Patent application number | Description | Published |
20090136017 | SYSTEM AND METHOD FOR PROCESSING TELECOMMUNICATION CALLS - A system and method are disclosed for processing calls in a telecommunication network. The system may comprise a plurality of terminals, wherein each of the plurality of terminals has an input for receiving a call request including a set of keywords, and wherein the plurality of terminals comprises a calling terminal and a set of destination terminals. The system further may comprise a call processing server for establishing communication between the calling terminal and the set of destination terminals in response to the reception of a call request from the calling terminal. The call processing server may comprise a management table, an alias resolution unit, an analyzer unit, and a switching subsystem. | 05-28-2009 |
20100093315 | AUTOMATED CALL CONTEXT NOTIFICATION - A request is received to initiate a context-based voice call, where the request includes a calling number, a called number, and a text string forming a context portion of the context-based voice call. A request is received to initiate a voice call portion of the context-based voice call from the calling number to the called number. The voice call portion and the context portion of the context-based voice call are synchronized between a calling device referenced by the calling number and a called device referenced by the called number. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 04-15-2010 |
20130276095 | PASS-PATTERN AUTHENTICATION FOR COMPUTER-BASED SECURITY - Implementing security access includes mapping input elements of an input device to a coordinate system. Each of the input elements is assigned to a point on the coordinate system that is defined by respective coordinate values. The security access also includes receiving a number of inputs via corresponding input elements. An input element assigned to a first input of the number of inputs is denoted as a starting point for a sequence. Beginning with an input in the sequence that immediately follows the first input in the sequence, the security access further includes identifying a directional orientation of each of the input elements as compared to an input element immediately preceding the input element in the sequence, creating a directional pattern sequence from the directional orientation identified for each of the input elements, and providing access to an information source using the directional pattern sequence as an authentication mechanism. | 10-17-2013 |
20130276099 | PASS-PATTERN AUTHENTICATION FOR COMPUTER-BASED SECURITY - Implementing security access includes mapping input elements of an input device to a coordinate system. Each of the input elements is assigned to a point on the coordinate system that is defined by respective coordinate values. The security access also includes receiving a number of inputs via corresponding input elements. An input element assigned to a first input of the number of inputs is denoted as a starting point for a sequence. Beginning with an input in the sequence that immediately follows the first input in the sequence, the security access further includes identifying a directional orientation of each of the input elements as compared to an input element immediately preceding the input element in the sequence, creating a directional pattern sequence from the directional orientation identified for each of the input elements, and providing access to an information source using the directional pattern sequence as an authentication mechanism. | 10-17-2013 |
20130290299 | CONTENT-BASED NAVIGATION FOR ELECTRONIC DEVICES - Content-based navigation of an electronic device includes receiving supplemental content to an electronic book. The supplemental content is created separately from the electronic book. The content-based navigation also includes associating an identifier of the electronic book with the supplemental content, storing the supplemental content with the identifier in a storage device, and creating an index to the supplemental content that is searchable by the identifier of the electronic book. The content-based navigation further includes providing end user devices with access to the supplemental content in the storage device via the index. | 10-31-2013 |
20130290838 | CONTENT-BASED NAVIGATION FOR ELECTRONIC DEVICES - Content-based navigation of an electronic device includes receiving supplemental content to an electronic book. The supplemental content is created separately from the electronic book. The content-based navigation also includes associating an identifier of the electronic book with the supplemental content, storing the supplemental content with the identifier in a storage device, and creating an index to the supplemental content that is searchable by the identifier of the electronic book. The content-based navigation further includes providing end user devices with access to the supplemental content in the storage device via the index. | 10-31-2013 |
20150362096 | CABLE SECURING APPARATUS AND METHOD OF SECURING A CABLE - Method and apparatus are provided for securing a cable. The apparatus includes: a substantially cone-shaped member having an elongate opening along the axis of the cone in which a cable is placeable in use; a holding member having at least one open-sided aperture in which the cone-shaped member is houseable in use; wherein the widest diameter of the cone-shaped member is greater than the diameter of the open-sided aperture of the holding member. The method of securing a cable may include: placing a cable in a substantially cone-shaped member having an elongate opening along the axis of the cone in which the cable is placeable; and inserting the cone-shaped member in a holding member having at least one open-sided aperture. | 12-17-2015 |
20160068265 | PACKAGE TRANSPORT BY UNMANNED AERIAL VEHICLES - According to an aspect, an unmanned aerial vehicle (UAV) is provided that is capable of flying between a pick up point and a delivery point with respect to a package transfer operation. The delivery point is identifiable by the UAV through global positioning system (GPS) coordinates of the delivery point and verification of a device identifier of a package docking device (PDD) associated with a package transfer request. A control processor coupled to the UAV receives a transaction packet for the operation that includes the GPS coordinates and the device identifier of the PDD associated with the request. Upon arrival of the UAV at the delivery point, the control processor verifies that a device identifier of a PDD located at the delivery point matches the device identifier in the transaction packet, implements the package transfer operation, and transmits confirmation of completion of the operation to an originator of the request. | 03-10-2016 |
20160092154 | CONTENT MIRRORING - A method of mirroring the content of a first display device on a second display device, the method includes displaying content on the first display device, displaying the content on the second display device, detecting the input of text on a user interface device associated with the first display device, and interrupting the display of the content on the second display device. The interrupting of the display of the content on the second display device can comprise freezing the display of the content on the second display device. | 03-31-2016 |