Matches 1 - 50 out of 327 1 2 3 4 5 6 7 >


Match Document Document Title
8964952 System and method for self-configuring sip-capable device  
A computer-implemented system and method for the deployment of automatically configuring network communication endpoints is disclosed. At least one logical profile is stored in a plurality of...
8929521 System and method for authenticating a communication device  
A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to transmit to a communication system a PKI certificate, and...
8903060 Individual location tracking in detention environments  
Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal,...
8838669 System and method for layered application server processing  
A system and method for layered application server processing. Embodiments of the system are particularly useful in extreme transaction processing (XTP) environments to support hundreds of...
8831204 Protecting sensitive information provided by a party to a contact center  
A secure three-way bridge in a SIP-based processing switch protects sensitive information provided by a party during a call with an agent in a contact center. During the call, the agent may bridge...
8781087 Simultaneous voice and data systems for secure catalog orders  
Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for providing a distributed voice user...
8761360 Individual location tracking in detention environments  
Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal,...
8763155 Tag based views for role based access control  
A method of controlling access to a client over a computer network includes associating a user interface element with at least one tag and defining an access permission rule for a client, as a...
8731156 Activation of an electronic mechanism using a communications network  
Methods, systems, and products are disclosed for operating an electronically activated mechanism. In an exemplary embodiment, the method comprises receiving, via a first communications network, a...
8712022 Selective facsimile denial  
A method includes determining whether an incoming call to a first destination is authorized at a switch of a communication network. The method includes, in response to determining that the...
8699060 Image reading apparatus and image forming apparatus  
In the case of transmitting an image data, a controller causes a re-destination storage to store an identification number of a destination. Thereafter, when a user presses a re-destination key...
8699679 System apparatus and method for accessing scheduling information  
A system for accessing scheduling information. In one illustrative embodiment, a user can log into a phone system by entering their extension number and passcode, which allows the phone to assume...
8635278 System and method for interruption management  
A method and computer program product for managing interruptions including defining an interruption control initiation trigger and defining an interruption control release trigger. An interruption...
8634318 Communication system and communication control method  
A communication system providing a multimedia service that informs a calling terminal that a communication sent from the calling terminal to a called terminal is undesired by the called terminal....
8625755 Method and apparatus for managing contact books  
A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to receive from a first communication device (CD) a telephone number of a...
8625761 Method, system, apparatus, and computer program product for user authentication  
A user authentication method is applied to a user authentication apparatus for authentication using a unique ID that is information unique to a communication apparatus. The method includes...
8620532 Passive crowd-sourced map updates and alternate route recommendations  
Systems and methods for providing passive crowd-sourced alternate route recommendations. In one embodiment, locations of users of a number of mobile location-aware devices are tracked over time....
8619951 Systems and methods to securely collect data over a telephone  
A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service representative are monitored. At least one...
8605629 Lawful interception of subscriber received multicast traffic  
A network device may include a lawful interception module, a routing module, and a multicast distribution table. The lawful interception module may receive a lawful interception request for a...
8582734 Account administration system and method with security function  
An account administration system and method with security function are provided. The system comprises an identification unit, an issue unit, a portable communication device, and a identification...
8578452 Method for securely creating a new user identity within an existing cloud account in a cloud computing system  
The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and...
8576996 This call  
An in-progress call can be manipulated such that user devices in proximity to the in-progress call, but not initially part of the call, are enabled to join the in-progress call. Determining that a...
8571188 Method and device for secure phone banking  
A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized...
8548132 Lawful intercept trigger support within service provider networks  
The invention is directed to techniques for initiating lawful intercept of packets associated with subscriber sessions on a network device of a service provider network based on identification...
8532271 Cybercrime detecting and preventing method and system established by telephone number code, authorization codes and source identification code  
A cybercrime detecting and preventing method and system includes a website, an interface dynamic web page, a search program, and a database. When a network user inputs a “telephone number code”...
8503631 Methods, systems, and products for locking and unlocking a lock  
Methods, systems, and products are disclosed for locking and unlocking a lock. A lock service manager module stores in memory, and a processor communicates with the memory. The lock service...
8504729 Intelligent network providing network access services (INP-NAS)  
An open Information Services network architecture is disclosed which enables multiple business entities to assume specialized roles of access provider, service provider, and service retailer. The...
8498392 Method and a system for establishing a communication channel between a predetermined number of selected devices and a device and a server arranged for use in the system  
A method for establishing a communication channel (17) between a predetermined number of selected devices (3;5). Each of the devices has its own identity. The establishing of the communication...
8489889 Method and apparatus for restricting access to encrypted data  
A computing device receives a command to restrict access to encrypted data. The computing device generates a new record that can access the encrypted data. The computing device encrypts the record...
8477916 Authorizing access between communication networks  
Methods and systems of authorizing a user of a first packet-based communication network to access a second packet-based communication network are disclosed. A call setup request is received from a...
8433045 Computer telephony system, method and server  
A computer telephony system allows a user to control different communications terminals at different times via a second system, external to the computer telephony system. The computer telephony...
8428230 Communication apparatus performing communication via network using phone number, control method for the same, and storage medium  
A communication apparatus that enables to appropriately perform IP filtering even when communication via a network is performed by a user inputting a destination phone number. An IP filter permits...
8422650 Authentication in communication systems  
A user of a first packet-based communication network is authorized to access a second packet-based communication network. In at least some embodiments, an authorization request is received from a...
8406392 Method and system for automated user authentication  
A method and system for authenticating a telephone number. The method includes receiving a user-inputted telephone number over a communication channel. The method includes providing a security...
8406393 Selective facsimile denial  
A system includes a switch responsive to a control module. The control module that determines whether an incoming telephone call from a telephone number to a telephone line is a facsimile call or...
8386572 System and method for circumventing instant messaging do-not-disturb  
A system and method for circumventing a do-not-disturb status of an instant messaging user including defining a trusted user. A do-not-disturb status of an instant messaging user is identified....
8379813 Method and apparatus for authorizing a calling card telephone call  
Method and apparatus for authorizing a calling card telephone call are described. In one example, a telephone calling card includes a planar body having a memory system, an input circuit, a...
8374320 Environment information transmission method, service controlling system, and computer product  
When changes occur in an environment of the service user terminal, a network operator terminal acquires hashed environment information indicative of the changes from the service user terminal. The...
8345837 Preventing unintended users from accessing a re-routed communication  
A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person...
8346095 System and method for providing multi-provider telecommunications services over a passive optical network  
A method for providing access to a passive optical network for services to homes or businesses from two or more telecommunications service providers and a billing means is described. A first...
8340259 Method and apparatus for providing fraud detection using hot or cold originating attributes  
An approach provides fraud detection in support of data communication services. A list of single-event attributes (e.g., hot or cold attributes) is generated and includes a network address of an...
8325889 Efficient authentication of a user for conduct of a transaction initiated via mobile telephone  
A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled...
8300782 Secure feature access from an off-PBX telephone  
A security plan for telephone clients allows the client to authenticate itself by sending a coded sequence of DTMF digits to a PBX at the beginning of each call. When the idle client telephone...
8259914 System and method for a secure log-on to a communications system comprising network connection and connection handling computers  
In one aspect, communication link established from a communication unit to a communications system. A request message is transmitted from a communication unit to the work connection computer and...
8249238 Dynamic key exchange for call forking scenarios  
In some embodiments, a call forking dynamic key exchange system may include one or more of the following features: (a) a memory comprising, (i) a dynamic key exchange program that allows a caller...
8233602 Authentication apparatus  
An authentication device for fitting at the entrance to a property includes an externally facing interface including a speaker and a microphone; an internally facing interface comprising a...
8213583 Secure access to restricted resource  
A system may generate an access number, provide the access number to a user via a telephone call, and provide the access number to an authentication server. The system may regulate access by the...
8213589 Data security seeding system  
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The system includes a network,...
8208612 System and method for facilitating account-based transactions  
Systems, methods and apparatus are presented for facilitating account-based transactions. In an embodiment, the method includes associating a first person with an account, associating a second...
8199890 Camp on location  
In one embodiment, a method includes obtaining a request for a notification regarding an event associated with a first party and a first location. The request is received or otherwise obtained...

Matches 1 - 50 out of 327 1 2 3 4 5 6 7 >