Cullen Jennings

Cullen Jennings

San Jose, California, United States
5K followers 500+ connections

Activity

Join now to see all activity

Experience

Publications

  • Differentiated Services Code Point (DSCP) Packet Markings for WebRTC QoS

    RFC 8837

  • Encrypted Key Transport for DTLS and Secure RTP

    RFC 8870

  • JavaScript Session Establishment Protocol (JSEP)

    RFC 8829

  • Negotiating Media Multiplexing Using the Session Description Protocol (SDP)

    RFC 8843

  • Double Encryption Procedures for the Secure Real-Time Transport Protocol (SRTP)

    RFC 8723

  • Sensor Measurement Lists (SenML)

    RFC 8428

  • Authenticated Identity Management in the Session Initiation Protocol (SIP)

    RFC 8224

  • A SIP Usage for REsource LOcation And Discovery (RELOAD)

    RFC 7904

  • Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement

    RFC 7624

  • Resource Location And Discovery (RELOAD) Base Protocol

    RFC 6940

  • Example Call Flows Using Session Initiation Protocol (SIP) Security Mechanisms

    RFC 6216

  • Certificate Management Service for the Session Initiation Protocol (SIP)

    RFC 6072

  • Change Process for the Session Initiation Protocol (SIP) and the Real-time Applications and Infrastructure Area

    RFC 5727 part of BCP 67

  • Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)

    RFC 5626

  • The Internet Assigned Number Authority (IANA) tel Uniform Resource Identifier (URI) Parameter Registry

    RFC 5341

  • The Session Initiation Protocol (SIP) and Spam

    RFC 5039

  • Relay Extensions for the Message Sessions Relay Protocol (MSRP)

    RFC 4976

  • The Message Session Relay Protocol (MSRP)

    RFC 4975

  • Representing Trunk Groups in tel/sip Uniform Resource Identifiers (URIs)

    RFC 4904

  • Network Address Translation (NAT) Behavioral Requirements for Unicast UDP

    RFC 4787 part of BCP 127

  • RFC 4770: vCard Extensions for Instant Messaging (IM)

    IETF

    This document describes an extension to vCard to support Instant Messaging (IM) and Presence Protocol (PP) applications. IM and PP are becoming increasingly common ways of communicating, and users want to save this contact information in their address books. It allows a URI that is associated with IM or PP to be specified inside a vCard.

    Other authors
    See publication
  • vCard Extensions for Instant Messaging (IM)

    RFC 4770

  • Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)

    RFC 4474

  • Session Initiation Protocol (SIP) URIs for Applications such as Voicemail and Interactive Voice Response (IVR)

    RFC 4458

  • SIP Security for Voice, Video and Instant Messaging Networks

    RSA Conference

  • Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks

    RFC 3325

  • Practical VoIP Using VOCAL

    O'Reilly Media Inc

    Other authors
  • Robust finger tracking with multiple cameras

    . IEEE workshop on Recognition, Analysis and Tracking of Faces and Gestures in Real-Time Systems at ICCV'99

  • Cooperative Robot Localization with Vision-Based Mapping

    IEEE Conference on Robotics and Automation

  • Video Switch

    The Computer Applications Journal

  • Spinoza: Visually Guided Mobile Robot

    Mobile Robot demonstration. IEEE conference on Computer Vision and Pattern Recognition

  • Stereo vision based mapping and navigation for mobile robots

    IEEE International Conference on Robotics and Automation

  • Spinoza: A Stereoscopic Visually Guided Mobile Robot

    In Proceedings of 30th Hawaii International Conference on System Sciences (HICSS-30), 1997 Volume 5

  • A Distributed Thinning Algorithm on a Workstation Network

    In Proc. ZEUS'95 Workshop on Parallel Programming and Computation (Linkoping, Sweden, 17-18 May 1995)

  • A Distributed Thinning Algorithm on a Workstation Network

    In Parallel Programming and Applications, ed. P. Fritzon and L. Finmo (IOS Press, 1995)

  • A Force Based Thinning Strategy with Sub-Pixel Precision

    In Proceeding of Vision Interface 94 (Banff, AB, 18-20 May 1994)

  • A Force-Based Thinning Strategy with Sub-Pixel Precision

    Technical Report 93/504/09, University of Calgary, February 1993

  • A Methodology for Writing Multiprocessor Programs on a Network of UNIX Workstations

    In Proceedings of SS 93, High Performance Computing: New Horizons (Calgary, AB, 6-9 March 1993)

  • Automatic GIS Data Capture and Conversion

    In Innovations in GIS ed. M.F. Worboys (1994)

  • Automatic GIS Data Capture and Conversion

    In Proceedings of GIS Research - UK 1993 (Keele, England, 18-20 March 1993)

  • Character Recognition Using the Hough Transform

    Technical Report 93/51/ 22, University of Calgary, March 1993

  • Comparative Performances of HPC Systems for Signal Processing

    In Proceeding of SS 93, High Performance Computing: New Horizons (Calgary, AB, 6-9 March 1993)

  • Defining the Digital Skeleton

    In Proceedings of SPIE Vision Geometry, vol. 1832 (Boston, Mass., 15-16 Nov. 1992)

  • Distributed Force-Based Thinning and a General Distribution Method

    Technical Report 93/505/10, University of Calgary, February 1993

  • Thresholding Using an Illumination Model

    In Proceedings of ICDAR 93: International Conference on Document Analysis and Recognition (Tsukuba Science City, Japan, 20-22 October 1993)

  • Vision Knowledge Vectorization: Converting Raster Images into Vector Form

    In Proceedings of 12th International Conference on Pattern Recognition (Jerusalem, Israel, 9-13 October 1994)

Patents

  • Method for protecting against denial of service attacks

    Issued EU 1943802

  • Method for protecting against denial of service attacks

    Issued FR 1943802

  • Method for protecting against denial of service attacks

    Issued GB 1943802

  • Method for protecting against denial of service attacks

    Issued DK 1943802

  • Transferring State Information in a Network

    Issued FR 1856896

  • Transferring State Information in a Network

    Issued EU 1856896

  • Transferring State Information in a Network

    Issued DK 1856896

  • Transferring State Information in a Network

    Issued GB 1856896

  • Beacon spoofing prevention

    Issued US 10,171,496

  • Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network

    Issued GB 1911302

  • Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network

    Issued DK 1911302

  • Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network

    Issued EU 1911302

  • Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network

    Issued FR 1911302

  • Node reputation based on knowledge of pstn calls

    Issued DK 2494762

  • Node reputation based on knowledge of pstn calls

    Issued EU 2494762

  • Node reputation based on knowledge of pstn calls

    Issued GB 2494762

  • Node reputation based on knowledge of pstn calls

    Issued FR 2494762

  • Using authentication tokens to authorize a firewall to open a pinhole

    Issued IN 290219

  • Management networks access for network users

    Issued EU 1882341

  • Management networks access for network users

    Issued GB 1882341

  • Management networks access for network users

    Issued DK 1882341

  • RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM

    Issued DK 2449744

  • Restriction of communication in VoIP address discovery system

    Issued EU 2449744

  • RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM

    Issued FR 2449744

  • RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM

    Issued GB 2449744

  • Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices

    Issued EU 2074522

  • Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices

    Issued GB 2074522

  • Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices

    Issued DK 2074522

  • Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices

    Issued FR 2074522

  • System and Method for Establishing a Communication Session Between Two Endpoints That Do Not Both Support Secure Media

    Issued DK 2044730

  • System and Method for Establishing a Communication Session Between Two Endpoints That Do Not Both Support Secure Media

    Issued EU 2044730

  • System and Method for Establishing a Communication Session Between Two Endpoints That Do Not Both Support Secure Media

    Issued GB 2044730

  • RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM

    Issued CA 102077550

  • Discovering security devices located on a call path and extending bindings at those discovered security devices

    Issued US 9,054,922

  • Node reputation based on knowledge of PSTN calls

    Issued CA 102160361

  • Using authentication tokens to authorize a firewall to open a pinhole

    Issued CA 102217270

  • Prevention of voice over IP spam

    Issued US 8,923,279

  • Using PSTN reachability in anonymous verification of VoIP call routing information

    Issued CA 102239676

  • Categorization of Telephone calls

    Issued CA 101543023

  • Presence-based management in a communication network

    Issued FR 1730895

  • presence-based management in a communication network

    Issued EU 1730895

  • Presence-based management in a communication network

    Issued GB 1730895

  • Presence-based management in a communication network

    Issued DK 1730895

  • Method and system for securing access to information in an automatic call distributor system

    Issued US 8,731,175

  • Active tags

    Issued US 8,713,053

  • Using PSTN reachability to verify VoIP call routing information

    Issued US 8,675,642

  • Using PSTN reachability in anonymous verification of VoIP call routing information

    Issued DK 2494761

  • Using PSTN reachability in anonymous verification of VoIP call routing information

    Issued FR 2494761

  • Using PSTN reachability in anonymous verification of VoIP call routing information

    Issued GB 2494761

  • Using PSTN reachability in anonymous verification of VoIP call routing information

    Issued EU 2494761

  • Management of Missing Conference Invitees

    Issued FR 1872617

  • Management of Missing Conference Invitees

    Issued EU 1872617

  • Management of Missing Conference Invitees

    Issued GB 1872617

  • Management of Missing Conference Invitees

    Issued DK 1872617

  • Discovering security devices located on a call path and extending bindings at those discovered security devices

    Issued US 8,533,339

  • Verifying cryptographic identity during media session initialization

    Issued US 8,533,462

  • Using authentication tokens to authorize a firewall to open a pinhole

    Issued DK 2380325

  • Using authentication tokens to authorize a firewall to open a pinhole

    Issued EU 2380325

  • Using authentication tokens to authorize a firewall to open a pinhole

    Issued FR 2380325

  • Using authentication tokens to authorize a firewall to open a pinhole

    Issued GB 2380325

  • Techniques for integrating instant messaging with telephonic communication

    Issued US 8,438,235

  • Using PSTN Reachability to Verify VoIP Call Routing Information

    Issued CA 101755445

  • Using authentication tokens to authorize a firewall to open a pinhole

    Issued US 8,363,836

  • Flash pairing between bluetooth devices

    Issued CA 101809955

  • Categorization of telephone calls

    Issued DK 1935165

  • Categorization of telephone calls

    Issued GB 1935165

  • Categorization of telephone calls

    Issued FR 1935165

  • Categorization of Telephone calls

    Issued EU 1935165

  • Authenticating an endpoint using a STUN server

    Issued DK 1861946

  • Authenticating an Endpoint Using a Stun Server

    Issued EU 1861946

  • Authenticating an endpoint using a STUN server

    Issued FR 1861946

  • Authenticating an endpoint using a STUN server

    Issued GB 1861946

  • Using PSTN reachability to verify VoIP call routing information

    Issued DK 2181545

  • Using PSTN reachability to verify VoIP call routing information

    Issued FR 2181545

  • Using PSTN Reachability to Verify VoIP Call Routing Information

    Issued EU 2181545

  • Using PSTN reachability to verify VoIP call routing information

    Issued GB 2181545

  • Rounding for security

    Issued US 8,311,218

  • Certificate enrollment with purchase to limit sybil attacks in peer-to-peer network

    Issued US 8,301,880

  • Restriction of communication in VoIP address discovery system

    Issued US 8,274,968

  • Separation of validation services in VoIP address discovery system

    Issued US 8,228,902

  • Using PSTN reachability in anonymous verification of VoIP call routing information

    Issued US 8,228,904

  • Integration of VoIP address discovery with PBXs

    Issued US 8,228,903

  • Node reputation based on knowledge of PSTN calls

    Issued US 8,223,755

  • Using PSTN reachability to verify caller ID information in received VoIP calls

    Issued US 8,204,047

  • Verifying cryptographic identity during media session initialization

    Issued US 8,200,959

  • Using PSTN reachability to verify VoIP call routing information

    Issued US 8,199,746

  • Technique for displaying information ancillary to a location of an entity in a communication network

    Issued US 8,190,134

  • Method for protecting against denial of service attacks

    Issued US 8,191,119

  • Monitoring traffic to provide enhanced network security

    Issued US 8,161,547

  • Method and system using quality of service information for influencing a user's presence state

    Issued US 8,155,014

  • System and method for establishing a communication session between two endpoints that do not both support secure media

    Issued US 8,139,566

  • Prevention of voice over IP spam

    Issued US 8,121,114

  • Management Network Access for Network Users

    Issued CA 101151859

  • Method and system using presence information to manage network access

    Issued US 8,079,062

  • Sharing of presence-based time-zone information

    Issued US 8,078,578

  • VoIP call routing information registry including hash access mechanism

    Issued US 8,072,967

  • Configurable downloading of content pointed to in electronic messages

    Issued US 8,069,215

  • Method and system indicating a level of security for VoIP calls through presence

    Issued US 8,015,403

  • Load balancing across multiple network address translation (NAT) instances and/or processors

    Issued US 8,005,098

  • Method and system for blocking communication within a conference service

    Issued US 7,940,705

  • Method and system to protect the privacy of presence information for network users

    Issued US 7,920,847

  • Authenticating an endpoint using a STUN server

    Issued US 7,908,480

  • Categorization of telephone calls

    Issued US 7,894,597

  • Flash pairing between bluetooth devices

    Issued US 7,831,207

  • Method and system for providing a conference service using speaker selection

    Issued US 7,778,206

  • Method and system using shared configuration information to manage network access for network users

    Issued US 7,764,699

  • Method and apparatus for token distribution in session for future polling or subscription

    Issued US 7,764,945

  • Method and apparatus for identifying a media path in a network

    Issued US 7,733,769

  • User interface for call history

    Issued US 7,724,887

  • Efficiently Bounding the Location of a Mobile Communications Device

    Issued EU 1905264

  • Efficiently bounding the location of a mobile communications device

    Issued DK 1905264

  • Efficiently bounding the location of a mobile communications device

    Issued FR 1905264

  • System and method for displaying sticky notes on a phone

    Issued US 7,698,644

  • Transferring state information in a network

    Issued US 7,680,060

  • System and method for routing information packets

    Issued US 7,680,065

  • Network presence status from network activity

    Issued US 7,573,833

  • Authentication of SIP and RTP traffic

    Issued US 7,568,224

  • Efficiently bounding the location of a mobile communications device

    Issued US 7,561,888

  • System and method for distributed debugging in a communication system

    Issued AU 2003279138

  • System and method for securing transactions in a contact center environment

    Issued US 7,523,859

  • System and method for distributed debugging in a communication system

    Issued CA 100446478

  • Connecting an endpoint to a conference call

    Issued US 7,466,812

  • Signal detection using probabilistic techniques

    Filed US 7,457,597

  • System and method for distributed debugging in a communication system

    Issued EU 1550263

  • System and method for distributed debugging in a communication system

    Issued DK 1550263

  • System and method for distributed debugging in a communication system

    Issued GB 1550263

  • Combining signals at a conference bridge

    Issued US 7,369,652

  • Method and system for managing communication in emergency communication system

    Issued US 7,324,802

  • Method and apparatus for media stream monitoring

    Issued US 7,310,334

  • System and method for securing transactions in a contact center environment

    Issued US 7,287,692

  • System and method for securing transactions in a contact center environment

    Issued US 7,287,692

  • Presence-based management in a communication network

    Issued DK 202005021208.3

  • Presence-based management in a communication network

    Issued US 7,260,632

Honors & Awards

  • Outstanding Young Alumni Award

    University of British Columbia

  • National Sciences and Engineering Research Council (NSERC) doctoral fellowship

    -

Organizations

  • ISRG

    Board Member

    -
  • A100 Group

    Member

  • ACM

    -

  • IEEE

    -

  • The Internet Protocol Journal

    Editorial Advisory Board

    https://ipj.dreamhosters.com/internet-protocol-journal/about/about-the-ipj/

Recommendations received

More activity by Cullen

View Cullen’s full profile

  • See who you know in common
  • Get introduced
  • Contact Cullen directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Cullen Jennings

Add new skills with these courses