephony network in an efficient manner.

METHODS AND APPARATUS TO DYNAMICALLY SELECT A PEERED VOICE OVER INTERNET PROTOCOL (VOIP) BORDER ELEMENT
20170223192 · 2017-08-03 ·

Methods and apparatus to select a dynamically peered voice over Internet protocol (VoIP) border element are disclosed. An example method comprises collecting data representative of a dynamic performance of a voice over Internet protocol network, prioritizing a selection of a peered border element based on the collected data, and modifying a telephone number mapping (ENUM) database based on the prioritized selection.