Patent application number | Description | Published |
20130024444 | Topic Map for Navigation Control - Included are embodiments for providing a topic map. At least one embodiment of a method includes receiving a plurality of web pages, the web pages including metadata, extracting at least a portion of the metadata from the web pages, and creating at least one topic associated with the web pages, the at least one topic corresponding to at least a portion of the metadata. | 01-24-2013 |
20130030693 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 01-31-2013 |
20130035939 | System and Method for Discriminative Pronunciation Modeling for Voice Search - Disclosed herein is a method for speech recognition. The method includes receiving speech utterances, assigning a pronunciation weight to each unit of speech in the speech utterances, each respective pronunciation weight being normalized at a unit of speech level to sum to 1, for each received speech utterance, optimizing the pronunciation weight by identifying word and phone alignments and corresponding likelihood scores, and discriminatively adapting the pronunciation weight to minimize classification errors, and recognizing additional received speech utterances using the optimized pronunciation weights. A unit of speech can be a sentence, a word, a context-dependent phone, a context-independent phone, or a syllable. The method can further include discriminatively adapting pronunciation weights based on an objective function. The objective function can be maximum mutual information, maximum likelihood training, minimum classification error training, or other functions known to those of skill in the art. | 02-07-2013 |
20130040628 | CAPACITY MANAGEMENT OF AN ASYNCHRONOUS TRANSFER MODE INTERFACE IN A WIRELESS COMMUNICATION INFRASTRUCTURE - Methods and apparatus that effectively manage capacity of a wireless-based communication infrastructure are presented herein. An evaluation component can generate configuration data associated with a base station of a cellular wireless network. Further, a radio network controller component can determine capacity of a physical port coupled between a radio network controller and the base station. The radio network controller component can configure the radio network controller to utilize an increase in capacity of the physical port based on the determined capacity of the physical port. A base station component can configure the base station to utilize the increase in capacity of the physical port based on the configuration data generated by the evaluation component. | 02-14-2013 |
20130041660 | SYSTEM AND METHOD FOR TAGGING SIGNALS OF INTEREST IN TIME VARIANT DATA - Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for tagging a known signal of interest. Initially, the system classifies the data from an input signal using a short-term classifier, wherein there are at least two classifications available, a first classification of the data as having no identified outputs and a second classification of the data as at least one potential signal of interest, wherein the short-term classifier also bypasses data that is known to be of no interest. After the short-term classifier classifies the inputs, it collapses the input data that is classified as having no identified outputs. This allows the short-term classifier to create time-variant data. Finally, the system will tag a known signal of interest in the time-variant data that was classified as having at least one potential signal of interest. Therefore, a system for tagging a known signal of interest is described. | 02-14-2013 |
20130055343 | Methods, Devices, Systems, and Computer Program Products for Edge Driven Communications Network Security Monitoring - An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed. | 02-28-2013 |
20130065602 | DEVICES, METHODS, AND COMPUTER-READABLE MEDIA FOR PROVIDING BROAD QUALITY OF SERVICE OPTIMIZATION USING POLICY-BASED SELECTIVE QUALITY DEGRADATION - Devices, methods and computer-readable media for providing broad quality of service optimization using policy-based selective quality degradation. Data associated with a quality of service for customers and QoS policy rules are stored. Customers are grouped for potential degradation. Levels of degradation are defined for each type of user device. Degradation for the group of customers is optimized using policy rules. Degradation is adjusted to account for variations in user treatment within the group. The adjusted degradation is then implemented. | 03-14-2013 |
20130074175 | Methods, Systems, and Computer Program Products for Protecting Against IP Prefix Hijacking - A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS. | 03-21-2013 |
20130080786 | Signature Specification for Encrypted Packet Streams - Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents. | 03-28-2013 |
20130086617 | Personal Multi-Device Nomadic Media - Providing personal multi-device nomadic media is described herein. In different aspects, the techniques may include providing content to a user on a first device and suspending the delivery of the content on the first device. The user may register on a second device and resume delivery of the suspended content on the second device. | 04-04-2013 |
20130089191 | METHODS, SYSTEMS, AND DEVICES FOR PROVIDING VOICE-CALL SERVICES RESPONSIVE TO A DIALED SEQUENCE - A connection is established in a communications network responsive to receiving a Dual Tone Multi-Frequency (DTMF) signal at a port having an assigned sequence associated therewith. A dialed sequence corresponding to the received DTMF signal is identified. If the dialed sequence is associated with a request for a specified service, first and second fields of a packet-switched signaling protocol message are populated with the assigned sequence associated with the port. The populated packet-switched signaling protocol message is transmitted over a packet-switched network to request the specified service, and a connection is established to provide the specified service through the port. Related systems and devices are also discussed. | 04-11-2013 |
20130091173 | Methods, Systems, and Computer Program Products for Providing a Generic Database Security Application Using Virtual Private Database Functionality with a Common Security Policy Function - Methods for providing a generic database security application using virtual private database (VPD) functionality are provided. The methods may include inserting rows into a user security table in a database providing VPD functionality, each row comprising a user ID for which database access is to be controlled, the name of a database object to be secured, and a predicate; and defining a security policy function common to all secured database objects, said security policy function generating a second predicate to be appended by the database's VPD functionality to queries made on a queried secured database object by a querying user, said second predicate based on at least one predicate in at least one row in the user security table, the at least one row referencing the name of the queried secured database object and the user ID of the querying user. Related systems and computer program products are also provided. | 04-11-2013 |
20130091370 | Controlling Power States of a Peripheral Device in Response to User Proximity - In a method of controlling the power state of a peripheral device, the peripheral is changed from a first power state to a second power state in response to communications across a network connected to the peripheral indicating that a user is proximately located to the peripheral. A user may be determined to be proximately located to the peripheral by monitoring communications across the network to detect traffic that is associated with a user logging onto a computer that can utilize the peripheral, by discovering a wireless terminal that is associated with a user and which is proximately located to the peripheral, by receiving information from a cellular communication network across the network that indicates that a user of the peripheral is proximately located to the peripheral, and/or in response to a time of day and/or day of week/month schedule. | 04-11-2013 |
20130094634 | Method, System and Software for Implementing an Automated Call Routing Application in a Speech Enabled Call Center Environment - A system, method and software for implementing an automated call routing application in a speech enabled call center environment are provided. In operation, the invention provides for the identification of a call center transaction selection from a natural language user utterance and the invocation of one or more scripts operable to route the user to a call center service agent configured to service the selected transaction. In the event a transaction selection cannot be readily identified or can only be partially identified, the invention provides for the initiation of a dialog module or script directed to eliciting a discernable transaction selection and/or the presentation of one or more menus from which the user may select an available call center transaction. | 04-18-2013 |
20130097677 | Systems, Methods and Computer Program Products Supporting Provision of Web Services Using IMS - A web service request from a device is received at a web service provider. The web service request is authenticated at the web service provider using the IMS network. A requested web service is provided to the device responsive to the authentication of the web service request. The web service request may be received via a path outside of the IMS network, e.g., over a network using HTTP or other non-IMS protocol. The requested web service may also be provided using a web service response communicated to the device via a path outside of the IMS network. | 04-18-2013 |
20130135107 | Interaction Analyzer - A method of analyzing participant activity includes providing an identification unit to a participant, receiving signals from the identification unit, determining location of the participant based on the received signals, storing the location information and the associated timestamp and analyzing the stored information. | 05-30-2013 |
20130138522 | METHOD FOR AUTOMATING ONBOARDING OF USER GENERATED RINGBACK TONES TO SALES DISTRIBUTION CHANNEL - A method for automating an onboarding process for a developer onto a service delivery hub operated by a network operator includes providing the developer with information relating to use of the service delivery hub, receiving data relating to the developer, approving the developer, certifying an application provided by the developer, and configuring the application for use. A method for synchronization with the service delivery hub is also provided. | 05-30-2013 |
20130142194 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING INTRA-CARRIER IP-BASED CONNECTIONS USING A COMMON TELEPHONE NUMBER MAPPING ARCHITECTURE - Internet protocol (IP) based calls from a first terminal in an IP based communications system are routed to a second terminal in another communications system. In response to a call setup request at a common communications core that is common to both the IP based communications system and the other communications system, a query is transmitted to a private telephone number mapping database that contains routing information for terminals in both the IP based communications system and the other communications system requesting routing information for the second terminal. Routing information for the call setup request is received from the private telephone number mapping database for routing the call. | 06-06-2013 |
20130149687 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR INTERACTIVE PRESENTATION OF EDUCATIONAL CONTENT AND RELATED DEVICES - A method of presenting educational content to a plurality of students in a classroom includes displaying the educational content on an instructor terminal in the classroom. A synchronization command is wirelessly transmitted to a plurality of portable student terminals in the classroom according to a localized wireless connection protocol. The synchronization command is configured to display, on the plurality of portable student terminals, the educational content that is displayed on the instructor terminal. The plurality of portable student terminals may be respectively associated with ones of the plurality of students who are registered for an academic course associated with the educational content. An ad hoc wireless data connection may also be selectively established with at least one of the plurality of portable student terminals in the classroom. Related systems, devices, and computer program products are also discussed. | 06-13-2013 |
20130151202 | COLLABORATIVE INCIDENT MEDIA RECORDING SYSTEM - Methods for responding to a potential incident are provided in which data about the potential incident is received from a first remote sensing unit. Additional remote sensing units are identified that may have additional data about the potential incident, and additional data about the potential incident is received from at least some of these additional remote sensing units. The totality of the received data is then analyzed, and at least one remote entity is automatically notified regarding the occurrence of the potential incident. | 06-13-2013 |
20130151232 | SYSTEM AND METHOD FOR ENRICHING SPOKEN LANGUAGE TRANSLATION WITH DIALOG ACTS - Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for enriching spoken language translation with dialog acts. The method includes receiving a source speech signal, tagging dialog acts associated with the received source speech signal using a classification model, dialog acts being domain independent descriptions of an intended action a speaker carries out by uttering the source speech signal, producing an enriched hypothesis of the source speech signal incorporating the dialog act tags, and outputting a natural language response of the enriched hypothesis in a target language. Tags can be grouped into sets such as statement, acknowledgement, abandoned, agreement, question, appreciation, and other. The step of producing an enriched translation of the source speech signal uses a dialog act specific translation model containing a phrase translation table. | 06-13-2013 |
20130151252 | SYSTEM AND METHOD FOR STANDARDIZED SPEECH RECOGNITION - Disclosed herein are systems, methods, and computer-readable storage media for selecting a speech recognition model in a standardized speech recognition infrastructure. The system receives speech from a user, and if a user-specific supervised speech model associated with the user is available, retrieves the supervised speech model. If the user-specific supervised speech model is unavailable and if an unsupervised speech model is available, the system retrieves the unsupervised speech model. If the user-specific supervised speech model and the unsupervised speech model are unavailable, the system retrieves a generic speech model associated with the user. Next the system recognizes the received speech from the user with the retrieved model. In one embodiment, the system trains a speech recognition model in a standardized speech recognition infrastructure. In another embodiment, the system handshakes with a remote application in a standardized speech recognition infrastructure. | 06-13-2013 |
20130160118 | Methods, Communication Networks, and Computer Program Products for Monitoring, Examining, and/or Blocking Traffic Associated with a Network Element Based on Whether the Network Element Can be Trusted - A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element. | 06-20-2013 |
20130160123 | Methods, Systems, and Computer Program Products for Mitigating Email Address Harvest Attacks by Positively Acknowledging Email to Invalid Email Addresses - A method of detecting and responding to an email address harvest attack at an Internet Service Provider (ISP) email system includes counting a number of failed email address look-ups during a single Simple Mail Transfer Protocol (SMTP) session associated with an originating Internet Protocol (IP) address and responding to the originating IP address with a positive acknowledgement that an otherwise invalid email address exists when the count of the number of failed email address look-ups exceeds a threshold. | 06-20-2013 |
20130167197 | Methods, Systems, and Computer Program Products for Invoking Trust-Controlled Services Via Application Programming Interfaces (APIs) Respectively Associated Therewith - A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function. | 06-27-2013 |
20130170678 | METHODS AND SYSTEMS FOR SYNTHETIC AUDIO PLACEMENT - Methods and systems for providing synthetic audio placement are described herein. In different aspects, the methods and systems may include a connection port to receive a plurality of remote audio signals included in a conference call, at least one of the plurality of remote audio connections being a single channel audio signal, a processor configured with the connection port to provide a sound field for placing the plurality of audio signals, the sound field providing synthetic audio placement of each of the plurality of remote audio signals, and a rendering output configured with the processor to project the plurality of remote audio within the sound field to a listener. | 07-04-2013 |
20130182702 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING INTER-CARRIER IP-BASED CONNECTIONS USING A COMMON TELEPHONE NUMBER MAPPING ARCHITECTURE - A system includes a network entry point configured to receive and process internet protocol (IP) based connection requests originating from outside the communications network, and a telephone number mapping (ENUM) database configured to store a uniform resource identifier (URI) of the network entry point and to respond to a request for routing information for a subscriber terminal within the communications network received from a remote entity outside the communications network by providing a naming authority pointer resource (NAPTR) record including the URI of the network entry point to the remote entity in response to the request for routing information. | 07-18-2013 |
20130185713 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING SOFTWARE APPLICATION INSTALLATIONS - Methods, systems, and computer program products that automatically control the installation of software applications on a device are provided. The installation of a software application on a device is detected. The installation is temporarily halted and information about the detected software application installation is collected. A danger level of the detected software application is assessed based upon the collected information. Installation of the detected software application is allowed to continue if the assessed danger level is below a threshold level and installation of the detected software application is terminated if the assessed danger level is above the threshold level. | 07-18-2013 |
Patent application number | Description | Published |
20130207788 | PROGRAMMING A UNIVERSAL REMOTE CONTROL VIA DIRECT INTERACTION - A method and system for programming a universal remote control (URC) to operate with a remote-controlled device is disclosed. Programming codes for the remote-controlled device may be transferred from an original remote control using a programming interface. The transfer may be performed directly with the URC. The transfer may also be performed using consumer-premises equipment of a multimedia content distribution network. The URC may be configured to use at least one of the programming codes to remotely control the remote-controlled device. | 08-15-2013 |
20130208094 | APPARATUS AND METHOD FOR PROVIDING THREE DIMENSIONAL MEDIA CONTENT - A system that incorporates teachings of the exemplary embodiments may include, for example, means for generating a disparity map based on a depth map, means for determining accuracy of pixels in the depth map where the determining means identifies the pixels as either accurate or inaccurate based on a confidence map and the disparity map, and means for providing an adjusted depth map where the providing means adjusts inaccurate pixels of the depth map using a cost function associated with the inaccurate pixels. Other embodiments are disclosed. | 08-15-2013 |
20130208780 | JOINT DEMODULATION USING A VITERBI EQUALIZER HAVING AN ADAPTIVE TOTAL NUMBER OF STATES - Systems and methods for performing joint demodulation using a Viterbi equalizer having an adaptive total number of states are disclosed. Generally, a method includes joint demodulating a desired signal and one or more interfering signals with a Viterbi equalizer having an adaptive total number of states based on channel impulse response (CIR) coefficients associated with a desired signal and the one or more interfering signals. | 08-15-2013 |
20130208872 | HIGH AVAILABILITY ARCHITECTURE FOR COMPUTER TELEPHONY INTERFACE DRIVER - Systems, method, and media for providing communication services between an application and a computer telephony interface server are provided. One of a plurality of computer telephony interface drivers is launched as a primary computer telephony interface driver to interface the application with the computer telephony interface server. The computer telephony interface drivers are monitored with a plurality of monitors. Each of the monitors is associated with one of the computer telephony interface drivers and monitors a status of another of the computer telephony interface drivers. A failure of the primary computer telephony interface driver is detected with a secondary monitor. The secondary monitor monitors the primary computer telephony interface driver and is associated with a secondary computer telephony interface driver. The secondary computer telephony interface driver is launched with the secondary monitor in response to the secondary monitor detecting the failure of the primary computer telephony interface driver. | 08-15-2013 |
20130212141 | Computing Time-Decayed Aggregates Under Smooth Decay Functions - Aggregates are calculated from a data stream in which data is sent in a sequence of tuples, in which each tuple comprises an item identifier and a timestamp indicating when the tuple was transmitted. The tuples may arrive at a data receiver out-of-order, that is, the sequence in which the tuples arrive are not necessarily in the same sequence as their corresponding timestamps. In calculating aggregates, more recent data may be given more weight by a decay function which is a function of the timestamp associated with the tuple and the current time. The statistical characteristics of the tuples are summarized by a set of linear data summaries. The set of linear data summaries are generated such that only a single linear data summary falls between a set of boundaries calculated from the decay function and a set of timestamps. Aggregates are calculated from the set of linear data summaries | 08-15-2013 |
20130212239 | METHODS AND APPARATUS TO PROVISION NAME-SERVERS - Methods and apparatus are disclosed to provision name-servers. An example system disclosed herein includes a name-server evaluator to determine capacities of the plurality of name-servers, a provisioner to compute profile assignment values based on a plurality of subscriber identifiers, and an assignor to assign the subscriber identifiers to one of the plurality of name-servers based on the profile assignment values and the capacities. | 08-15-2013 |
20130212293 | MULTIMEDIA DISTRIBUTION IN A HETEROGENEOUS NETWORK - The efficiency of real-time distribution of multimedia content over a heterogeneous network is optimized by locally, rather than centrally, adapting the content to conform to the capabilities limitations of the network. Multimedia content travels from a central location along the network backbone. When received by each of a system of dispersed media servers, that media server adapts the content by compensating for any QoS limitations of the downstream network segments. For example, the backbone of the communications network may consist of a satellite uplink. The dispersed media servers receive and replicate the content as required for distribution to unicast segments downstream rather than doing so at the source of the content, and thus multiple streams of identical content need not be carried on the backbone. Each dispersed server is programmed to optimize the transmission to conform to the transmission parameters of each adjacent and downstream segment of the network. | 08-15-2013 |
20130215762 | SYSTEMS AND METHODS FOR PROACTIVE MANAGEMENT OF A COMMUNICATION NETWORK THROUGH MONITORING A USER NETWORK INTERFACE - Systems and methods for proactive management of a communication network through monitoring a user network interface are disclosed. Example disclosed methods include determining that a first network component associated with first information obtained from a first received exception message is related to both a first user network interface and a second user network interface, determining that a second network component associated with second information obtained from a second received exception message is related to both the first and second user network interfaces, determining that a third network component associated with third information obtained from a third received exception message is related to both the first user network interface and a third user network interface, combining the first, second and third information to proactively assess performance of the first user network interface, and combining the first and second information to proactively assess performance of the second user network interface. | 08-22-2013 |
20130215882 | METHOD AND APPARATUS FOR ENABLING REGISTRATION OF AGGREGATE END POINT DEVICES THROUGH PROVISIONING - A method and apparatus for enabling registration of an Aggregate End Point (AEP) device that is incapable of supporting a Session Initiation Protocol (SIP) based Internet Protocol Multimedia Subsystem (IMS) registration are disclosed. The method performs a static registration of the AEP device in a plurality of network elements associated with an Internet Protocol Multimedia Subsystem (IMS) network by provisioning. The method then processes an originating call request or a terminating call request associated with the AEP device using the static registration. | 08-22-2013 |
20130216028 | NETWORK TO ALARM PANEL SIMULATOR FOR VOIP - The present invention provides for a system and method for providing a signal to a communication system comprising an interface between a communication link and the communication system, like an alarm system, wherein the interface receives a signal from the communication link and provides a signal indicative of the availability of the communication link for use by the communication system. Alarm systems operations may be facilitated so that Residential Gateway components (such as voice terminal adapters) may simulate traditional telephone network systems that run on 48 VDC powered telephone lines. The system also comprises an input port associated with the interface for receiving the signal from the communication link, a transformer or a voltage regulator and an output port associated with the interface for providing the conditioned signal to the communication system. A ring voltage received from the communication link may be passed through to the alarm system. | 08-22-2013 |
20130216032 | Convenience Features In A Method And System For Providing Enhanced Caller Identification - A computer readable storage medium storing computer readable program code, the code configured to provide caller identification information to a called party when standard Caller ID cannot be provided. If standard caller ID information cannot be provided for a call, the call is interrupted by the present service and the calling party is prompted for audible caller identification information. In one embodiment, when the audible caller identification is provided, the call is presented to the called party with a distinctive ring at the called telephone station. In another embodiment, the calling party may enter a personal identification number (PIN) to bypass the requirement for audible caller identification information. In still another embodiment, when the PIN is entered, the call is presented with a distinctive ring at the called communication station. In still another embodiment, the called party may send the incoming call to a voice mail system. | 08-22-2013 |
20130216210 | Systems and Methods of Providing Modified Media Content - In a particular embodiment, a method includes displaying a playback rate slide bar having a plurality of increments. The plurality of increments is equally spaced along the playback rate slide bar and each increment of the plurality of increments corresponds to a different playback rate of media content. | 08-22-2013 |
20130217320 | METHODS AND SYSTEMS FOR RELAYING OUT OF RANGE EMERGENCY INFORMATION - A report message may be transmitted with collaborated information related to the occurrence of an emergency event. A plurality of devices, such as mobile communications devices, that are out of range of a communications network can communicate via direct communication, such as device-to-device communication, to corroborate characteristics that are indicative of an occurrence of an emergency event. Information related to the occurrence may be collaborated amongst the plurality of devices. A transmitting device, which may be one of the plurality of devices that corroborates characteristics or collaborates information, may generate and transmit the report message comprising the collaborated information. A receiving device may provide the message over a communications network, or the report message may continue to be handed off between devices capable of direct communication, the message eventually reaching a device that is within range of the communications network. | 08-22-2013 |
20130217369 | SYSTEM AND APPARATUS FOR ADAPTING OPERATIONS OF A COMMUNICATION DEVICE - A system that incorporates teachings of the present disclosure may include, for example, at a base station, communicating with a mobile phone where the base station comprises a premises wireless access point, at the base station, communicating with a mobile communication system by way of a broadband connection, and instructing a landline phone communicatively coupled to the base station to communicate with a remote end user device via the mobile communication system utilizing identification information of the mobile phone and responsive to communications between the base station and the mobile phone. Other embodiments are disclosed. | 08-22-2013 |
20130219419 | Electronic Programming Guide - A broadcast programming guide is generated based on either designation by or a habit of a user. The programming guide may determine one or more favorite channels of the user based on habitual viewing. The programming guide may suggest channels of interest, based on genres of programming shown on the favorite channels. | 08-22-2013 |
20130219439 | SYSTEM AND METHOD TO DELIVER VIDEO CONTENT - A method of delivering video content includes identifying a television program scheduled to be broadcast at a time during a peak viewing period, and identifying a recipient multimedia storage device that is to receive video content associated with the television program. The method also includes sending the video content associated with the television program to the recipient multimedia storage device during a non-peak viewing period that precedes the peak viewing period. The video content includes data to prevent viewing of the video content prior to the time when the television program is scheduled to be broadcast. | 08-22-2013 |
20130222125 | Remote Control Device with Directional Mode Indicator - Methods, systems, and products disclose a remote control device that controls multiple consumer electronics devices based on orientation. | 08-29-2013 |
20130222155 | Methods, Systems, Devices, And Computer Program Products For Implementing Condition Alert Services - Methods, systems, devices, and computer program products for implementing condition alert services are provided. A method includes receiving information elements from a source that identify a condition, aggregating the information elements from the source with information elements from other sources that identify the same condition, and creating a composite file that includes the aggregated information elements representing each of the sources. The method also includes generating a condition alert from the composite file and transmitting the condition alert to a recipient communications device. | 08-29-2013 |
20130223288 | Apparatus and Method for Providing Messaging Services - A system that incorporates teachings of the present disclosure may include, for example, a voicemail device having a controller to detect a recording of a voicemail message, generate a Session Initiation Protocol (SIP) message, wherein the SIP message contains visual voicemail data associated with the recorded voicemail message, and transmit the SIP message to a cordless phone system, wherein the SIP message is received by the cordless phone system over a data port of the cordless phone system, wherein the cordless phone system comprises a base station and at least one cordless communications device, wherein the visual voicemail data is retrieved by the base station, and wherein the visual voicemail data is transmitted by the based station to the at least one cordless communications device by utilizing a cordless wireless access protocol. Other embodiments are disclosed. | 08-29-2013 |
20130223435 | System and Method of Routing Voice Communications Via Peering Networks - A method of routing voice communications is disclosed and includes receiving network event data at a telephone number mapping (ENUM) server of an originating network from a plurality of peering border elements associated with a plurality of peering communication networks. The network event data indicates a health status of each of the peering communication networks. The method also includes determining a network weight related to each of the peering communication networks based on the network event data, wherein each network weight indicates a proportion of calls that are to be routed from the originating network via the related peering communication network. The method further includes dynamically assigning a plurality of preference field values to session initiation protocol (SIP) addresses of the peering border elements within a plurality of naming authority pointer (NAPTR) records, based on the network weights. | 08-29-2013 |
20130223483 | NARROWBAND INTERFERENCE REJECTION FOR ULTRA-WIDEBAND SYSTEMS - A technique for reducing interference between a direct-sequence ultra-wideband communications system and a narrowband communications system uses interference-rejecting spreading codes to reduce signal power in a frequency band associated with the narrowband communications system. A method of operating an ultra-wideband communications system includes applying an interference-rejecting spreading code to a signal for transmission. The interference-rejecting spreading code is configured to reduce power in a particular frequency band of a transmit or receive power spectral density associated with the ultra-wideband signal without substantially reducing power outside that particular frequency band of the transmit or receive power spectral density associated with the ultra-wideband signal. | 08-29-2013 |
20130223491 | Methods, Systems and Products for Providing Modem Functions - A network interface to a data network has a modulator-demodulator. The modulator-demodulator receives a modulated carrier signal from an input connection. A power circuit connected to the input connection receives electrical power from a loop plant and provides the electrical power to the modulator-demodulator. | 08-29-2013 |
20130223839 | METHOD AND APPARATUS FOR PROVIDING COMMUNICATION USING A TERAHERTZ LINK - A method and apparatus for establishing a terahertz link using a multi-element lens array that comprises a liquid lens are disclosed. For example, the method receives detected terahertz signals from one or more detectors, where a liquid lens is deployed with each of the one or more detectors. The method determines, for each of the detected signals, if the detected signal is out of focus, and applies a corrective voltage to each liquid lens that corresponds to a detected terahertz signal that is out of focus, wherein the corrective voltage adjusts a focus of the detected signal. The method measures a signal-to-noise ratio of the detected signals, and establishing a terahertz link via at least one of the detected terahertz signals with a highest signal-to-noise ratio. | 08-29-2013 |
20130224994 | ETHERNET OVER COAXIAL COUPLING SYSTEM, METHOD AND APPARATUS - A device that incorporates teachings of the present disclosure may include, for example, a controller to provide low loss connectivity to a plurality of coaxial ports over a wide range of frequencies from D.C. to 2 GigaHertz in a coaxial network providing Ethernet networking, detune secondary coaxial splitters in the coaxial network that reduces an output-to-output isolation loss among secondary coaxial splitter output ports, and enable re-distribution of modulated radio frequency video signals from any point on the coaxial network to any alternative point on the coaxial network. Other embodiments are disclosed. | 08-29-2013 |
20130226523 | Methods, System, and Computer-Readable Media for Facility Integrity Testing - Methods, systems, and computer-readable media provide for facility integrity testing. According to embodiments, a method for populating a watch list with circuits of a communications network to be monitored for repeat failures is provided. According to the method, a trouble ticket associated with one of the circuits and a trouble code and analysis code (TC/AC) combination associated with the trouble ticket is retrieved. Whether the trouble ticket meets a watch list criterion is determined. In response to determining that the trouble ticket meets the watch list criterion, the trouble ticket and the TC/AC combination are added to the watch list. | 08-29-2013 |
20130226543 | Systems, Methods, and Computer Program Products for Estimating Crowd Sizes Using Information Collected From Mobile Devices in a Wireless Communications Network - Systems, methods, and computer program products are for estimating crowd size at a location. An exemplary method includes determining, at a crowd size analyzer, a number of wireless service users at the location, and estimating, at the crowd size analyzer, a total number of people at the location based upon the number of wireless service users determined to be at the location. | 08-29-2013 |
20130226585 | Methods, Systems, and Products for Measuring Health - Methods, systems, and products measure health data related to a user. A spoken phrase is received and time-stamped. The user is identified from the spoken phrase. A window of time is determined from a semantic content of the spoken phrase. A sensor measurement is received and time-stamped. A difference in time between the time-stamped spoken phrase and the time-stamped sensor measurement is determined and compared to the window of time. When the difference in time is within the window of time, then the sensor measurement is associated with the user. | 08-29-2013 |
20130227045 | Bot-Network Detection Based on Simple Mail Transfer Protocol (SMTP) Characteristics of E-Mail Senders Within IP Address Aggregates - A method and system for determining whether an IP address is part of a bot-network are provided. The IP-address-aggregate associated with the IP address of an e-mail sender is determined. The IP-address-aggregate is associated with an IP-address-aggregate-category based on the current SMTP traffic characteristics of the IP-address-aggregate and the known SMTP traffic characteristics of an IP-address-aggregate-category. A bot-likelihood score of the IP-address-aggregate-category is then associated with IP-address-aggregate. IP-address-aggregate-categories can be established based on historical SMTP traffic characteristics of the IP-address-aggregates. The IP-address-aggregates are grouped based on SMTP characteristics, and the IP-address-aggregate-categories are defined based on a selection of IP-address-aggregates with similar SMTP traffic characteristics that are diagnostic of spam bots vs. non-botnet-controllers spammers. Bot likelihood scores are determined for the resulting IP-address-aggregate-categories based on historically known bot IP addresses. | 08-29-2013 |
20130227050 | ASYMMETRIC DATA MIRRORING - Methods, systems, and products mirror data between local memory and remote storage. A write command is sent from a server to a remote storage device, and a timer is established. A current time of the timer is compared to a maximum time period. If the maximum time period expires without receipt of an acknowledgment to the write command, then a write error is assumed to exist to the remote storage device. | 08-29-2013 |
20130227068 | METHODS AND APPARATUS FOR SELECTING AND PUSHING CUSTOMIZED ELECTRONIC MEDIA CONTENT - Methods and an apparatus for selecting and pushing customized electronic media content are disclosed. An example method includes determining a first capability associated with a first device; determining a second capability associated with a second device; segmenting a piece of media into a first plurality of portions according to the first capability; when the second capability is different from the first capability, segmenting the piece of electronic media into a second plurality of portions according to the second capability, the second plurality of portions to be sized differently than the first plurality of portions; pushing a first one of the first plurality of portions to the first media device prior to the user requesting the first piece of electronic media; and pushing a first one of the second plurality of portion to the second media device prior to the user requesting the first piece of electronic media. | 08-29-2013 |
20130227133 | Methods, Systems, And Computer Program Products For Providing Intelligent Monitoring Services - Methods, systems, and computer program products for intelligent monitoring services are provided. A method includes sampling data for a subject over a defined time period and calculating a normative value for the defined time period based on the sampled data. The method also includes monitoring incoming data for the subject, comparing a monitored value for the incoming data to the normative value, and generating a responsive action when the monitored value deviates from the normative value. | 08-29-2013 |
20130227134 | Method and Apparatus for Measuring the End-to-End Performance and Capacity of Complex Network Service - A method and system of measuring performance and capacity of a network includes monitoring network activity using an application programming interfaces (API) monitoring system with a web services definition language (WSDL) file and a probe. The WSDL file provides instructions to a probe control system in the API monitoring system and the probe control system provides regular expressions to the probe. Performance data are collected using the probe. The performance data includes a collection of performance information. Using the probe, performance data are transmitted between the network and the API monitoring system. The API monitoring system stores the performance data in a database of performance data monitored and analyzes the performance data to determine performance and capacity of the network. The API monitoring system reports information on performance and capacity of the network to a network operations center dashboard. | 08-29-2013 |
20130227491 | Interactive Program Manager and Methods for Presenting Program Content - A particular system includes a processor and memory storing instructions that are executable by the processor to cause the processor to perform operations. The operations include sending a notification indicator to a first device in response to identifying content of interest associated with a first source. The operations also include, in response to user input responsive to the notification indicator, sending a menu display to the first device. The menu display includes a first user selectable option to view a submenu. The submenu includes an option to selectively enable display of an alert associated with the first source. The alert is displayable on the first device in conjunction with display of a first program. | 08-29-2013 |
20130227492 | APPARATUS FOR CONTROLLING THREE-DIMENSIONAL IMAGES - A system that incorporates teachings of the present disclosure may include, for example, computer-readable storage medium having computer instructions to receive from a media processor one or more scaling characteristics of a three-dimensional (3D) image, present a user interface (UI) for controlling a presentation of the 3D image at a presentation device communicatively coupled to the media processor, wherein the UI is adapted to the scaling characteristics of the 3D image, detect a manipulation of the UI, and transmit to the media processor instructions for adapting the presentation of the 3D image at the presentation device according to the detected manipulation of the UI. Other embodiments are disclosed. | 08-29-2013 |
20130227605 | SYSTEM AND METHOD TO DISTRIBUTE VIDEO-ON-DEMAND CONTENT - Method, system and computer-readable medium to distribute VOD content are disclosed. A method of displaying video content includes accessing an association table for video-on-demand (VOD) content. The association table includes a first segment entry associated with a first video segment of a first length and a second segment entry associated with a second video segment of a second length that is longer than the first length. The first segment entry includes a first multicast group ID and the second segment entry includes a second multicast group ID. The method further includes receiving the first video segment via the first multicast group ID, displaying the received first video segment, and receiving the second video segment via the second multicast group ID within a period of time of displaying the first video segment. | 08-29-2013 |
20130227713 | METHOD FOR ENCRYPTING AND EMBEDDING INFORMATION IN A URL FOR CONTENT DELIVERY - A method for accessing a remote network includes identifying a content server associated with the remote network, generating a uniform resource locator, embedding additional data in the uniform resource locator, encrypting the uniform resource locator, and accessing a server in the remote network identified by the uniform resource locator. The method further includes wherein the additional data comprises authentication data, a delivery session identification, a time stamp, or comprises subscriber identification data. The URL may provide access to the content server for a time period indicated by the time stamp. The method includes wherein at least the subscriber identification data prevents unauthorized sharing of the URL. | 08-29-2013 |
20130235723 | SOFT PACKET DROPPING DURING DIGITAL AUDIO PACKET-SWITCHED COMMUNICATIONS - A method of packetizing digital information for packet-switched communications includes placing, at a transmitting device with memory and a processor, a most significant bit of a digital voice sample into a variable-length most significant bit packet having a high transmission priority for transmission over a packet-switched network in which a node receives the packet and independently determines how to route the packet. At the transmitting device, a least significant bit of the digital voice sample is placed into a variable-length least significant bit packet having a low transmission priority for transmission over the packet-switched network. Prioritization of packets as having a high transmission priority or low transmission priority is independent of content characteristics of digital voice samples with elements contained therein. | 09-12-2013 |
20130272142 | Intelligent Loop Diagnostics for Digital Subscriber Line Services to Support a Service Assurance System - A method of diagnosing a transmission loop in an Internet protocol television (IPTV) network includes configuring the loop as an open loop and performing a single-ended loop test (SELT), configuring the loop as a terminated-loop and performing another SELT, subtracting a trace of the first SELT from a trace of the second SELT, and determining the length of the loop from the result. A service assurance system in an IPTV network includes a test module and a DSLAM coupled to a residential gateway by a transmission loop. The test module operates to determine that a fault condition on the IPTV network is caused by a fault in the loop, direct the DSLAM to perform an open loop SELT and a terminated-loop SELT on the loop, receive the results of the SELTs, and determine a location of a tap on the loop based upon the results. | 10-17-2013 |
20130272507 | System and Method of Call Screening - A method includes receiving a notification that indicates that a call from a caller has been received at a remote network-based messaging system at a computer terminal. The computer terminal is connected to the remote network-based messaging system via a data connection. The method includes displaying a pop-up view at the computer terminal to notify a subscriber of the call. The pop-up view includes call screening options and an option to add information identifying the caller to an electronic address book that is not a call log. The method includes sending a request to intercept the call from the computer terminal to the remote network-based messaging system via the data connection and sending information that indicates a destination device from the computer terminal to the remote network based messaging system. The call is routed from the remote network-based messaging system to the destination device. | 10-17-2013 |
20130301412 | Providing a Quality of Service for Various Classes of Service for Transfer of Electronic Data Packets - A quality of service for various classes of services for the transfer of electronic data packets is provided by establishing classes of packets for a customer and for assigning bandwidths to the classes for the customer. Accordingly, the amount of bandwidth for one type of service may vary from the bandwidth for another type of service over the same data connection. A device, such as an edge router of a network, may police the data packets being transferred by a customer to maintain the bandwidth being utilized by a given class of packets of the customer to within the assigned bandwidth for that class of the customer. The data packets may further be policed by core routers of the network may also to maintain the bandwidth being utilized by a given class of packets to within the assigned bandwidth for that class as specified by the service provider. | 11-14-2013 |
20130312021 | METHODS, SYSTEMS AND COMPUTER PRODUCTS FOR VIDEO CALLING AND LIVE HELP VIA IPTV - Systems, methods and computer products for querying for an interactive assistant for communication over a network via the set-top box. Communications are initiated between a subscriber and an interactive assistant. A diagnostic data log is uploaded from the set-top box to the interactive assistant. Based on the communications between the subscriber an interactive assistant and the diagnostic data log, diagnostic protocols are executed within the set-top box to generate a diagnostic report. The interactive assistant provides feedback analytics via the set-top box based on the communications between the subscriber and the interactive assistant, the diagnostic data log and the diagnostic report. Firmware solutions are downloaded to the set-top box based on results from the diagnostic report. | 11-21-2013 |
20130318163 | METHODS, SYSTEMS, AND COMPUTER PRODUCTS FOR DOWNLOAD STATUS NOTIFICATION - Methods, systems, and computer products for download notification including identifying content for download, requesting a download of the content to a device and requesting a notification related to the status of the download. | 11-28-2013 |
20130318415 | Test System Having a Sub-System to Sub-System Bridge - A test system having a sub-system to sub-system bridge may be provided that utilizes the useful attributes of a plurality of circuit testing techniques, while reducing deficiencies associated with certain types of circuit testing. A bridged test system structure is utilized to facilitate circuit testing that is more effective and time efficient. The method analyzes performance data acquired by a first component for one or more circuits, and sends that performance data to a second test component. The second test component provides test signals to the circuits, using the performance date to enhance the use of the test signals, and also provides test response data for the circuits in response to the provided test signals. | 11-28-2013 |
20140053268 | METHOD OF DETECTING POTENTIAL PHISHING BY ANALYZING UNIVERSAL RESOURCE LOCATORS - A method for detecting potential phishing URLs includes extracting a URL from a document, analyzing the URL context, and comparing the URL to stored trusted URLs and stored known phishing URLs. The URL context includes anchor text and surrounding content associated with the URL. The method further includes generating a phishing alert based on the comparing and the analyzing. | 02-20-2014 |
20140157384 | Biometric Authentication - A biometric authentication system is disclosed that provides a trusted third party biometric authentication capability for independent confirmation of identity of parties. A repository of biometric templates for registered parties is disclosed that permit a biometric authenticator to perform independent authentication services for other parties by matching received biometric information against biometric information in the repository, or by providing requested biometric information. | 06-05-2014 |
20140334310 | Method and System for Automatic Triggering Network Management Control for VoIP Border Elements - The present disclosure is directed to a method and system for automatic triggering network management (NM) control for Voice-Over-IP (VoIP) border elements (BE). The method detects call storm events by monitoring blocked call error messages and maintaining counts according to telephone number based control strings, and controls call storm events by limiting the admitted call rate for calls matching a control string according to an adaptive leaky bucket control. The control drain rate is updated periodically based on a calculated successful call rate and is set to somewhat exceed the successful rate. A control is automatically removed when no blocked calls are observed for a specific number of consecutive windows. | 11-13-2014 |