Patent application number | Description | Published |
20080228547 | Intelligent Free-Time Search - Techniques are disclosed for performing free-time searches that exploit information of the type used with electronic calendars. By leveraging advanced calendaring system information and using location, other context information such as corporate policy, legal constraints, and technology constraints, and user-specific preferences to provide a complete picture of a person's availability, the functionality (and therefore the value) of scheduling systems in increased, resulting in an ability to schedule meetings with more accuracy and less rework. Various allowable participation types for meeting invitees may be specified, and each invitee's availability is determined accordingly. Location-sensitive travel times (including optional user-specific travel time adjustments) are used in preferred embodiments when in-person participation is required. | 09-18-2008 |
20080288435 | Context Conflict Resolution and Automatic Context Source Maintenance - Techniques are disclosed for detecting and resolving conflicts in context information from various sources. That information may be used to automatically update one or more context sources and/or to validate or invalidate (until further notice or for a period of time) input from one or more context sources. Or, the updates can be made in response to the user's instructions. Rules are used in preferred embodiments to dictate the conflict resolution approach for individual users. Updating the context source is particularly useful when the source is an electronic calendar. Updates that may be made to the calendar include adding, deleting, or changing scheduled events and/or working hours. Invalidating data from a context source is particularly useful for lost, forgotten, misplaced, or loaned devices. Marking data from a context source as valid is preferably done when harmony among several context sources is detected. Context suppliers may be notified of errors or discrepancies in their context data. | 11-20-2008 |
20100050185 | Context Conflict Resolution and Automatic Context Source Maintenance - Techniques are disclosed for detecting and resolving conflicts in context information from various sources. That information may be used to automatically update one or more context sources and/or to validate or invalidate (until further notice or for a period of time) input from one or more context sources. Or, the updates can be made in response to the user's instructions. Rules are used in preferred embodiments to dictate the conflict resolution approach for individual users. Updating the context source is particularly useful when the source is an electronic calendar. Updates that may be made to the calendar include adding, deleting, or changing scheduled events and/or working hours. Invalidating data from a context source is particularly useful for lost, forgotten, misplaced, or loaned devices. Marking data from a context source as valid is preferably done when harmony among several context sources is detected. Context suppliers may be notified of errors or discrepancies in their context data. | 02-25-2010 |
20130006690 | Keeping Working Hours and Calendar Entries Up-to-Date - Techniques are disclosed for keeping calendars up-to-date, whereby a person's working hours, events, and actual availability are accurately reflected. In response to user-generated input and/or application-generated input, working hours can be updated and calendar events can be added to, deleted from, or changed on the user's calendar. This makes it easy for users to keep calendars (including working hours) up-to-date and helps both people and applications that use calendar data. Profiles are preferably used to specify working hours, and a particular user may have one or more profiles available (including a default profile); the user can then easily select from among these profiles to update the working hours for a date/day, or a range of dates/days. Preferences may be associated with the profiles, providing a convenient way of isolating information that applies only to a particular set of working hours. | 01-03-2013 |
Patent application number | Description | Published |
20080293379 | METHOD AND APPARATUS FOR ACCESSING A FOREIGN NETWORK WITH AN OBFUSCATED MOBILE DEVICE USER IDENTITY - A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator (or an entity authorized thereby). When the mobile device user roams into a foreign network, that network receives the enriched identifier in lieu of an MSISDN. The foreign network uses the first part to identify the mobile device user's home network, e.g., to determine whether to permit the requested access (or to provide some other value-added service). The foreign network, however, cannot decode the second part; thus, the mobile device's identity (as well as the identity of the mobile device user) remains obscured. This ensures that the user's privacy is maintained, while preventing third parties from building a profile of the device based on the requests that include the MSISDN or similar identifier. | 11-27-2008 |
20080293411 | METHOD AND APPARATUS FOR MANAGING OBFUSCATED MOBILE DEVICE USER IDENTITIES - A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator. The present invention describes a method and apparatus for use in a home network to manage the generation, storage and use of the unique identifiers. | 11-27-2008 |
20090031081 | SYSTEM AND MODULE FOR MERGING ELECTRONIC AND PRINTED DATA - A system for merging electronic and printed information is provided. The system includes a computing device having a visual display. Additionally, the system includes a handheld electronic memory device containing at least one information file with information corresponding to printed information that is presented on a separate physical medium. The memory device also includes a processing file comprising stored computer-readable instructions. The system further includes an electrical connector that is attached to the handheld electronic memory device. The electrical connector connects to the computing device having the visual display so that the at least one information file and the processing file are conveyed via the electrical connector to the computing device when the electrical connector is connected to the computing device. | 01-29-2009 |
20090037533 | USING A GROUP LIST SERVER AS A SYNDICATION FEED SERVER - The present invention discloses a solution for modifying a group list server to perform syndication feed operations. A syndication feed creation software component, a content gathering component, and a content extraction converting component can be added to a group list server. The modified group list server can continue to function as a traditional list server and can also function as a traditional feed server that is able to interoperate with standard, client-side feed readers. In one embodiment, the modified list server can repurpose syndication groups as to operate as syndication feed channels and can repurpose group members to operate as feed items. | 02-05-2009 |
20090070790 | USING A STATE MACHINE EMBEDDED WITHIN A SESSION INITIATION PROTOCOL (SIP) SERVLET TO IMPLEMENT AN APPLICATION PROGRAMMING INTERFACE (API) - The present invention discloses a system for implementing a software application programming interface (API) within a session initiation protocol (SIP) servlet. Such a system can utilize a state machine, a SIP servlet configured to execute the state machine, and an enterprise service bus (ESB). The state machine can be configured to send and receive a series of communications and can be defined in a definition document. The series of communications can represent the execution of a software function defined within an API. The SIP servlet can select a state machine based upon an indicator contained within a received SIP message. The ESB can be configured to execute a system function in response to communications with the state machine. | 03-12-2009 |