Patent application number | Description | Published |
20130024444 | Topic Map for Navigation Control - Included are embodiments for providing a topic map. At least one embodiment of a method includes receiving a plurality of web pages, the web pages including metadata, extracting at least a portion of the metadata from the web pages, and creating at least one topic associated with the web pages, the at least one topic corresponding to at least a portion of the metadata. | 01-24-2013 |
20130030693 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 01-31-2013 |
20130035939 | System and Method for Discriminative Pronunciation Modeling for Voice Search - Disclosed herein is a method for speech recognition. The method includes receiving speech utterances, assigning a pronunciation weight to each unit of speech in the speech utterances, each respective pronunciation weight being normalized at a unit of speech level to sum to 1, for each received speech utterance, optimizing the pronunciation weight by identifying word and phone alignments and corresponding likelihood scores, and discriminatively adapting the pronunciation weight to minimize classification errors, and recognizing additional received speech utterances using the optimized pronunciation weights. A unit of speech can be a sentence, a word, a context-dependent phone, a context-independent phone, or a syllable. The method can further include discriminatively adapting pronunciation weights based on an objective function. The objective function can be maximum mutual information, maximum likelihood training, minimum classification error training, or other functions known to those of skill in the art. | 02-07-2013 |
20130040628 | CAPACITY MANAGEMENT OF AN ASYNCHRONOUS TRANSFER MODE INTERFACE IN A WIRELESS COMMUNICATION INFRASTRUCTURE - Methods and apparatus that effectively manage capacity of a wireless-based communication infrastructure are presented herein. An evaluation component can generate configuration data associated with a base station of a cellular wireless network. Further, a radio network controller component can determine capacity of a physical port coupled between a radio network controller and the base station. The radio network controller component can configure the radio network controller to utilize an increase in capacity of the physical port based on the determined capacity of the physical port. A base station component can configure the base station to utilize the increase in capacity of the physical port based on the configuration data generated by the evaluation component. | 02-14-2013 |
20130041660 | SYSTEM AND METHOD FOR TAGGING SIGNALS OF INTEREST IN TIME VARIANT DATA - Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for tagging a known signal of interest. Initially, the system classifies the data from an input signal using a short-term classifier, wherein there are at least two classifications available, a first classification of the data as having no identified outputs and a second classification of the data as at least one potential signal of interest, wherein the short-term classifier also bypasses data that is known to be of no interest. After the short-term classifier classifies the inputs, it collapses the input data that is classified as having no identified outputs. This allows the short-term classifier to create time-variant data. Finally, the system will tag a known signal of interest in the time-variant data that was classified as having at least one potential signal of interest. Therefore, a system for tagging a known signal of interest is described. | 02-14-2013 |
20130055343 | Methods, Devices, Systems, and Computer Program Products for Edge Driven Communications Network Security Monitoring - An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed. | 02-28-2013 |
20130065602 | DEVICES, METHODS, AND COMPUTER-READABLE MEDIA FOR PROVIDING BROAD QUALITY OF SERVICE OPTIMIZATION USING POLICY-BASED SELECTIVE QUALITY DEGRADATION - Devices, methods and computer-readable media for providing broad quality of service optimization using policy-based selective quality degradation. Data associated with a quality of service for customers and QoS policy rules are stored. Customers are grouped for potential degradation. Levels of degradation are defined for each type of user device. Degradation for the group of customers is optimized using policy rules. Degradation is adjusted to account for variations in user treatment within the group. The adjusted degradation is then implemented. | 03-14-2013 |
20130074175 | Methods, Systems, and Computer Program Products for Protecting Against IP Prefix Hijacking - A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS. | 03-21-2013 |
20130080786 | Signature Specification for Encrypted Packet Streams - Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents. | 03-28-2013 |
20130086617 | Personal Multi-Device Nomadic Media - Providing personal multi-device nomadic media is described herein. In different aspects, the techniques may include providing content to a user on a first device and suspending the delivery of the content on the first device. The user may register on a second device and resume delivery of the suspended content on the second device. | 04-04-2013 |
20130089191 | METHODS, SYSTEMS, AND DEVICES FOR PROVIDING VOICE-CALL SERVICES RESPONSIVE TO A DIALED SEQUENCE - A connection is established in a communications network responsive to receiving a Dual Tone Multi-Frequency (DTMF) signal at a port having an assigned sequence associated therewith. A dialed sequence corresponding to the received DTMF signal is identified. If the dialed sequence is associated with a request for a specified service, first and second fields of a packet-switched signaling protocol message are populated with the assigned sequence associated with the port. The populated packet-switched signaling protocol message is transmitted over a packet-switched network to request the specified service, and a connection is established to provide the specified service through the port. Related systems and devices are also discussed. | 04-11-2013 |
20130091173 | Methods, Systems, and Computer Program Products for Providing a Generic Database Security Application Using Virtual Private Database Functionality with a Common Security Policy Function - Methods for providing a generic database security application using virtual private database (VPD) functionality are provided. The methods may include inserting rows into a user security table in a database providing VPD functionality, each row comprising a user ID for which database access is to be controlled, the name of a database object to be secured, and a predicate; and defining a security policy function common to all secured database objects, said security policy function generating a second predicate to be appended by the database's VPD functionality to queries made on a queried secured database object by a querying user, said second predicate based on at least one predicate in at least one row in the user security table, the at least one row referencing the name of the queried secured database object and the user ID of the querying user. Related systems and computer program products are also provided. | 04-11-2013 |
20130091370 | Controlling Power States of a Peripheral Device in Response to User Proximity - In a method of controlling the power state of a peripheral device, the peripheral is changed from a first power state to a second power state in response to communications across a network connected to the peripheral indicating that a user is proximately located to the peripheral. A user may be determined to be proximately located to the peripheral by monitoring communications across the network to detect traffic that is associated with a user logging onto a computer that can utilize the peripheral, by discovering a wireless terminal that is associated with a user and which is proximately located to the peripheral, by receiving information from a cellular communication network across the network that indicates that a user of the peripheral is proximately located to the peripheral, and/or in response to a time of day and/or day of week/month schedule. | 04-11-2013 |
20130094634 | Method, System and Software for Implementing an Automated Call Routing Application in a Speech Enabled Call Center Environment - A system, method and software for implementing an automated call routing application in a speech enabled call center environment are provided. In operation, the invention provides for the identification of a call center transaction selection from a natural language user utterance and the invocation of one or more scripts operable to route the user to a call center service agent configured to service the selected transaction. In the event a transaction selection cannot be readily identified or can only be partially identified, the invention provides for the initiation of a dialog module or script directed to eliciting a discernable transaction selection and/or the presentation of one or more menus from which the user may select an available call center transaction. | 04-18-2013 |
20130097677 | Systems, Methods and Computer Program Products Supporting Provision of Web Services Using IMS - A web service request from a device is received at a web service provider. The web service request is authenticated at the web service provider using the IMS network. A requested web service is provided to the device responsive to the authentication of the web service request. The web service request may be received via a path outside of the IMS network, e.g., over a network using HTTP or other non-IMS protocol. The requested web service may also be provided using a web service response communicated to the device via a path outside of the IMS network. | 04-18-2013 |
20130135107 | Interaction Analyzer - A method of analyzing participant activity includes providing an identification unit to a participant, receiving signals from the identification unit, determining location of the participant based on the received signals, storing the location information and the associated timestamp and analyzing the stored information. | 05-30-2013 |
20130138522 | METHOD FOR AUTOMATING ONBOARDING OF USER GENERATED RINGBACK TONES TO SALES DISTRIBUTION CHANNEL - A method for automating an onboarding process for a developer onto a service delivery hub operated by a network operator includes providing the developer with information relating to use of the service delivery hub, receiving data relating to the developer, approving the developer, certifying an application provided by the developer, and configuring the application for use. A method for synchronization with the service delivery hub is also provided. | 05-30-2013 |
20130142194 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING INTRA-CARRIER IP-BASED CONNECTIONS USING A COMMON TELEPHONE NUMBER MAPPING ARCHITECTURE - Internet protocol (IP) based calls from a first terminal in an IP based communications system are routed to a second terminal in another communications system. In response to a call setup request at a common communications core that is common to both the IP based communications system and the other communications system, a query is transmitted to a private telephone number mapping database that contains routing information for terminals in both the IP based communications system and the other communications system requesting routing information for the second terminal. Routing information for the call setup request is received from the private telephone number mapping database for routing the call. | 06-06-2013 |
20130149687 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR INTERACTIVE PRESENTATION OF EDUCATIONAL CONTENT AND RELATED DEVICES - A method of presenting educational content to a plurality of students in a classroom includes displaying the educational content on an instructor terminal in the classroom. A synchronization command is wirelessly transmitted to a plurality of portable student terminals in the classroom according to a localized wireless connection protocol. The synchronization command is configured to display, on the plurality of portable student terminals, the educational content that is displayed on the instructor terminal. The plurality of portable student terminals may be respectively associated with ones of the plurality of students who are registered for an academic course associated with the educational content. An ad hoc wireless data connection may also be selectively established with at least one of the plurality of portable student terminals in the classroom. Related systems, devices, and computer program products are also discussed. | 06-13-2013 |
20130151202 | COLLABORATIVE INCIDENT MEDIA RECORDING SYSTEM - Methods for responding to a potential incident are provided in which data about the potential incident is received from a first remote sensing unit. Additional remote sensing units are identified that may have additional data about the potential incident, and additional data about the potential incident is received from at least some of these additional remote sensing units. The totality of the received data is then analyzed, and at least one remote entity is automatically notified regarding the occurrence of the potential incident. | 06-13-2013 |
20130151232 | SYSTEM AND METHOD FOR ENRICHING SPOKEN LANGUAGE TRANSLATION WITH DIALOG ACTS - Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for enriching spoken language translation with dialog acts. The method includes receiving a source speech signal, tagging dialog acts associated with the received source speech signal using a classification model, dialog acts being domain independent descriptions of an intended action a speaker carries out by uttering the source speech signal, producing an enriched hypothesis of the source speech signal incorporating the dialog act tags, and outputting a natural language response of the enriched hypothesis in a target language. Tags can be grouped into sets such as statement, acknowledgement, abandoned, agreement, question, appreciation, and other. The step of producing an enriched translation of the source speech signal uses a dialog act specific translation model containing a phrase translation table. | 06-13-2013 |
20130151252 | SYSTEM AND METHOD FOR STANDARDIZED SPEECH RECOGNITION - Disclosed herein are systems, methods, and computer-readable storage media for selecting a speech recognition model in a standardized speech recognition infrastructure. The system receives speech from a user, and if a user-specific supervised speech model associated with the user is available, retrieves the supervised speech model. If the user-specific supervised speech model is unavailable and if an unsupervised speech model is available, the system retrieves the unsupervised speech model. If the user-specific supervised speech model and the unsupervised speech model are unavailable, the system retrieves a generic speech model associated with the user. Next the system recognizes the received speech from the user with the retrieved model. In one embodiment, the system trains a speech recognition model in a standardized speech recognition infrastructure. In another embodiment, the system handshakes with a remote application in a standardized speech recognition infrastructure. | 06-13-2013 |
20130160118 | Methods, Communication Networks, and Computer Program Products for Monitoring, Examining, and/or Blocking Traffic Associated with a Network Element Based on Whether the Network Element Can be Trusted - A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element. | 06-20-2013 |
20130160123 | Methods, Systems, and Computer Program Products for Mitigating Email Address Harvest Attacks by Positively Acknowledging Email to Invalid Email Addresses - A method of detecting and responding to an email address harvest attack at an Internet Service Provider (ISP) email system includes counting a number of failed email address look-ups during a single Simple Mail Transfer Protocol (SMTP) session associated with an originating Internet Protocol (IP) address and responding to the originating IP address with a positive acknowledgement that an otherwise invalid email address exists when the count of the number of failed email address look-ups exceeds a threshold. | 06-20-2013 |
20130167197 | Methods, Systems, and Computer Program Products for Invoking Trust-Controlled Services Via Application Programming Interfaces (APIs) Respectively Associated Therewith - A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function. | 06-27-2013 |
20130170678 | METHODS AND SYSTEMS FOR SYNTHETIC AUDIO PLACEMENT - Methods and systems for providing synthetic audio placement are described herein. In different aspects, the methods and systems may include a connection port to receive a plurality of remote audio signals included in a conference call, at least one of the plurality of remote audio connections being a single channel audio signal, a processor configured with the connection port to provide a sound field for placing the plurality of audio signals, the sound field providing synthetic audio placement of each of the plurality of remote audio signals, and a rendering output configured with the processor to project the plurality of remote audio within the sound field to a listener. | 07-04-2013 |
20130182702 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING INTER-CARRIER IP-BASED CONNECTIONS USING A COMMON TELEPHONE NUMBER MAPPING ARCHITECTURE - A system includes a network entry point configured to receive and process internet protocol (IP) based connection requests originating from outside the communications network, and a telephone number mapping (ENUM) database configured to store a uniform resource identifier (URI) of the network entry point and to respond to a request for routing information for a subscriber terminal within the communications network received from a remote entity outside the communications network by providing a naming authority pointer resource (NAPTR) record including the URI of the network entry point to the remote entity in response to the request for routing information. | 07-18-2013 |
20130185713 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING SOFTWARE APPLICATION INSTALLATIONS - Methods, systems, and computer program products that automatically control the installation of software applications on a device are provided. The installation of a software application on a device is detected. The installation is temporarily halted and information about the detected software application installation is collected. A danger level of the detected software application is assessed based upon the collected information. Installation of the detected software application is allowed to continue if the assessed danger level is below a threshold level and installation of the detected software application is terminated if the assessed danger level is above the threshold level. | 07-18-2013 |