Patent application number | Description | Published |
20080215323 | Method and System for Grouping Voice Messages - A method for grouping voice messages includes extracting a voice signature from a voice message and tagging the voice message with an identification associated with the voice signature. The method also includes grouping the voice message based on the identification. | 09-04-2008 |
20080226046 | Integrated Alerting - In a wide-area communication system, users or numbers in the system to be alerted are ranked so to improve the efficiency of the alert calls. Rankings are based on various factors, including whether two or more users are on the same active call, whether a user is on an active call, how recently a user ended a call, and whether a user recently missed a call. Within rankings, there may be multiple callers or numbers. These users may further be ranked, such as by determining which caller is expected to end a call first based on the current elapsed time of the call and the average call duration for that user or number. | 09-18-2008 |
20080226049 | LOCATION BASED MIXER PRIORITIES IN CONFERENCES - In one embodiment, a method includes identifying a plurality of locations associated with a conference system that has a conference server and a mixer, and prioritizing the locations by assigning a first priority to at least a first location and assigning a second priority to a second location. The second priority is lower than the first priority. The method also includes processing received media streams such that media streams received from endpoints associated with the first location are processed as having a higher priority than media streams received from endpoints associated with the second location. | 09-18-2008 |
20080226059 | Method and system for managing calls - A method for managing calls includes allocating a plurality of agents among a plurality of queues, receiving a plurality of calls each for connection with at least one of the plurality of agents, and assigning each of the plurality of calls to a queue of the plurality of queues. The method further includes monitoring a dynamic value profile for each of the plurality of queues. The dynamic value profile for a queue is calculated based on one or more financial attributes of the current calls in the queue. The method includes determining that the dynamic value profile for a first queue is greater than the dynamic value profile for a second queue. In addition, the method comprises reallocating one or more of the plurality of agents, among the plurality of queues in response to determining that the dynamic value profile for the first queue is greater than the dynamic value profile for the second queue. | 09-18-2008 |
20080232248 | MULTIMODAL MULTILEVEL PRECEDENCE AND PREEMPTION - A device comprising a network resource controller to preempt at least one multiple-user session over a primary modality of communication according to a precedence-level associated with users of the multiple-user session and to switch the multiple-user session to an alternate modality of communication without disconnection of the multiple-user session, | 09-25-2008 |
20080240004 | CONTROLLING A JITTER BUFFER - A method and a network device for controlling a jitter buffer are disclosed. The method comprises providing a jitter buffer to counter the effect of jitter in a communication channel and comprises determining a duplex mode of the communication channel. The method further comprises adjusting parameters of the jitter buffer in response to determination of the duplex mode, half-duplex mode and full-duplex mode respectively having respective sets of parameters associated therewith. A network device comprises a jitter buffer to counter the effect of jitter in a communication channel and a controller operable to determine a duplex mode of the communication channel and to adjust parameters of the jitter buffer in response to determination of the duplex mode, half-duplex mode and full-duplex mode having respective sets of parameters associated therewith. | 10-02-2008 |
20080242247 | RESOLVING POTENTIAL CONFLICTS IN INTEROPERABILITY COMMUNICATIONS - A communication device and computerized method to address conflicts in Virtual Talk Groups is provided. The method may comprise accessing a database to monitor resources in a plurality of Virtual Talk Groups (VTG) to detect if there is at least a potential conflict of the resources. When the potential conflict is detected, the method comprises identifying at least one resource which is contributing to the potential conflict, and initiating automatically an electronic communication to identify the potential conflict. In response to the electronic communication, a new VTG may be initiated and terminals of administrators associated with the conflicting resource may be assigned to the new VTG. Each administrator may administer an associated VTG. | 10-02-2008 |
20080280637 | Method and System for Handling Dynamic Incidents - A method for handling dynamic incidents includes initiating a first policy in response to a first incident. The first policy comprises a plurality of actions to be performed in response to the first incident. The method also includes creating at least one virtual talk group comprising a plurality of endpoints of different communication networks communicating using a respective communication protocol. The method further includes monitoring a plurality of events via a plurality of sources. At least one source comprises an endpoint from the plurality of endpoints of the virtual talk group. The method additionally includes detecting a deviation event and storing information indicative of the deviation event. | 11-13-2008 |
20080299940 | INTEROPERABILITY AND COLLABORATION SYSTEM WITH EMERGENCY INTERCEPTION MONITORING - Methods and apparatus for automatically connecting an emergency caller with appropriate responders within an interoperability and collaboration system. According to one aspect of the present invention, a method includes obtaining a request for a response, and identifying a first location from which the request originated. The request is obtained from a source that utilizes a phone and is located at the first location. The method also includes identifying at least one potential responder that may be capable or appropriate for providing the response. Finally, the method also includes creating a virtual talk group that includes the source and the potential responder. The potential responder may listen substantially directly to communications from the source within the virtual talk group using a land mobile radio. | 12-04-2008 |
20080310398 | CALL PRIORITY BASED ON AUDIO STREAM ANALYSIS - A method and system of prioritizing calls based on audio stream analysis includes receiving a plurality of calls, wherein each call comprises an audio stream. The audio stream associated with one of the calls is analyzed for pre-determined audio characteristics. The call is processed based on the audio characteristics of the call. A system for prioritizing calls includes a multipoint control unit for receiving calls. An audio stream capture system captures an audio stream from the calls. The audio stream is analyzed by the capture system according to one or more selected criteria and an urgency priority ranking is determined for each call. The calls are ranked in a queue database according to urgency priority. A controller manages the audio stream capture system, the audio analyzer and queue database computer system. | 12-18-2008 |
20080313711 | MANAGING STATUS AND ACCESS FOR A VARIABLE SOURCE CONTENT STREAM - In one embodiment, a method can include: receiving rules in an interoperability server, the rules being related to access control for an endpoint coupled to a variable source content stream via a multicast network; and sending to the endpoint using in-band controls of the variable source content stream via the multicast network: a description of content streams available for selection by the endpoint; a procedure for selecting an available content stream; and permission for accessing the selected content stream, the permission being based on the rules. | 12-18-2008 |
20090003578 | ENHANCING CONTACT CENTER INTERACTIONS FOR PEOPLE HAVING IMPAIRED SENSES - A method and apparatus is provided for emulating an impairment of a person. The method comprises determining a type of sensory impairment of a person communicating with an agent endpoint device and applying a configuration filter corresponding to the determined type of sensory impairment to output at the agent endpoint device to emulate the sensory impairment of the person. Determining the type of sensory impairment may comprise determining a hearing impairment of the person or a type of color-blindness of the person. | 01-01-2009 |
20090005073 | Method and System for Using Signal Quality Information - A method includes receiving destination information comprising a desired destination and receiving regional signal quality information comprising signal quality information associated with one or more regions of an area. The method also includes determining a first route to the desired destination based on the regional signal quality information. | 01-01-2009 |
20090005097 | Method and System for Automatically Identifying Wireless Signal Quality of a Region - A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals received by each of a plurality of mobile endpoints and receiving location information identifying locations of each of the plurality of mobile endpoints. The method also includes, based on the received signal quality information and the received location information, identifying a first region of an area, the first region having a first signal quality. | 01-01-2009 |
20090009588 | Recognition of human gestures by a mobile phone - In one embodiment, a method includes electronically detecting a gesture of a user listening to a speaker via a communication device, and generating an audible and/or visual response that corresponds to the gesture. The audible and/or visual response is then communicated to the speaker. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. | 01-08-2009 |
20090024389 | Text oriented, user-friendly editing of a voicemail message - A system in one embodiment includes a server associated with a unified messaging system (UMS). The server records speech of a user as an audio data file, translates the audio data file into a text data file, and maps each word within the text data file to a corresponding segment of audio data in the audio data file. A graphical user interface (GUI) of a message editor running on an endpoint associated with the user displays the text data file on the endpoint and allows the user to identify a portion of the text data file for replacement. The server being further operable to record new speech of the user as new audio data and to replace one or more segments of the audio data file corresponding to the portion of the text with the new audio data. | 01-22-2009 |
20090028520 | DIGITAL VIDEO RECORDER COLLABORATION AND SIMILAR MEDIA SEGMENT DETERMINATION - In one embodiment, a method for performing actions with media information using a digital video recorder is provided. In one embodiment, a user may mark a media segment in media using a digital video recorder. Characteristics for the media segment are then determined. A second media segment in second media may then be determined. For example, the second media segment may have similar characteristics to the first media segment. In one example, an advertisement that is similar to the advertisement marked as the first media segment may be determined. An action may then be performed with the second media segment. For example, the second media segment may be removed from the second media. | 01-29-2009 |
20090030693 | AUTOMATED NEAR-END DISTORTION DETECTION FOR VOICE COMMUNICATION SYSTEMS - In one embodiment, a method for providing voice quality assurance is provided. The method determines voice information for an end point in a voice communication system. The voice information may be from an ingress microphone. The method determines if the voice quality is considered degraded based on an analysis of the voice information. For example, the voice information may indicate that it is distorted, too loud, too soft, is subject to an external noise, etc. Feedback information is determined if the voice quality is considered degraded where the feedback information designed to improve voice quality at an ingress point for a user speaking. The feedback information is then outputted at the end point to the user using the end point. | 01-29-2009 |
20090043502 | System and Method for Navigating Using Multiple Modalities - A system for navigating includes an interface operable to receive position information of a first modality. The position information of the first modality is associated with a navigation unit. The interface is further operable to receive position information of a second modality. The position information of the second modality is associated with the navigation unit. The system also includes a processor coupled to the interface and operable to identify a destination. The system is further operable to navigate to the destination based on the position information of the first and second modalities by switching between the first modality and the second modality. | 02-12-2009 |
20090052339 | COMMUNICATION SYSTEM WITH STATE DEPENDENT PARAMETERS - In one embodiment, an apparatus can include: a status detector configured to determine a status associated with an input stream; a parameter controller configured to adjust a parameter in response to a change in the status; and a rendering controller configured to receive the input stream, and to provide a rendered stream in response to the input stream and the parameter. | 02-26-2009 |
20090054010 | FLOOR CONTROL OVER HIGH LATENCY NETWORKS IN AN INTEROPERABILITY AND COLLABORATION SYSTEM - Methods and apparatus for assigning floor control based upon when a floor control request was initiated are disclosed. In one embodiment, a method includes receiving a first request for floor control from a first endpoint and granting the floor control to the first endpoint. The method also includes receiving a second request for floor control from a second endpoint, that has approximately the same priority level as the first endpoint, and determining if the first request was initiated from the first endpoint at approximately the same time or earlier than the second request was initiated from the second endpoint. If it is determined that the first request was not initiated from the first endpoint at approximately the same time or earlier than the second request was initiated from the second endpoint, then floor control is preempted from the first endpoint and granted to the second endpoint. | 02-26-2009 |
20090074012 | BUFFERING A MEDIA STREAM - An apparatus and method of buffering a media stream is provided. The method may comprise receiving a plurality of IP packets of the media stream, each packet providing a fragment of a portion of the media stream. Thereafter, the portion of media stream may be buffered in a jitter buffer using the fragments provided by the received packets. Further, the portion of the media stream may be buffered in a replay buffer using the fragments provided by the received packets. The replay buffer may be larger than the jitter buffer and a first received fragment and a second received fragment may be combined. The second received fragment may have been discarded by the jitter buffer. A media stream may then be played back using media from the replay and/or jitter buffer. | 03-19-2009 |
20090086933 | CALL ROUTING USING VOICE SIGNATURE AND HEARING CHARACTERISTICS - In an example embodiment, a system that appropriately routes calls to an agent at a contact center based on the agent's voice and/or hearing characteristics. The agent is selected by matching speech and hearing characteristics of a caller with the speech and hearing characteristics of an agent. In order to find the best match for the caller, the contact center determines if the caller is hearing impaired, and if so determines a suitable frequency range for the caller. If a match cannot be found, the agent's and/or caller's voice may be shifted in real time and adjusted to a frequency range that is best suited for the caller. | 04-02-2009 |
20090086943 | Identification of multiple persons on a phone call - A method in one embodiment includes receiving input identifying a plurality of callers within a listening or speaking range of a phone device being used to place a call. The input is then sent over a packet-based network to a server that authenticates and authorizes each of the callers to the call. Following authentication and authorization by the server, a name or caller ID of each of the callers is sent to a destination endpoint device of the call. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. | 04-02-2009 |
20090097677 | Enhancing Comprehension Of Phone Conversation While In A Noisy Environment - In one embodiment, one or more users may be participating in a conversation. In one example, a first user may be speaking into a speaker end device and a second user may be listening at a listener end device. The second user may be in an environment where noise may be present. Particular embodiments determine characteristics of the noise at the listener end device. Characteristics of a voice signature for a user speaking with the speaker end device are also determined. Comprehension enhancement of voice signals received from speaker end device is then performed based on characteristics of the noise at the listener end device and characteristics of the voice signature. For example, the signature of the voice signals may be altered to lessen the overlap with the noise. | 04-16-2009 |
20090100468 | FACILITATING REAL-TIME TRIGGERS IN ASSOCIATION WITH MEDIA STREAMS - In one embodiment, a Media Analysis and Delivery System obtains a set of media delivery rules, wherein the set of media delivery rules includes one or more triggers, each of the triggers identifying a topic of interest. The Media Analysis and Delivery System examines a media stream for at least one of the one or more triggers in accordance with the set of media delivery rules. The Media Analysis and Delivery System provides at least a portion of the media stream in response to at least one of the triggers in accordance with at least one of the set of media delivery rules. | 04-16-2009 |
20090111431 | Functionality Distribution for a Mobile Endpoint - In an embodiment, a method includes identifying a first component device of a plurality of component devices in a communication network and determining that the first component device is operable to perform a first function of a plurality of functions associated with a mobile endpoint. The method also includes distributing the first function from the mobile endpoint to the first component device in response to determining that the first component device is operable to perform a first function of the plurality of functions associated with the mobile endpoint. | 04-30-2009 |
20090111456 | Mesh Communication Network and Devices - A method for communicating in a wireless communication network includes establishing a first direct communication link with a base transceiver station and communicating data associated with a communication session over the first direct communication link. The method also includes establishing a mesh connection to the base transceiver station. The mesh connection includes at least one mesh communication link with at least one intermediate communication device of a plurality of communication devices in the wireless network, the at least one intermediate communication device communicating with the base transceiver station over a second direct communication link with the base transceiver station. The method further includes switching between communicating data associated with the communication session over the first direct communication link and communicating data associated with the communication session over the mesh connection. | 04-30-2009 |
20090115835 | Visually Enhancing a Conference - A method for visually enhancing a conference includes receiving a first request to enhance a first object. The method also includes establishing a visual conference between at least a local participant and a remote participant. The method additionally includes receiving a visual communication and detecting a reference to the first object in the visual communication. The method further includes, upon detecting the reference to the first object in the visual communication, enhancing for presentation the first object in the visual communication based on the first request. | 05-07-2009 |
20090119115 | Customizing A Target Using An Endpoint - In one embodiment, customizing a target using an endpoint includes receiving customization parameters through a wireless link, where a customization parameter designating a setting for a feature of a target. The customization parameters are stored at the endpoint. A customization request comprising the customization parameters is generated. The customization request is sent to a customizer of the target to customize the target. | 05-07-2009 |
20090125948 | Communication Processing Based on Television Use - In one embodiment, a method includes receiving a first user profile comprising at least one rule associated with at least one show. The at least one rule is activated upon the occurrence of a first event. The method also includes detecting the occurrence of the first event. Upon detecting the occurrence of the first event, the method further includes activating the at least one rule and processing a first communication based on the at least one rule. | 05-14-2009 |
20090128285 | Providing An Endpoint Access To A Locked Target - In one embodiment, providing an endpoint access to a locked target includes receiving a virtual key at a grantee endpoint through a wireless link. The virtual key results from a permission from a grantor endpoint, and is operable to unlock a physical lock of the target. The virtual key is wirelessly transmitted to a management system of the target to unlock the lock. | 05-21-2009 |
20090131085 | Supporting Communication Among Endpoints In A Geographical Area - In one embodiment, a method includes receiving a request message from a requesting endpoint, where the request message requests a communication session corresponding to an area. An area-based group comprising one or more endpoints associated with the area is identified. The area-based group allows the endpoints to communicate with each other in the communication session. The requesting endpoint is added to the area-based group to allow the requesting endpoint to communicate with the one or more endpoints in the communication session. | 05-21-2009 |
20090146779 | Home entertainment system providing presence and mobility via remote control authentication - An apparatus in one embodiment is operable to receive, from a remote control device associated with a video display device, biometric input of a user. Responsive to a match of the biometric input with stored biometric data of the user, the user is authenticated. The remote control device and/or the video display device are then configured based on user settings associated with the stored biometric data of the user. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. | 06-11-2009 |
20090157842 | System and Method for Using an Aggregation Server with Client Devices - In one embodiment, a system includes one or more client devices and a server. The client devices store media files and communicate selection information to the server. The server receives the selection information from the one or more client devices, selects media files for a playlist using the selection information, and generates a playlist of the selected media files. | 06-18-2009 |
20090158382 | System and Method for Using Mobile Media Players in a Peer-to-Peer Network - In one embodiment, a system comprises a first mobile media player and a second mobile media player. The first mobile media player stores first media files, and the second mobile media player stores second media files. The first mobile media player and second mobile media player communicate with one another in a peer-to-peer network to generate a playlist and to play media files from the playlist. | 06-18-2009 |
20090175193 | COMMUNICATION PARADIGM SWITCHING BASED ON LINK QUALITY INFORMATION - In an example embodiment, a method is provided that accesses a list of communication preferences. The list identifies a communication paradigm and a different communication paradigm. Link quality information associated with the communication paradigm also is accessed. Based on the link quality information, communication may be switched from the communication paradigm to the different communication paradigm. | 07-09-2009 |
20090179752 | MOBILE DEVICE SAFETY - In an example embodiment, an automatic warning system that warns users of personal mobile devices (such as cellular telephones and portable music players) when they enter or are near the threshold of a hazardous area while using their mobile device. In an example embodiment, the mobile device is automatically paused upon entering a street and resumes when the user has crossed the street. In a cellular telephone embodiment, calls are automatically put on hold upon entering the hazardous area, optionally the other parties to the call are informed of the reason for the hold, and the call is automatically resumed when all parties have left the hazardous area. | 07-16-2009 |
20090184843 | Traffic Flow Based Displays - A method includes determining a first flow characteristic of a flow, the flow comprising at least one targeted user. The method also includes generating for display a first message based on the first flow characteristic of the flow. | 07-23-2009 |
20090203394 | Location Based Handoff - A method includes determining a coverage area for each of a plurality of base stations. The method also includes receiving a first location parameter indicative of a mobile unit's location. The method further includes transitioning a first connection between the mobile unit and a first base station of the plurality of base stations to a second connection between the mobile unit and a second base station of the plurality of base stations. The transition is based on the coverage areas of the first base station and the second base station and the first location parameter. | 08-13-2009 |
20090204320 | Traffic Predictive Directions - A method includes receiving a request to determine a route between a starting location and a destination location. The method also includes determining a first route between the starting location and the destination location using predictive traffic data for at least one location between the starting location and the destination location. The method further includes providing the first route. | 08-13-2009 |
20090210496 | SYSTEM AND METHOD FOR LEAVING AND RETRIEVING ELECTRONIC MESSAGE NOTES - Methods and apparatus for allowing a message to be left for an expected user of a network application are disclosed. According to one embodiment, a method includes determining when a first user has requested access to a first application, and determining if there is a message for the first user when it is determined that the first user has requested access to the first application. The method also includes informing the first user of the message if it is determined that there is the message for the first user, as well as providing the first user with access to the first application after informing the first user of the message and after the first user acknowledges that the first user has been informed of the message. | 08-20-2009 |
20090216835 | GROUP MUTE - In an example embodiment, a technique that allows members of a group at multiple locations to have private conversations within members of the group while participating in a conference call. Group members are defined and divided into virtual conference rooms. When a group mute is requested, signals originating from members of the group are distributed to locations where group members are present, while all participants of the conference call, including the members of the muted group, receive un-muted media signals. | 08-27-2009 |
20090220066 | SYSTEM AND METHOD FOR SEAMLESS TRANSITION OF A CONFERENCE CALL PARTICIPANT BETWEEN ENDPOINTS - In one embodiment, a method includes maintaining a first connection with respect to a conference call on a first endpoint associated with a user. The method also includes determining if the user has requested a second connection with respect to the conference call, and establishing the second connection with respect to the conference call if the user has requested the second connection. Finally, the method includes replacing the first connection with the second connection with respect to the conference call if the user has requested the second connection. Replacing the first connection with the second connection includes establishing the second connection with respect to the conference call through a second endpoint associated with the user. The second connection is established transparently with respect to the conference call, and replaces the first connection transparently. | 09-03-2009 |
20090232114 | PRIORITY-BASED MULTIMEDIA STREAM TRANSMISSIONS - A method is provided that accesses a priority and a multimedia stream to be transmitted. The priority then is embedded within the multimedia stream. The multimedia stream thereafter is transmitted. Another method is provided that receives the multimedia stream that includes the priority. Here, another priority is accessed and both priorities are compared. The control of multimedia stream transmissions to other communication devices is based on this comparison. | 09-17-2009 |
20090274283 | ENHANCED DIRECTORY FOR COMMUNICATIONS DEVICES - In one embodiment, a method includes establishing a call, and continuously monitoring the call from or using a first endpoint associated with the call. Monitoring the call includes identifying when an information element associated with the call has changed. The method also includes determining when the information associated with the call has changed, and storing a representation of the information element in an enhanced directory arrangement associated with the first endpoint when the information associated with the call has changed. | 11-05-2009 |
20090285220 | STREAM REGULATION IN A PEER TO PEER NETWORK - Techniques for regulating streams in a Peer-to-Peer (P2P) network are provided. By establishing a priority of a stream, certain users may have some level of assurance that their stream will be received by other peers. The priority may be established based on a variety of parameters including, for example, an identification of the user, a communications channel used for a multicast session, and/or a role of the user. | 11-19-2009 |
20090288162 | SYSTEM AND METHOD FOR DEFENDING AGAINST DENIAL OF SERVICE ATTACKS ON VIRTUAL TALK GROUPS - In one embodiment, a method includes establishing a first virtual talk group (VTG) that includes a plurality of endpoints and has a first multicast address. The plurality of endpoints includes a first endpoint and a second endpoint. The method also includes monitoring traffic associated with the first VTG, determining when a denial of service (DOS) attack is indicated by the traffic, and identifying at least one rogue endpoint responsible for the DOS attack when it is determined that the DOS attack is indicated. The first endpoint and the second endpoint are notified that they are to participate in a dynamic switchover to a second VTG when a DOS attack is indicated. The second VTG is established using a second multicast address, and includes the first endpoint and the second endpoint, but not the rogue endpoint. | 11-19-2009 |
20090298525 | INTEROPERABILITY AND COMMUNICATIONS SYSTEM DYNAMIC MEDIA PROXY BASED ON CAPABILITY NEGOTIATION - A system and methodology to facilitate communication between non-compatible communication devices by utilization of a dynamic media proxy is provided. Information associated with an endpoint, such as, media capabilities, identity and system resource information is collected. Media proxy'ing is performed as part of capability negotiation. A dynamic media proxy is employed based on an analysis of the collected information. An analysis component can identify an endpoint that does not adhere to specific rules of transmission and can dynamically connect such an endpoint to a VTG (virtual talk group) via a proxy to prevent the endpoint from transmitting media into an active VTG that already has multiple talkers streaming media. Additionally, the location where media processing can occur can be dynamically determined based on the available system resources. | 12-03-2009 |
20100013905 | FLOOR CONTROL IN MULTI-POINT CONFERENCE SYSTEMS - In one embodiment, a conference with multiple end points is provided. At the locations, multiple screens may be configured to display video from a portion of the multiple end points. Video from multiple locations is output onto the multiple screens, such as video streams from N different segments are output on N different screens. The video output may be determined based on a first dimension of the floor control algorithm. A push-to-talk input may then be received from a button. A video segment associated with the push-to-talk button is then determined and the video segment is output on one of the multiple screens in response to receiving the push-to-talk input. The push-to-talk input may be used by users that cannot actively participate in the first dimension of the floor control algorithm. For example, users using sign language cannot speak louder and thus by using the push to talk button or hand gestures can indicate their desire to be switched in as one of the displayed segments. | 01-21-2010 |
20100014653 | METHOD AND APPARATUS FOR SCHEDULING CALLBACKS VIA OFFLINE OFFER TASKS TO KNOWLEDGE WORKERS - In one embodiment, a method includes a request that is obtained by a call center system from a customer. The method also includes identifying a first set of experts that includes at least a first expert suitable for, or capable of, processing the request. The first expert is offline with respect to the call center system. An offer task is created and provided to the first set of experts. The offer task identifies the request and initiates the scheduling of a callback to address the request. | 01-21-2010 |
20100033580 | ACCESS TO VIDEO STREAMS ON MOBILE COMMUNICATION DEVICES - A method and apparatus to provide access to video streams associated with communication channels in a communication network are described. The method may comprise monitoring selection of a communication channel by a user of a mobile communication device, identifying at least one video feed associated with the selected channel, and providing access to the mobile communication device to the selected at least one video feed. Providing access may comprise associating the selected video stream with the mobile communication device. | 02-11-2010 |
20100034201 | METHOD AND APPARATUS FOR UNICAST AND MULTICAST MEDIA PROCESSING - A method and apparatus for unicast and multicast media processing is provided. The method may comprise receiving multicast packets communicating a plurality of media streams from a plurality of communication endpoints. Each communication endpoint may have an associated individual media stream. The method inspects the multicast packets to identify each individual media stream with which the packet is associated and individually processes each individual media stream. At least one individual media stream is unicast from its associated buffer to a unicast communication endpoint of the plurality of communication endpoints. In an example embodiment, the method may identify media capabilities of the unicast communication endpoint. The plurality of media streams may form part of a virtual talk group (VTG) in an audio conference. | 02-11-2010 |
20100056194 | IDENTIFYING CHANNELS IN A COMMUNICATION NETWORK - A method and apparatus to identify channels in a communications network are described. The method may comprise receiving communications on a plurality of communication channels including at least a first communication channel and a second communication channel. The method identifies when a channel change occurs from the first communication channel to the second communication channel. An audio identifier associated with the second communication channel is then included in an audio stream communicated via the second communication channel. | 03-04-2010 |
20100056196 | SYSTEM AND METHOD FOR PROVIDING PRESENCE BASED TRUNKING IN A NETWORK ENVIRONMENT - A method is provided in one example implementation and the method includes interacting, via a first communication resource manager located in a first domain, with a second communication resource manager located in a second domain. The method further includes determining whether to establish a link for multicasting between users in the first domain and users in the second domain, and the link between the domains is established based on presence data of at least one user in the first domain and at least one user in the second domain. | 03-04-2010 |
20100114389 | DISTRIBUTING POWER TO NETWORKED DEVICES - A method and an apparatus to distribute power to a networked apparatus are provided. The apparatus may comprise a communication module to receive sensor data via a communication network connected to a plurality of sensors operatively located within a building. The plurality of sensors may be to provide sensor data identifying a presence of one or more persons in the building. The apparatus includes a policy engine including a plurality of rules, each rule associated with at least one powered device located within the building. A power control module is configured to adjust power supplied to the at least one powered device based on the rule. Power to the powered devices may be provided over a power over Ethernet network. | 05-06-2010 |
20100132010 | IMPLEMENTING POLICIES IN RESPONSE TO PHYSICAL SITUATIONS - A method and apparatus is described to implement policies associated with physical situations (e.g., supply of power, occurrence of a fire, etc.). The method may comprise accessing sensor data captured by a sensor monitoring a physical situation to identify at least one activity occurring during the physical situation. A policy database including a plurality of policies may be accessed to identify at least two lower-level policies associated with the physical situation. Further, the policy database may be accessed to identify at least one higher-level policy associated with the physical situation. The higher-level policy may control implementation of the at least two lower-level policies. | 05-27-2010 |
20100135481 | ECHO MITIGATION IN A CONFERENCE CALL - In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a conference endpoint and as a result, an echo associated with the transmittal of the test audio signal is received. One or more parameters of the echo are then identified and an echo mitigation process is selected from multiple echo mitigation processes based on the identified parameters. The selected echo mitigation process is then applied. | 06-03-2010 |
20100159975 | System and Method for Providing a Trunked Radio and Gateway - A method is provided in one example and includes receiving a first channel release notification from a communication network at a trunked radio network gateway connecting one or more trunked radio networks to the communication network. The method also includes determining whether the first channel release notification was generated in response to an initial seizure or a release of a channel in a trunked radio network of the gateway. The method further includes suppressing transmission of a further channel release notification based on data included in the first channel release notification that indicates an origin of the channel seizure or the release causing the first channel release notification to be generated. In more specific embodiments, the data includes parameter values indicating an originating source for the seizure or the release and a responding source generating the channel release notification. | 06-24-2010 |
20100159977 | System and Method for Providing Channel Configurations in a Communications Environment - A method is provided in one example embodiment and includes monitoring a plurality of channels provisioned for an endpoint. The method also includes reacting to an alert message by adjusting one of the channels for the endpoint. The adjustment is a selected one of increasing a volume associated with the channel receiving the alert message, or changing a spatial direction from which the alert message and an associated media stream are conveyed to the endpoint. In other embodiments, the adjustment provisions the alert message from a left ear to a right ear of an end user of the endpoint. In still other embodiments, the adjustment includes determining which is a primary channel of the channels and provisioning the alert message to the primary channel of the endpoint. The media stream associated with the alert message is also moved to a same spatial direction along with the alert message. | 06-24-2010 |
20100161727 | System and Method for Accelerating a Wide Area Notification - A method is provided that includes evaluating a message to be communicated to one or more persons and evaluating social network data that is indicative of a social network of the persons. The social network of the persons is used as a basis for communicating the message to one or more persons in the social network. In other embodiments, a selected one of the persons in the social network responds to receiving the message by sending the message to other persons in another social network to which the selected person belongs. In still other embodiments, the social network can be restricted to persons associated with a geographical area and the geographical area can be associated with a location from which the message originates. In yet other embodiments, communicating the message comprises making a telephone call or communicating the message comprises out-of-band signaling. | 06-24-2010 |
20100197333 | Method and System for Communicating Media Based on Location of Media Source - A method for communicating media based on location of media source includes receiving communications from a plurality of endpoints. Each communication comprises a media message and location information identifying a location of its transmitting endpoint. The method includes receiving a selection of a geographical area and comparing the location information of each communication with the selected geographical area. The method also includes presenting to a user each message received from each endpoint of the plurality of endpoints located within the selected geographical area. | 08-05-2010 |
20100211680 | APPARATUS AND METHOD TO ALLOCATE LIMITED RESOURCES - A computerized method and apparatus to allocate a shared resource are described. The method may comprise accessing sensor data corresponding to an availability of the shared resource, and identifying when the availability of the shared resource reaches a threshold level below which the activities compete for the shared resource. Thereafter, when the activities compete for the shared resource, the method may allocate at least a portion of the shared resource to the activity associated with an active policy having a higher priority. | 08-19-2010 |
20100225732 | SYSTEM AND METHOD FOR PROVIDING THREE DIMENSIONAL VIDEO CONFERENCING IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes receiving data indicative of a personal position of an end user. A media stream is selected from a plurality of media streams to be transmitted to the end user based on the personal position. The selected media stream includes image data of an object captured by a camera and the image data is used to construct a three-dimensional rendering of the object. In more specific embodiments, the media stream selection is executed by a server configured to be coupled to a network. The camera can be part of a plurality of cameras that capture image data associated with the object and that transmit respective media streams over a network. Once a camera begins transmitting image data over the network and to the end user, other cameras from the plurality of cameras stop transmitting their respective media streams over the network. | 09-09-2010 |
20100225735 | SYSTEM AND METHOD FOR PROVIDING THREE DIMENSIONAL IMAGING IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes receiving data indicative of a personal position of an end user and receiving image data associated with an object. The image data can be captured by a first camera at a first angle and a second camera at a second angle. The method also includes synthesizing the image data in order to deliver a three-dimensional rendering of the object at a selected angle, which is based on the data indicative of the personal position of the end user. In more specific embodiments, the synthesizing is executed by a server configured to be coupled to a network. Video analytics can be used to determine the personal position of the end user. In other embodiments, the method includes determining an approximate time interval for the synthesizing of the image data and then delaying audio data based on the time interval. | 09-09-2010 |
20100231160 | SYSTEM FOR ASSOCIATING RENEWABLE ENERGY SOURCES AND CONSUMERS - In one embodiment, a system comprises: a renewable energy generator; a renewable energy availability server connected to the renewable energy generator, wherein the renewable energy server is connected to an electric grid and a network, the renewable energy availability server is configured to transmit a right to recharge certificate; a rechargeable device containing a recharge controller, wherein the recharge controller is connected to the electrical grid, the recharge controller configured to receive upon request the right to recharge certificate; and the recharge controller being further capable of enabling charging of the rechargeable device based on the right to recharge certificate. | 09-16-2010 |
20100274402 | SYSTEM FOR UTILIZING PREDICTIVE ENERGY CONSUMPTION - In one embodiment, a method includes identifying a first time that is associated with a first demand amount for a resource. The method also includes providing the resource to a device such that the device changes an area temperature from a first temperature to approximately a second temperature that is reached at approximately the first time. The resource is withheld from the device when the second temperature is approximately reached at approximately the first time. | 10-28-2010 |
20100283829 | SYSTEM AND METHOD FOR TRANSLATING COMMUNICATIONS BETWEEN PARTICIPANTS IN A CONFERENCING ENVIRONMENT - A method is provided in one example embodiment and includes receiving audio data from a video conference and translating the audio data from a first language to a second language, wherein the translated audio data is played out during the video conference. The method also includes suppressing additional audio data until the translated audio data has been played out during the video conference. In more specific embodiments, the video conference includes at least a first end user, a second end user, and a third end user. In other embodiments, the method may include notifying the first and third end users of the translating of the audio data. The notifying can include generating an icon for a display being seen by the first and third end users, or using a light signal on a respective end user device configured to receive audio data from the first and third end users. | 11-11-2010 |
20100284310 | SYSTEM FOR PROVIDING AUDIO HIGHLIGHTING OF CONFERENCE PARTICIPANT PLAYOUT - In one embodiment, a method includes obtaining a first packet associated with a conference that has a first participant associated therewith. The first participant is identified as a principal participant. The method also includes determining if the first packet is associated with the first participant, and providing an audible indication that the first packet is associated with the first participant if it is determined that the first packet is associated with the first participant. | 11-11-2010 |
20100306122 | System and Method for Providing an Electronic Literature Club in a Network Environment - A method is provided in one example embodiment and includes receiving progress data associated with an end user reading an electronic piece of literature and receiving a request from the end user to interact with an additional end user about the electronic piece of literature. The method can further include identifying the additional end user who is also reading the electronic piece of literature in order to form a reading group associated with the electronic piece of literature. In more specific embodiments, the identifying further includes identifying progress data for the additional end user such that the reading group is formed of the end users who are at a similar location in the electronic piece of literature. | 12-02-2010 |
20110010657 | INTERACTIVE TEXT COMMUNICATION SYSTEM - A communication system quarantines text and then automatically transmits the text across a network at the end of a quarantine time period. This text quarantine period gives a user the chance to edit or delete text for a brief amount of time after the text has been entered. This allows editing or deletion of spelling errors, and inadvertent or indiscriminate text responses before the text is sent to a remote user. Since the text characters are automatically transmitted after the quarantine period, normal human communications and interactions are maintained allowing a receiver to interject or interrupt with text comments in the middle of a received text message. Thus, the communication system maintains the interactive advantages of TTY/TDD systems while also providing the editing flexibility of instant messaging systems. In another aspect of the text system, characters are buffered until they form a complete expression. Upon detection of the completed expression, the buffered characters are sent to the destination endpoint. | 01-13-2011 |
20110026500 | LOW LATENCY MESH NETWORK - In an example embodiment, there is disclosed herein an apparatus comprising a wireless transceiver and packet processing logic coupled to the wireless transceiver. The packet processing logic is responsive to receiving a packet from a first node on a first path addressed to a node on a second path via the wireless transceiver to forward the packet on the second path towards the node on the second path via the wireless transceiver. The packet processing logic is further configured to send a reply to the packet to the first node on the first path via the wireless transceiver to a second node on the first path that is within range of the wireless receiver and on the second path to the first node on the first path responsive to determining the wireless transceiver cannot send a message directly the first upstream node. | 02-03-2011 |
20110029615 | CONTROLLING THE DISTRIBUTION OF MESSAGES - In an example embodiment, described herein is an apparatus that comprises a user interface, a communication interface, and logic coupled to the user interface and communication interface. The logic is configured to receiving a request via the user interface to forward a message to a recipient to determine whether distribution of the message is restricted to a group. The logic is further configured to determine whether the recipient is a member of the group responsive to determining distribution of the message restricted to a group. The logic is configured to send the message to the recipient via the communication interface responsive to determining the recipient is a member of the group. | 02-03-2011 |
20110075883 | Method and System for Recording Automatic Call Distributor Calls - A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file. | 03-31-2011 |
20110106337 | AD-HOC MOBILE IP NETWORK FOR INTELLIGENT TRANSPORTATION SYSTEM - A method for intelligently managing a transportation network is provided. The method may include providing a roadside apparatus | 05-05-2011 |
20110195680 | METHOD AND SYSTEM FOR AUTOMATICALLY IDENTIFYING WIRELESS SIGNAL QUALITY OF A REGION - A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals received by each of a plurality of mobile endpoints and receiving location information identifying locations of each of the plurality of mobile endpoints. The method also includes, based on the received signal quality information and the received location information, identifying a first region of an area, the first region having a first signal quality. | 08-11-2011 |
20110204717 | SYSTEM AND METHOD FOR PROVIDING COLLABORATING POWER CONTROLLERS - A method is provided in one example embodiment and includes receiving a message associated with a detection of reactive power in an energy system and inducing a first quantity of reactive power at a power level specified in the message. The first quantity of reactive power is induced in order to mitigate a second quantity of reactive power that is detected on a specific segment of the energy system. The first quantity of reactive power is induced at a local level on which a source associated with the second quantity of reactive power operates. In more specific embodiments, the message is sent in response to a sensor detecting the second quantity of reactive power, where the first quantity and the second quantity of reactive power are the same. In other embodiments, the method can include receiving a second message to stop mitigating the first quantity of reactive power. | 08-25-2011 |
20110208807 | SYSTEM AND METHOD FOR PROVIDING A TWO-TIERED VIRTUAL COMMUNICATIONS ARCHITECTURE IN A NETWORK ENVIRONMENT - An example method is provided and includes receiving information indicative of a marking on an electronic display. Data related to the marking is communicated to a first memory element and to a second memory element. The data is used to render a local image on the electronic display, and the local image being removed over a configured time period. The method further includes receiving additional data to be used to replace the local image on the electronic display. The additional data is received via the second memory element, and the additional data is generated when at least a portion of the local image has been changed. The local image can have an associated time to live parameter for removing the local image, which is configured to be longer than a delay for data propagation between the electronic display and a collaboration server that includes the second memory element. | 08-25-2011 |
20110225238 | SYSTEM AND METHOD FOR PROVIDING DATA CHANNEL MANAGEMENT IN A NETWORK ENVIRONMENT - An example method can include establishing a session involving a first end user, the first end user is included in a virtual talk group, which includes at least one other end user. A media source is provided for the session. The method also includes initiating a request for a second end user to join the session, the second end user is added to the virtual talk group. A mobile device being used by the first end user controls which data from the media source is to be sent to the second user during the session. An internet protocol (IP) address associated with the media source is withheld from communications sent to the second user. In more detailed embodiments, a control channel can be established between the mobile device and a server, the control channel managing data being sent to end users in the virtual talk group. | 09-15-2011 |
20110249671 | System and Method for Computer Originated Audio File Transmission - A system and method for computer originated audio file transmission includes a server having a communications module operable to communicate with a terminal unit. The server may also include a storage module operable to store at least one file. A processor may be provided to separate the file into a plurality of packets. In accordance with one embodiment of the present invention, the communications module is operable to send an initial burst of packets to the terminal unit, wherein the initial burst of packets includes at least two of the plurality of packets. In accordance with another embodiment of the present invention, the communications module is further operable to send additional packets of the plurality of packets at a predetermined rate, until each of the plurality of packets has been sent to the terminal unit. | 10-13-2011 |
20110293079 | Techniques for Marking and Manipulating Voice Message Segments Through a Telephone User Interface - In one embodiment, techniques for manipulating a voice message using a telephone user interface are provided. The telephone user interface receives a mark begin segment command from a telephonic device through a voice modality. The mark begin segment command indicates a beginning point for a voice message segment in the voice message. The telephone user interface then receives a mark end segment command from the telephonic device through the voice modality. The mark segment command indicates an ending point for the voice message segment in the voice message. An action command from the telephonic device is received and an action based on the action command for the voice message segment is performed. The voice message segment is a portion of the voice message determined based on the indicated beginning point of the voice message segment and the indicated ending point of the voice message segment in the voice message. | 12-01-2011 |
20110299404 | SYSTEM AND METHOD FOR PROVIDING CHANNEL CONFIGURATIONS IN A COMMUNICATIONS ENVIRONMENT - A method is provided in one example embodiment and includes monitoring a plurality of channels provisioned for an endpoint. The method also includes reacting to an alert message by adjusting one of the channels for the endpoint. The adjustment is a selected one of increasing a volume associated with the channel receiving the alert message, or changing a spatial direction from which the alert message and an associated media stream are conveyed to the endpoint. In other embodiments, the adjustment provisions the alert message from a left ear to a right ear of an end user of the endpoint. In still other embodiments, the adjustment includes determining which is a primary channel of the channels and provisioning the alert message to the primary channel of the endpoint. The media stream associated with the alert message is also moved to a same spatial direction along with the alert message. | 12-08-2011 |
20120002002 | Capturing and Controlling Access to Muted Content from a Conference Session - Techniques are provided for receiving multimedia from a plurality of endpoints participating in a conference session, including multimedia from an endpoint that was muted during the conference session. A muting state is detected at a particular endpoint during the conference session and the multimedia from the particular endpoint is recorded even though it is not forwarded and rendered to the other endpoints during the conference session. Information associated with the multimedia data for the conference session is stored to indicate the time period during which the muting state was detected at the particular endpoint. Techniques are also provided for granting access at a later time to the stored multimedia data for conference session, including access controls to the muted multimedia. | 01-05-2012 |
20120016536 | AD-HOC MOBILE IP NETWORK FOR INTELLIGENT TRANSPORTATION SYSTEM - A method for intelligently managing a transportation network is provided. The method may include providing a roadside apparatus | 01-19-2012 |
20120026900 | STATE SYNCHRONIZATION OF SERIAL DATA LINK SESSIONS CONNECTED ACROSS AN IP NETWORK - In one embodiment, a router maintains a communication session between a local terminal unit and a remote terminal unit, the local terminal unit interconnected to the router over a local serial data link, and the remote terminal unit interconnected to the router over an Internet Protocol (IP) session via a remote router and a corresponding remote serial data link. The router may then monitor a state of the local serial data link, and communicates this state with the remote router over the IP session, as well as a remote state of the remote serial data link. The router may then correspondingly control the state of the local serial data link to match the remote state of the remote serial data link. | 02-02-2012 |
20120027189 | Call to Call Center as Trigger to Capture and Record Other Geographically Relevant Data - Techniques are provided for using a location of a caller placing a call that is received at a call center to identify other sources of information that are relevant to the call. A call is received at a call center from a caller. The location of the caller is obtained from the received call, and other sources of information potentially relevant to the call are identified based on the location of the caller. For example, information is stored that identifies at lease one individual that is proximate to the location of the caller, and communication is initiated with at least one individual who is determined to be located proximate to the caller. | 02-02-2012 |
20120027195 | Automatic Editing out of Sensitive Information in Multimedia Prior to Monitoring and/or Storage - Techniques are provided to automatically edit multimedia associated with call center sessions when producing monitoring and/or recording copies of the multimedia. Multimedia associated with a session between a caller and a call center agent is received. The multimedia from the session is analyzed to determine when sensitive information is to be revealed. The multimedia is edited to mask the sensitive information in a monitored and/or recorded copy of the multimedia. | 02-02-2012 |
20120030682 | Dynamic Priority Assessment of Multimedia for Allocation of Recording and Delivery Resources - Techniques are provided to allocate resources used for recording multimedia or to retrieve recorded content and deliver it to a recipient. A request associated with multimedia for access to resources is received. A context associated with the multimedia is determined. Resources for the multimedia are allocated based on the context. | 02-02-2012 |
20120039451 | QUEUING AND ROUTING TELEPHONE CALLS - A method and system to process communications in an automatic communication distributor is described. The method may comprise receiving a communication and identifying an originating location from which the communication originates. Thereafter, a determination is made when the originating location corresponds to a predefined high priority geographical area and a priority to the communication is assigned based on the originating location. The call may be assigned a higher priority when the originating location corresponds to the high priority geographical area than when the originating location does not correspond with the high priority geographical area. The communication is queued based on the assigned priority. A method is also provided to assign an agent using an automated call distributor based on a distance between the originating location of the communication and the determined geographical locations of the potential respondents. | 02-16-2012 |
20120089463 | Method and System for Inserting Advertisements in Unified Messaging Solutions - A method and an apparatus for inserting an included message into an e-mail message, wherein the e-mail message is transferred through a unified messaging solution have been provided. In one embodiment, the unified messaging solution detects transmission of a voice mail message as the e-mail attachment. The voice mail message is received by a system that facilitates the transfer of the e-mail message. The system associates the included message with the voice mail message. The included message is inserted into the e-mail message. The system sends the e-mail message along with the included message and the attached voice mail message to an intended user. In a preferred embodiment, the included message is an advertising message. | 04-12-2012 |
20120113807 | Affecting Node Association Through Load Partitioning - In one embodiment, a node may request to join a parent node in a directed acyclic graph (DAG) in a computer network, and may also notify the parent node of a load associated with the request and whether the node has any other parent node options. The requesting node may then receive a response from the parent node that is either an acceptance or a denial. While the node may join the parent node in response to an acceptance, if a denial is received, the node may divide the load into first and second portions, and may re-request to join the parent node with the load of the first portion. In this manner, by partitioning the load, a load balancing mode of operation across multiple is parents in a DAG is provided. | 05-10-2012 |
20120113863 | Dynamic Wake-up Time Adjustment Based on Designated Paths Through a Computer Network - In one embodiment, a computer network may include nodes and at least one root node. A first subset of the nodes may be located along a designated path (a directed acyclic graph (DAG)) through the computer network to the root node, where the first subset of nodes is configured to operate according to a first wake-up timer. A second subset of the nodes that are not along the designated path are in communication to at least one node of the first subset of nodes along the designated path, and operate according to a second wake-up timer that is longer than the first wake-up timer. In this manner, second subset of nodes may be awake less often, e.g., conserving energy. | 05-10-2012 |
20120113986 | SYSTEM AND METHOD FOR MANAGING ACKNOWLEDGEMENT MESSAGES IN A VERY LARGE COMPUTER NETWORK - A multicast message may be distributed by receiving, at a first node in a multicast network, a multicast message from a parent node of the first node. The multicast message is transmitted to child nodes of the first node in the multicast network. A population of the child nodes to which the multicast message was transmitted is accessed and acknowledgement messages which reveal child nodes that are among an acknowledging subset of less than all of the child nodes of the first node are received. Child nodes revealed by the received acknowledgement messages are compared with child nodes determined to be among the population of child nodes to which the multicast message is expected to be received. Based on results of the comparison, a compressed non-acknowledging subset is identified and transmitted to the parent node. | 05-10-2012 |
20120117208 | Dynamic Address Assignment for Address Aggregation in Low Power and Lossy Networks - A node in a Low power and Lossy Network (LLN) is managed by monitoring a routing configuration on a node in a LLN. A triggering parameter that is used to invoke an address change on a child node is tracked and a threshold against which to compare the triggering parameter is accessed. The triggering parameter is compared to the threshold. Based on results of comparing the triggering parameter to the threshold, it is determined that an address change at the child node is appropriate. An address change of a child node appearing in the routing configuration is invoked based on the determination that an address change is appropriate. | 05-10-2012 |
20120117213 | Negotiated Parent Joining in Directed Acyclic Graphs (DAGS) - In one embodiment, a node may request to join a parent node in a directed acyclic graph (DAG) in a computer network, and may notify the parent node of a load associated with the request, and whether the node has any other parent node options. The response received from the parent node may be either an acceptance or a denial (based on the load and other parent node options), where in the case of an acceptance, the node may join the parent node in the DAG. Alternatively, in response to a denial, in one embodiment, the node may perform load shedding to become acceptable to the parent node. In another embodiment, a node receiving a join request from a child node may determine an impact associated with allowing the child node (and its load) to join the receiving node in the DAG prior to returning an acceptance or denial, accordingly. | 05-10-2012 |
20120117268 | System and Method for Routing Critical Communications - According to one or more implementations of the disclosure, packets may be transmitted in a low power and lossy network (LLN) by receiving, on a first node, a message from a sending node, and by activating a critical message configuration to be applied in routing the message. A message identifier (e.g., signature) for the message may also be received or gleaned. The message identifier can be compared at the first node to a list of stored message identifiers, created based on routing history, to determine if the message has already been received. As such, if the message has not been received at the first node previously, a first parent and a second parent for the message are identified and the message, along with the critical message indication, can be transmitted to the first parent and the second parent, thereby achieving redundancy in the routing of the message. | 05-10-2012 |
20120117438 | Multicast Message Retransmission - In one implementation, a method of distributing a multicast message in a wireless mesh network includes receiving a multicast message from a parent node of an intermediate node. The method includes transmitting the multicast message to child nodes of the intermediate node. The method includes storing the multicast message in a cache at the intermediate node. The method includes intercepting an acknowledgement message from each acknowledging child node within an acknowledging subset of less than all of the child nodes. The method includes accessing information indicating a population of the child nodes to which the multicast message transmission was directed. The method includes comparing the acknowledging subset of the child nodes with the population of the child nodes. The method includes identifying a non-acknowledging subset of less than all of the child nodes. The method includes retransmitting the multicast message to the non-acknowledging subset of the child nodes. | 05-10-2012 |
20120128322 | Geographical Location Information/Signal Quality-Context Based Recording and Playback of Multimedia Data from a Conference Session - Playback of multimedia data associated with a recorded conference session is simplified, particularly for a person who participated in the conference session from a mobile device. At a recording server that is in communication with a plurality of endpoints in a conference session, multimedia received from the plurality of endpoints participating in the conference session is recorded. The recording server obtains geographical location information for at least one mobile endpoint participating in the conference session as the at least one mobile endpoint moves. The recording server temporally correlates the geographical location information for the at least one endpoint with recorded multimedia data for the conference session. The recording server stores data tags for the geographical location information for the at least one mobile endpoint in association with the recorded multimedia data for subsequent use in indexing to map data to retrieve a portion of the recorded multimedia data for playback. | 05-24-2012 |
20120147746 | SYSTEM AND METHOD FOR OPTIMIZING PACKET ROUTING IN A MESH NETWORK - A method is provided in one example and includes receiving a first packet and a second packet that propagate in a mesh network and evaluating hop count metrics associated with the first packet and the second packet (e.g., evaluate the number of hops traversed in the mesh network, hop characteristics, etc.). The first packet is sent to a first queue, the second packet is sent to a second queue. The first queue is associated with a first hop count detected in the first packet, and the second queue is associated with a second hop count detected in the second packet. A buffer overflow condition can be identified. The method further includes discarding the second packet based on the second hop count being less than the first hop count. Discarding of the second packet may be performed in response to any type of congestion parameter detected in the mesh network. | 06-14-2012 |
20120147783 | SYSTEM AND METHOD FOR PROVIDING CONFIGURATION DATA IN A MESH NETWORK - A method is provided in one example embodiment and includes receiving packets from a group of nodes configured to operate in a mesh network; referencing geographic information associated with the group of nodes; evaluating a subset of the group of nodes within a particular geographic area; determining a global positioning system (GPS) location and a relative location associated with the subset of the group of nodes; determining configuration data for the subset of the group of the nodes; and communicating the configuration data to the subset of the group of nodes. | 06-14-2012 |
20120155260 | Dynamic Synchronized Scheduling in a Computer Network - In one embodiment, a receiving node in a computer network may detect congestion, and also identifies a set (e.g., subset) of its neighbor nodes. In response to the congestion, the receiving node may assign a transmission timeslot to each neighbor node of the set based on the congestion, where each neighbor is allowed to transmit (synchronously) only during its respective timeslot. The assigned timeslots may then be transmitted to the set of neighbor nodes. In another embodiment, a transmitting node (e.g., a neighbor node of the receiving node) may receive a scheduling packet from the receiving node. Accordingly, the transmitting node may determine its assigned transmission timeslot during which the transmitting node is allowed to transmit. As such, the transmitting node may then transmit packets only during the assigned timeslot (e.g., for a given time). In this manner, congestion at the receiving node may be reduced. | 06-21-2012 |
20120155276 | Dynamic Expelling of Child Nodes in Directed Acyclic Graphs in a Computer Network - In one embodiment, a parent node in a directed acyclic graph (DAG) in a computer network may detect congestion from its child nodes. In response, the parent node may determine particular child nodes to expel from the parent node based on the congestion, and notifies the expelled child nodes that they must detach from the parent node in response to dynamically detecting congestion (e.g., to find a new parent, excluding the parent node and optionally any nodes in the vicinity). In another embodiment, a child node receives a detach request packet from a current parent node that indicates that the child node is expelled from using the current parent node. In response, the child node triggers a new parent selection to select a new parent node that specifically excludes the current parent node (e.g., and optionally any nodes in the parent's vicinity). | 06-21-2012 |
20120155284 | Extendable Frequency Hopping Timeslots in Wireless Networks - In one embodiment, a wireless transmitting node in a frequency hopping wireless network may determine whether a packet can be transmitted within a particular timeslot of a frequency hopping sequence based on a length of the packet. If unable to transmit the packet within the particular timeslot, the transmitting node extends the particular timeslot into a subsequent timeslot to allow transmission of the packet within the extended timeslot at a frequency associated with the particular timeslot. Once the extended timeslot ends, the transmitting node and receiving node hop frequencies into the subsequent timeslot to synchronize with the rest of the network that already hopped at the conventional rate. In another embodiment, a wireless receiving node may also extend the particular timeslot into a subsequent timeslot to allow reception of a packet that would extend beyond the particular timeslot, and may hop frequencies upon expiration of the extended timeslot. | 06-21-2012 |
20120155329 | Dynamic Reroute Scheduling in a Directed Acyclic Graph (DAG) - In one embodiment, a particular node joins a directed acyclic graph (DAG) in a computer network at a parent node, and determines its grade based on a topology of the DAG, the grade lower than the parent node and higher than any child nodes of the particular node. In response to detecting a trigger for a routing change in the DAG, the particular node delays the routing change based on the grade such that the delay is longer than a first associated delay of any of the child nodes and shorter than a second associated delay of the parent node. Upon expiration of the delay, the particular node may determine if the trigger for the routing change is still valid, and if valid, performs the routing change. | 06-21-2012 |
20120155397 | Collision Avoidance for Wireless Networks - In one embodiment, a particular node in a wireless network may receive a wireless signal, and may determine whether the wireless signal is intended for itself In response to determining that the wireless signal is intended for the particular node, the particular node may transmit a non-colliding wireless carrier sense detected alert (CSDA) signal during the received wireless signal to request that other nodes within communication distance of the particular node refrain from transmitting for a duration of the received wireless signal. In another embodiment, a node listens on a first frequency for a wireless CSDA signal regarding a second (colliding) frequency, and in response to receiving a CSDA signal, may refrain from transmitting a wireless signal on the second frequency for the particular duration, or else (if not receiving a CSDA signal), may allow transmission of a wireless signal on the second frequency, accordingly. | 06-21-2012 |
20120155463 | Increased Communication Opportunities with Low-Contact Nodes in a Computer Network - In one embodiment, a particular node (e.g., root node) in a directed acyclic graph (DAG) in a computer network may identify a low-contact (e.g., wireless) node in the DAG that is at risk of having an invalid path when attempts are made to reach the low-contact node. In response, the particular node may identify neighbors of the low-contact node, and may establish a multicast tree from the particular node to the low-contact node through a plurality of the neighbors to reach the low-contact node. When sending traffic to the low-contact node, the particular node sends the traffic on the multicast tree, wherein each of the plurality of neighbors attempts to forward the traffic to the low-contact node. In another embodiment, the low-contact node itself indicates its status to the particular/root node, along with its list of neighbors in order to receive the multicast traffic. | 06-21-2012 |
20120155475 | Dynamic Routing Metric Adjustment - In one embodiment, one or more routing update parameters may be set for and propagated to nodes of a directed acyclic graph (DAG) in a computer network, the routing update parameters indicative of when to perform a corresponding routing update operation. A decision node (e.g., a root node of the DAG, application in a head-end, etc.) may gather network statistics of the DAG during operation based on the routing update parameters, and may accordingly determine at least one adjusted routing update parameter based on the gathered network statistics. This adjusted routing update parameter may then be propagated to the nodes of the DAG, such that the nodes operate according to the (adaptively) adjusted routing update parameter. | 06-21-2012 |
20120155511 | Dynamic Assignment of Frequency Hopping Sequences in a Communication Network - In one embodiment, a management device determines a topology of nodes in a network. Based on the topology, frequency hopping sequences are assigned (and notified) to the nodes such that each particular node of a certain set of the nodes is assigned a frequency hopping sequence on which to transmit that is different than frequency hopping sequences of neighbors and hidden neighbors of that particular node. In another embodiment, a transmitting node first transmits a transmission indication signal on its particular frequency band based on its frequency hopping sequence, and then transmits a message on the particular frequency band. In a further embodiment, a receiving node listening to a plurality of frequency bands may detect the transmission indication signal on the particular frequency band. In response, the receiving node filters out all frequency bands other than the particular frequency band, and receives the following transmission on that particular frequency band. | 06-21-2012 |
20120158933 | Data Reporting Using Reporting Groups in a Computer Network - In one embodiment, a node may determine a topology of a plurality of reporting nodes within a directed acyclic graph (DAG) in a computer network. The reporting nodes may then be assigned to one of a plurality of reporting groups, where reporting nodes are allowed to report only during designated time windows corresponding to their assigned reporting group. The reporting nodes may then be informed of at least their own assignment to a particular reporting group. In another embodiment, a particular reporting node may join the DAG, and may also receive an assignment to one of a plurality of reporting groups. Accordingly, the particular reporting node may also determine designated time windows corresponding to the assigned reporting group, where the particular reporting node is allowed to report only during the designated time windows. | 06-21-2012 |
20120203479 | FAST FAULT ISOLATION AND RESTORATION FOR DISTRIBUTION NETWORKS - In one embodiment, a method includes obtaining information relating to a steady state operation of a portion of an electrical network, the electrical network including a plurality of components, the information being obtained from the plurality of components while the portion of the electrical network is operating at steady state, wherein the information is obtained through a communications network that at least partially overlays the electrical network. The method also includes detecting a fault in the electrical network, isolating the location of the fault, and restoring the electrical network. The fault is detected by at least a first component of the plurality of components. Restoring the electrical network includes determining when the first component owns the fault. Determining when the first component owns the fault includes at least processing the information obtained from the plurality of components. | 08-09-2012 |
20120213219 | IN-VOICEMAIL-SESSION CALL TRANSFERS - In one embodiment, a voicemail system stores a voicemail message left by a first caller for a second caller. The voicemail system facilitates the transfer of a call out of a playback of the voicemail to the first caller and generates a credential that is coupled with the call. If the first caller is not available for the call, the second caller is transferred to the voicemail mailbox of the first caller where second caller records a second voicemail, which is placed in the mailbox of the first caller. The call may be transferred back to the mailbox of the first caller in response to a transfer code entered by the second caller. The voicemail system verifies the second caller based on the credential and returns the second caller to the appropriate location in the queue of voicemails. | 08-23-2012 |
20120230204 | Remote Stitched Directed Acyclic Graphs - In one embodiment, in response to a trigger condition being detected at a particular location in a primary directed acyclic graph (DAG) in a computer network, a particular node in the primary DAG at the particular location may be determined to act as a remote stitched (RS)-DAG root for an RS-DAG at the particular location. The determined RS-DAG root may then be instructed to initiate the RS-DAG, the instructing indicating one or more properties for the RS-DAG that are based on the trigger condition and that are different from properties of the primary DAG. In another embodiment, a particular node receives instructions to initiate an RS-DAG as its RS-DAG root, initiates the RS-DAG, and relays messages of the RS-DAG with a primary root of the primary DAG. | 09-13-2012 |
20120230222 | Gravitational Parent Selection in Directed Acyclic Graphs - In one embodiment, a particular node in a computer network receives an indication of a number of child nodes of one or more potential parent nodes to the particular node in a primary directed acyclic graph (DAG). From this, the particular node selects a particular potential parent node with the highest number of child nodes as a secondary DAG parent for the particular node, and joins the secondary DAG at the selected secondary DAG parent (e.g., for multicast and/or broadcast message distribution). This may recursively continue, such that nodes gravitate toward parents with more children, potentially allowing parents with fewer children to relinquish their parental responsibilities. | 09-13-2012 |
20120230370 | Efficient Transmission of Large Messages in Wireless Networks - In one embodiment, a sender in a frequency hopping wireless network classifies a message as a large message to be fragmented into a plurality of packets for transmission to a receiver, and in response, indicates to the receiver that the message is a large message to request use of an orthogonal frequency hopping sequence between the sender and receiver for the duration of the large message transmission, the orthogonal frequency hopping sequence orthogonal to a shared frequency hopping sequence of the wireless network. Thereafter, the sender transmits the large message to the receiver on the orthogonal frequency hopping sequence, and returns to the shared frequency hopping sequence upon completion. In another embodiment, the receiver receives the indication that a message is a large message (requesting use of the orthogonal frequency hopping sequence). If the receiver can comply, the large message is received on the orthogonal frequency hopping sequence. | 09-13-2012 |
20120233326 | Efficient Message Distribution for Directed Acyclic Graphs - In one embodiment, a particular node in a primary DAG receives a distributed message from distributing nodes, and from this, deterministically selects a distributing node as a distributing parent in a secondary DAG from which distributed messages are to be received. The particular node may then inform the deterministically selected distributing parent that it is being used by the particular node as its distributing parent, and if the selected distributing parent is not the particular node's primary DAG parent, then the primary DAG parent is informed that it need not send distributed messages for the particular node. In another embodiment, a distributing node continues to repeat distributed messages in response to receiving notification that it is being used as a distributing parent, and if a primary DAG parent, prevents the repeating in response to receiving a notification from all of its child nodes that it need not send distributed messages. | 09-13-2012 |
20120233485 | Phase-Based Operation of Devices on a Polyphase Electric Distribution System - In one embodiment, a device in a computer network monitors an alternating-current (AC) waveform of an electrical power source at the device, where the power source is part of a polyphase power source system. Once the device determines a particular phase of the polyphase power source system at the device, then the device joins a directed acyclic graph (DAG) specific to the particular phase. In another embodiment, a device detects a time of a zero crossing of the AC waveform, and may then determine a particular phase of the polyphase power source system at the device based on the time of the zero crossing relative to a corresponding location within a frequency hopping superframe of the computer network. | 09-13-2012 |
20120277921 | CROSS-PROFILE COORDINATION OF ENERGY CONSUMPTION POLICIES - In one embodiment, a policy coordination device receives soft policies from a plurality of localized energy consumption control devices, and examines the received soft policies to determine corresponding energy consumption. From this, the policy coordination device creates a global policy to reduce overall peak energy consumption between the received soft policies. As such, the policy coordination device transmits corresponding policy control commands to one or more of the plurality of localized energy consumption control devices based on the global policy. In another embodiment, a particular localized energy consumption control device discloses its soft policies and in response, receives a policy control command from the policy coordination device to control operation of one or more energy consuming devices (within soft limits of the soft policies) based on the global policy. | 11-01-2012 |
20120307624 | MANAGEMENT OF MISBEHAVING NODES IN A COMPUTER NETWORK - In one embodiment, a node in a computer network detects a misbehaving node in the computer network based on the misbehaving node acting in violation of one or more rules. As such, the node communicates information regarding the misbehaving node to a network management system (NMS), and then may receive isolation instructions from the NMS regarding how to isolate the misbehaving node from the computer network. Accordingly, the node may perform the isolation instructions. In another embodiment, the NMS receives the communicated information regarding the misbehaving node, and determines whether the misbehaving node should be isolated based on the communicated information. If so, then the NMS determines isolation instructions regarding how to isolate the misbehaving node from the computer network, and transmits them to one or more nodes in the computer network, accordingly. | 12-06-2012 |
20120307653 | REACHABILITY RATE COMPUTATION WITHOUT LINK LAYER ACKNOWLEDGMENTS - In one embodiment, a device in a computer network receives a particular packet associated with a transmission attempts value, the associated transmission attempts value indicative of a first number of times a transmitter has attempted to transmit the particular packet. In response, the device increases by one a stored successful attempts value stored at the device, the stored successful attempts value indicative of a second number of times the device has received the same particular packet. As such, a reachability rate of a link from the transmitter to the device may be determined based on comparing the associated transmission attempts value to the stored successful attempts value. | 12-06-2012 |
20120320768 | REDUCING THE IMPACT OF HIDDEN NODES IN MESH NETWORKS - In one embodiment, hidden neighbor relationships are identified based on received neighbor information from a plurality of nodes in a communication network. Based on determining a number of hidden neighbors for a particular node at various node parameters, a cost function associated with the particular node may be determined and utilized. In another embodiment, a number of hidden nodes of the particular node is determined across a range of transmission powers, and a delay associated with the particular node reaching a root node in the network across the range of transmission powers is also determined based on the neighbor nodes reachable at respective transmission powers. A tradeoff is determined across the range of transmission powers between the number of hidden nodes and the delay, and then the transmission power of the particular node can be set based on an acceptable determined tradeoff. | 12-20-2012 |
20120320790 | SYSTEMATIC NEIGHBOR DETECTION IN SHARED MEDIA COMPUTER NETWORKS - In one embodiment, a particular node in a shared media computer network may determine a set of network parameters for the network, and a timing of super-frames in the network, each super-frame having one or more frames, each frame divided into a plurality of timeslots. In addition, the particular node computes a discovery scheduling function using its own identification to determine in which particular timeslot of the frames to transmit a network discovery packet. Accordingly, the particular node may transmit the network discovery packet in the particular timeslot of the frames. In an additional or alternative embodiment, the particular node may receive a network discovery request from a requesting node. In response, the particular node determines whether it is free to reply to the network discovery request based on parameters in the network discovery request, and if free to reply, may transmit a network discovery packet to the requesting node. | 12-20-2012 |
20120320923 | REDIRECTING TRAFFIC VIA TUNNELS TO DISCOVERED DATA AGGREGATORS - In one embodiment, a data aggregator discovery (DAD) message may be distributed by an associated data aggregator, the DAD message identifying the initiating data aggregator, and comprising a recorded route taken from the data aggregator to a receiving particular node as well as a total path cost for the particular node to reach a root node of the DAG through the recorded route and via the data aggregator. The receiving particular node determines a path cost increase (PCI) associated with use of the data aggregator based on the total path cost as compared to a DAG-based path cost for the particular node to reach the root node via the DAG. If the PCI is below a configured threshold, the particular node may redirect traffic to the data aggregator as source-routed traffic according to the recorded route. The traffic may then be aggregated by the data aggregator, accordingly. | 12-20-2012 |
20120324273 | DATA ROUTING FOR POWER OUTAGE MANAGEMENT - In one embodiment, a particular node in a computer network, that is, one receiving electrical power from a grid source, may determine routing metrics to a plurality of neighbor nodes of the particular node in the computer network. In addition, the node also determines power grid connectivity of the plurality of neighbor nodes. Traffic may be routed from the particular node to one or more select neighbor nodes having preferred routing metrics, until a power outage condition at the particular node is detected, at which time the traffic (e.g., last gasp messages) may be routed from the particular node to one or more select neighbor nodes having diverse power grid connectivity from the particular node. In this manner, traffic may be routed via a device that is not also experiencing the power outage condition. | 12-20-2012 |
20130010590 | DYNAMIC ENABLING OF ROUTING DEVICES IN SHARED-MEDIA COMMUNICATION NETWORKS - In one embodiment, a non-repeated reachability probe is transmitted from a particular node into a shared-media network, where nodes that receive the probe are configured to reply to the particular node. Based on determining a set of one or more nodes in the shared-media network that received the probe, one or more routing nodes of the set may be selected to act as routers in the shared-media network, and notified of their selection. | 01-10-2013 |
20130010798 | TRANSMISSION PRIORITY PATHS IN MESH NETWORKS - In one embodiment, a node may determine a trigger for establishing transmission priority on a path through a shared-media communication network for priority traffic to a particular node. As such, the node may generate a path clear message (PCM) that would instruct one or more receiving nodes along the path to suspend transmission for traffic other than the priority traffic for a specified duration, and also to transmit a local non-repeated distributed message to one or more neighbor nodes of each respective receiving node, the local non-repeated distributed message to instruct the neighbor nodes to suspend transmission for the specified duration. After transmitting the PCM along the path to the particular node to establish the transmission priority for the priority traffic along the path through the shared-media network, the priority traffic may be transmitted to the particular node along the path during the transmission priority. | 01-10-2013 |
20130013809 | MANAGING HOST ROUTES FOR LOCAL COMPUTER NETWORKS WITH A PLURALITY OF FIELD AREA ROUTERS - In one embodiment, a particular field area router (FAR), in a local computer network (e.g., a mesh network) having a plurality of FARs, advertises a common subnet prefix assigned to the local computer network into a global computer network. Each of the plurality of FARs of the local computer network is configured to accept any traffic destined to the local computer network, and a tunnel overlay is built among the plurality of FARs. Upon receiving a packet at the particular FAR destined to a particular device in the local computer network, and in response to the particular FAR not having a host route to the particular device, it forwards the packet on the tunnel overlay to another of the plurality of FARs of the local computer network. | 01-10-2013 |
20130024043 | DYNAMIC CONFIGURATION OF DISTRIBUTION FEEDER PARAMETERS IN A POWER GRID - In one embodiment, a system identifies a grid topology of a plurality of distribution automation (DA) devices of a distribution feeder circuit in a power grid, and determines parameters for each of the DA devices of the distribution feeder circuit based on the grid topology e.g., protection parameters such that DA devices further from a power source in the power grid up to a normally open point (NOP) are configured to trigger protection earlier than DA devices closer to the power source. The DA devices may then be configured with respective parameters as determined, and in response to detecting a change of the grid topology, updated parameters may be determined for one or more of the DA devices based on the changed grid topology. The system then reconfigures respective parameters of each of the DA devices that have updated parameters due to the change of the grid topology. | 01-24-2013 |
20130054044 | ADAPTIVE CONTROL OF POWER GRID OPERATIONS BASED ON ENERGY PROFILES - In one embodiment, an energy manager determines respective energy profiles of one or more local end-devices for which the energy manager is responsible. Through communication between a power grid controller and the energy manager, one or more aspects of power grid operations may be controlled based on the communicating and the respective energy profiles. For example, in one embodiment, upon receiving a global demand response (DR) request, the energy manager determines respective specific DR control for the one or more local end-devices based on the received DR request and the respective energy profiles, and transmits the respective specific DR control to the one or more local end-devices, accordingly. In another embodiment, power grid operations may be stabilized based on the respective energy profiles. | 02-28-2013 |
20130055383 | COORDINATED DETECTION OF A GREY-HOLE ATTACK IN A COMMUNICATION NETWORK - In one embodiment, a security device receives one or more first unique identifications of packets sent by a first device to a second device for which a corresponding acknowledgment was purportedly returned by the second device to the first device. The security device also receives one or more second unique identifications of packets received by the second device from the first device and acknowledged by the second device to the first device. By comparing the first and second unique identifications, the security device may then determine whether acknowledgments received by the first device were truly returned from the second device based on whether the first and second unique identifications exactly match. | 02-28-2013 |
20130091258 | COMMUNICATION NETWORK TOPOLOGY MANAGEMENT BASED ON AN ASSOCIATED ELECTRIC GRID TOPOLOGY - In one embodiment, a computer determines a grid topology of an electric grid based on one or more electric grid configuration description files, and also determines a network topology of a computer network used to provide communication to grid devices of the electric grid. By assessing whether the network topology is configured to meet one or more communication requirements of the grid topology (e.g., initially and/or through monitoring for grid changes), the computer may trigger a corrective action (e.g., alarm or reconfiguration) in response to the network topology not being configured to meet the one or more communication requirements of the grid topology. | 04-11-2013 |
20130095799 | Voicemail System with Quality Assurance - In one embodiment, a method for ensuring quality of a media message is provided. The method includes receiving information for a media message. At least a portion of the media is analyzed to determine a media quality for the media message. The method then determines if the media quality is acceptable. If the media quality is not acceptable, then an alert may be sent regarding the media quality of the media message. For example, a caller may be prompted to re-record a media message. | 04-18-2013 |
20130114621 | System and Method for Computer Originated Audio File Transmission - A system and method for computer originated audio file transmission includes a server having a communications module operable to communicate with a terminal unit. The server may also include a storage module operable to store at least one file. A processor may be provided to separate the file into a plurality of packets. In accordance with one embodiment of the present invention, the communications module is operable to send an initial burst of packets to the terminal unit, wherein the initial burst of packets includes at least two of the plurality of packets. In accordance with another embodiment of the present invention, the communications module is further operable to send additional packets of the plurality of packets at a predetermined rate, until each of the plurality of packets has been sent to the terminal unit. | 05-09-2013 |
20130170637 | SYSTEM AND METHOD FOR PROVIDING PERSONALIZATION BADGES FOR ENHANCED CUSTOMER SERVICE EXPERIENCE - A system for providing customized customer service interaction between a user and an enterprise is disclosed. The system includes a badge and a badge reader. The badge is installed at a user device, and the badge reader is installed at the enterprise. The badge is configured to generate an access key for a customer's social network account based on a customer's work request to the enterprise. The badge reader is configured to retrieve user data as permitted by the associated access key from the badge, and route a work request of the user to a suitable agent of the enterprise based on the user data. | 07-04-2013 |
20130230152 | ECHO MITIGATION IN A CONFERENCE CALL - In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a conference endpoint and as a result, an echo associated with the transmittal of the test audio signal is received. One or more parameters of the echo are then identified and an echo mitigation process is selected from multiple echo mitigation processes based on the identified parameters. The selected echo mitigation process is then applied. | 09-05-2013 |
20130253732 | AD-HOC MOBILE IP NETWORK FOR INTELLIGENT TRANSPORTATION SYSTEM - A method for intelligently managing a transportation network is provided. The method includes providing a roadside apparatus to communicate with vehicle nodes associated with vehicles in a transportation network, the vehicle nodes being in a range of control of the roadside apparatus. Based on real-time location and direction information received from a particular vehicle node associated with a particular one of the vehicles, a specific neighboring roadside apparatus whose range of control is next to be entered by the particular vehicle is identified. Handover information is communicated to the specific neighboring roadside apparatus, and the particular vehicle node is communicatively connected to the specific roadside apparatus before disconnection from the roadside apparatus. | 09-26-2013 |
20130301813 | METHOD AND APPARATUS TO PROCESS AN INCOMING MESSAGE - A method and apparatus to process an incoming message is described. The method may comprise, at a recipient system, receiving an incoming message from a message communicator and automatically analyzing message content to identify a keyword included in the message content. Thereafter, a predefined action associated with the keyword may be identified and the action may be performed. In an example embodiment, the predefined action may be a priority with the message, alerting an intended recipient of the message, routing the message to the intended recipient, paging the intended recipient, emailing the message to the intended recipient, sending an SMS message to the intended recipient, or the like. In an example embodiment, a user/owner of a mailbox may search a message database to identify incoming messages which includes the search term in the message content. | 11-14-2013 |
20140006893 | Repeater Nodes in Shared Media Networks | 01-02-2014 |
20140031064 | Method and System for Automatically Identifying Wireless Signal Quality of a Region - A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals received by each of a plurality of mobile endpoints and receiving location information identifying locations of each of the plurality of mobile endpoints. The method also includes, based on the received signal quality information and the received location information, identifying a first region of an area, the first region having a first signal quality. | 01-30-2014 |
20140041055 | SYSTEM AND METHOD FOR ONLINE ACCESS CONTROL BASED ON USERS SOCIAL NETWORK CONTEXT - System and method to control access by a user to an online service, the method including: receiving a request from a user to use an application; identifying, via a processor of a computing device, a social networking characteristic of the user; classifying the user based upon the social networking characteristic, to produce a classification of the user; and controlling an access to the online service based upon the classification of the user. The characteristic may be public or private. Controlling access may include permitting, impeding, or facilitating access. Display of a link may be changed, and/or the processing of the link if selected may be changed. Users may be classified at least as preferred, malicious, non-malicious, non-target and generic default. | 02-06-2014 |
20140092769 | DYNAMIC MULTI-PATH FORWARDING FOR SHARED-MEDIA COMMUNICATION NETWORKS - In one embodiment, a quality of one or more links of a particular node in a communication network may be determined, and then whether the quality of the one or more links is below a threshold may also be determined. In response to determining that the quality of at least one of the one or more links is above the threshold, a select one of the at least one of the one or more links with quality above the threshold may be utilized for communication with the particular node. Conversely, in response to determining that the quality of each of the one or more links is below the threshold, multi-path forwarding over a plurality of links of the particular node may be utilized for communication with the particular node. | 04-03-2014 |
20140095058 | AD-HOC MOBILE IP NETWORK FOR INTELLIGENT TRANSPORTATION SYSTEM - A method and system for intelligently managing a transportation network are provided. The method includes dynamically establishing an ad hoc data communications network that includes vehicle nodes provided by respective vehicles in a transportation network. Behavior of one or more of the vehicles can be controlled remotely in response to automated traffic analysis performed based on real-time information received via the ad hoc network. Remote control of the one or more vehicles can include controlling vehicle motion by controlling vehicle subsystems via real-time command data transmitted to the respective vehicles via the ad hoc network. | 04-03-2014 |
20140100848 | PHRASE SPOTTING SYSTEMS AND METHODS - Methods and systems for identifying specified phrases within audio streams are provided. More particularly, a phrase is specified. An audio stream is them monitored for the phrase. In response to determining that the audio stream contains the phrase, verification from a user that the phrase was in fact included in the audio stream is requested. If such verification is received, the portion of the audio stream including the phrase is recorded. The recorded phrase can then be applied to identify future instances of the phrase in monitored audio streams. | 04-10-2014 |
20140105027 | TRANSMISSION PRIORITY PATHS IN MESH NETWORKS - In one embodiment, a node may determine a trigger for establishing transmission priority on a path through a shared-media communication network for priority traffic to a particular node. As such, the node may generate a path clear message (PCM) that would instruct one or more receiving nodes along the path to suspend transmission for traffic other than the priority traffic for a specified duration, and also to transmit a local non-repeated distributed message to one or more neighbor nodes of each respective receiving node, the local non-repeated distributed message to instruct the neighbor nodes to suspend transmission for the specified duration. After transmitting the PCM along the path to the particular node to establish the transmission priority for the priority traffic along the path through the shared-media network, the priority traffic may be transmitted to the particular node along the path during the transmission priority. | 04-17-2014 |
20140122673 | Dynamic Address Assignment for Address Aggregation in Low Power and Lossy Networks - A node in a Low power and Lossy Network (LLN) is managed by monitoring a routing configuration on a node in a LLN. A triggering parameter that is used to invoke an address change on a child node is tracked and a threshold against which to compare the triggering parameter is accessed. The triggering parameter is compared to the threshold. Based on results of comparing the triggering parameter to the threshold, it is determined that an address change at the child node is appropriate. An address change of a child node appearing in the routing configuration is invoked based on the determination that an address change is appropriate. | 05-01-2014 |
20140198175 | SCALABLE CONFERENCE BRIDGE - In one embodiment, a conference bridge receives a call initiated by a first caller endpoint. The conference bridge identifies a conference to which the call requests entry and determines whether the conference bridge has available resources to process the call. The conference bridge enables the call to join the conference via a second conference bridge associated with a second caller endpoint participating in the conference according to whether the conference bridge has available resources to process the call. | 07-17-2014 |
20140235177 | Method and System for Automatically Identifying Wireless Signal Quality of a Region - A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals received by each of a plurality of mobile endpoints and receiving location information identifying locations of each of the plurality of mobile endpoints. The method also includes, based on the received signal quality information and the received location information, identifying a first region of an area, the first region having a first signal quality. | 08-21-2014 |
20140245055 | PHASE-BASED OPERATION OF DEVICES ON A POLYPHASE ELECTRIC DISTRIBUTION SYSTEM - In one embodiment, a device in a computer network monitors an alternating-current (AC) waveform of an electrical power source at the device, where the power source is part of a polyphase power source system. Once the device determines a particular phase of the polyphase power source system at the device, then the device joins a directed acyclic graph (DAG) specific to the particular phase. In another embodiment, a device detects a time of a zero crossing of the AC waveform, and may then determine a particular phase of the polyphase power source system at the device based on the time of the zero crossing relative to a corresponding location within a frequency hopping superframe of the computer network. | 08-28-2014 |
20140254790 | SYSTEM AND METHOD FOR SELECTING AGENT IN A CONTACT CENTER FOR IMPROVED CALL ROUTING - An agent selection system for selecting agents during call routing in a contact center is provided. The agent selection system includes a data mining module to mine agent related data from preconfigured resources e.g., social networking sites. The agent selection system further includes a profile module to build one or more agent profile based on the mined agent related data. The agent selection system further includes a mapping module configured to map a customer profile in a customer work request with the one or more agent profile. The agent selection system further includes a selection module to select an agent for handling the customer work request based on mapping between the customer profile and the one or more agent profile. | 09-11-2014 |
20140255895 | SYSTEM AND METHOD FOR TRAINING AGENTS OF A CONTACT CENTER - A training system for providing training to agents of an enterprise is provided. The training system may include a retrieval module for retrieving content from at least one predetermined resource. The training system further may include a topic determining module for determining at least one topic based on the retrieved content. The training system further may include an answer selecting module for selecting an answer for the at least one topic from the retrieved content based upon predefined rules. The training system further may include a reporting module for reporting the at least one topic and answer to one or more agents of the enterprise. | 09-11-2014 |
20140286377 | DYNAMIC ASSIGNMENT OF FREQUENCY HOPPING SEQUENCES IN A COMMUNICATION NETWORK - In one embodiment, a management device determines a topology of nodes in a network. Based on the topology, frequency hopping sequences are assigned (and notified) to the nodes such that each particular node of a certain set of the nodes is assigned a frequency hopping sequence on which to transmit that is different than frequency hopping sequences of neighbors and hidden neighbors of that particular node. In another embodiment, a transmitting node first transmits a transmission indication signal on its particular frequency band based on its frequency hopping sequence, and then transmits a message on the particular frequency band. In a further embodiment, a receiving node listening to a plurality of frequency bands may detect the transmission indication signal on the particular frequency band. In response, the receiving node filters out all frequency bands other than the particular frequency band, and receives the following transmission on that particular frequency band. | 09-25-2014 |
20140304427 | MANAGING HOST ROUTES FOR LOCAL COMPUTER NETWORKS WITH A PLURALITY OF FIELD AREA ROUTERS - In one embodiment, a particular field area router (FAR), in a local computer network (e.g., a mesh network) having a plurality of FARs, advertises a common subnet prefix assigned to the local computer network into a global computer network. Each of the plurality of FARs of the local computer network is configured to accept any traffic destined to the local computer network, and a tunnel overlay is built among the plurality of FARs. Upon receiving a packet at the particular FAR destined to a particular device in the local computer network, and in response to the particular FAR not having a host route to the particular device, it forwards the packet on the tunnel overlay to another of the plurality of FARs of the local computer network. | 10-09-2014 |
20140376709 | SYSTEM AND METHOD FOR MODIFYING PARAMETERS IN A CONTACT CENTER - A parameters modification system for a contact center is provided. The parameters modification system includes an input module for enabling a user to provide an input indicating one or more parameters required to be modified. The parameters modification system further includes a determination module for determining a surface based on key performance indicators (KPIs) associated the one more parameters. The determination module further determines an optimal path in the determined surface. The parameters modification system further includes a modification module for modifying the one or more parameters along the determined optimal path so that key performance indicators associated with the one or more parameters remain within a predetermined threshold. | 12-25-2014 |
20140376710 | METHOD AND SYSTEM FOR OPTIMIZING PERFORMANCE WITHIN A CONTACT CENTER - A method and system for improving performance within a contact center are provided. The method includes monitoring one or more Key Performance Indicators (KPIs) corresponding to the contact center having one or more agents associated thereto. The method further includes determining a weighted sum of the KPIs based on a weight assigned to each key performance indicator. Further, the method includes modifying one or more parameters within the contact center to improve the weighted sum of the KPIs when the weighted sum of the KPIs crosses beyond a threshold level. | 12-25-2014 |
20140379419 | METHOD AND SYSTEM FOR ADAPTIVE OUTBOUND CAMPAIGNS - A method and a system for adaptive outbound campaign are provided. The system includes a monitoring module for real-time monitoring of public sentiment to an outbound campaign. Further, the system includes an adaptive module communicably coupled to the monitoring module. The adaptive module further adapts one or more parameters corresponding to the outbound campaign based on the monitored public sentiment. | 12-25-2014 |
20140379890 | SYSTEM AND METHOD FOR OPTIMIZING AGENT LOGIN IN A CONTACT CENTER - An agent login optimization system for optimizing login of agents at communication managers of a contact center is provided. The agent login optimization system includes a monitoring module for monitoring predetermined activities at a plurality of communication managers in the contact center. The monitoring includes monitoring call traffic at the plurality of communication managers and monitoring login requests of agents. The agent login optimization system further includes a determination module configured to determine a suitable communication manager from the plurality of communication managers based upon the monitoring to login an agent. The agent login optimization system further includes an agent login module for logging the agent into the suitable communication manager. | 12-25-2014 |
20150030033 | REDIRECTING TRAFFIC VIA TUNNELS TO DISCOVERED DATA AGGREGATORS - In one embodiment, a data aggregator discovery (DAD) message may be distributed by an associated data aggregator, the DAD message identifying the initiating data aggregator, and comprising a recorded route taken from the data aggregator to a receiving particular node as well as a total path cost for the particular node to reach a root node of the DAG through the recorded route and via the data aggregator. The receiving particular node determines a path cost increase (PCI) associated with use of the data aggregator based on the total path cost as compared to a DAG-based path cost for the particular node to reach the root node via the DAG. If the PCI is below a configured threshold, the particular node may redirect traffic to the data aggregator as source-routed traffic according to the recorded route. The traffic may then be aggregated by the data aggregator, accordingly. | 01-29-2015 |
20150045082 | Interoperability and Communications System Dynamic Media Proxy Based on Capability Negotiation - A system and methodology to facilitate communication between non-compatible communication devices by utilization of a dynamic media proxy is provided. Information associated with an endpoint, such as, media capabilities, identity and system resource information is collected. Media proxy'ing is performed as part of capability negotiation. A dynamic media proxy is employed based on an analysis of the collected information. An analysis component can identify an endpoint that does not adhere to specific rules of transmission and can dynamically connect such an endpoint to a VTG (virtual talk group) via a proxy to prevent the endpoint from transmitting media into an active VTG that already has multiple talkers streaming media. Additionally, the location where media processing can occur can be dynamically determined based on the available system resources. | 02-12-2015 |
20150071418 | TECHNIQUES FOR TOPICAL CUSTOMER SERVICE MENU RECONFIGURATION BASED ON SOCIAL MEDIA - Techniques for topical customer service menu reconfiguration based on social media are claimed. In one embodiment, for example, an apparatus may comprise a social media gateway and an adjustment component. The social media gateway may be operative to receive social media information from one or more social media networks. The adjustment component may be operative to data mine the social media information to extract one or more characteristics, infer a trend from the extracted one or more characteristics, and adjust a customer service menu tree based upon the inferred trend. Other embodiments are described and claimed. | 03-12-2015 |