Patent application number | Description | Published |
20080279343 | TELEPHONE WITH EMERGENCY LIGHTING FEATURE - A telephone of the corded or portable type includes a light source. The light source may or may not have an ability to be pivoted or swiveled to illuminate a desired portion of a room. In the case of a corded telephone, the light source may be detachable from the telephone. The light source may be automatically activated to provide emergency illumination when a power failure condition exists in a building. The light source may also be manually activated to provide a convenient illumination source for the user. | 11-13-2008 |
20090003539 | Methods and Apparatus for Defending Against Telephone-Based Robotic Attacks Using Random Personal Codes - Methods and apparatus are provided for defending against telephone-based robotic attacks. An interactive voice response method is disclosed, comprising the steps of obtaining a script to present to a caller, the script including at least one menu option having at least one personal code; generating a random number for the personal code; and presenting the at least one menu option with the generated random number to the caller. The step of generating a random number for the personal code is optionally responsive to receipt of the call. The method is optionally performed only if one or more predefined criteria defining an attack are satisfied. The disclosed IVR system can optionally monitor the caller response to determine whether the caller enters the generated random number. | 01-01-2009 |
20090003548 | Methods and Apparatus for Defending Against Telephone-Based Robotic Attacks Using Contextual-Based Degradation - Methods and apparatus are provided fox defending against telephone-based robotic attacks. An interactive voice response method is provided for presenting a menu having one or more menu options to a caller associated with a call. The method comprises the steps of obtaining a script to present to the caller, the script including the one or more menu options; combining at least one of the one or more menu options with a background audio signal, wherein the background audio signal is selected based on a context of the call; and presenting the combination of the at least one of the one or mole menu options and the background audio signal to the caller. The context of the call includes comprises one or more of an identity of a called party associated with the call and a time period of the call. The background audio signal can optionally be obtained from a library of background signals. | 01-01-2009 |
20090003549 | Methods and Apparatus for Defending Against Telephone-Based Robotic Attacks Using Permutation of an IVR Menu - Methods and apparatus are provided for defending against telephone-based robotic attacks An interactive voice response method is provided for presenting a menu having one or more menu options to a caller. The method comprises the steps of obtaining a script to present to the caller, the script including the one or more menu options; permuting one or more characteristics of at least one of the one or more menu options; and presenting the permuted menu to the caller. The permutation may comprise, for example, adding one or more additional menu options to the menu; varying a selection number associated with the at least one menu option; varying an order of at least a plurality of the menu options; or varying a wording or pronunciation of one or more menu options. | 01-01-2009 |
20110289482 | PERFORMANCE DETECTION AND DEBUGGING OF APPLICATIONS - The system and method establish a baseline of a parameter of an application. The parameter can be based on time spent in a function, out of range variables, memory allocations, memory de-allocations, page faults, time spent in a section of code, time spent in a line of code, and the like. The baseline is done while the application is operating. A threshold for the parameter is generated by the system and/or defined by a user. The system then breaks into a debugger and/or stores state information when the threshold is met. | 11-24-2011 |
20140169534 | METHOD, APPARATUS, AND SYSTEM FOR PROVIDING REAL-TIME PSAP CALL ANALYSIS - Methods, apparatus, and systems are provided such that a Public Safety Answering Point (PSAP) may utilize a new model to handle Open Line emergency calls, including audio optimization, automation, analysis, and presentation. Embodiments of the present disclosure assist with the difficult task of identifying background noise while trying to listen and talk to a caller, and give the best possible audio from the caller to the emergency call-taker or dispatcher. More particularly, an audio stream is split into at least two instances, with a first instance being optimized for speech intelligibility and provided to a call-taker or dispatcher and a second instance being provided for background sound analysis. Accordingly, the new PSAP Open Line model may allow for significantly more efficient emergency assessment, location, and management of resources. | 06-19-2014 |
20140270144 | PUBLIC SAFETY ANSWERING POINT LANGUAGE DETECTION - A Public Safety Answering Point (PSAP) is disclosed. The PSAP is configured to enable the detection of language preferences, capabilities, or inabilities and, based on such detection, assist the PSAP agent in assisting the PSAP caller. The PSAP may additionally or alternatively utilize the detection of language information to assist in the decision to route or re-route the PSAP caller to appropriate PSAP resources. | 09-18-2014 |
20140314212 | PROVIDING ADVISORY INFORMATION ASSOCIATED WITH DETECTED AUDITORY AND VISUAL SIGNS IN A PSAP ENVIRONMENT - A Public Safety Answering Point (PSAP) is configured to enable the detection of one or more clinical signs associated with a caller. The clinical signs may include both auditory and visual clinical signs and may be detected by analyzing a portion of the call information to determine one or more characteristics associated with the call information and comparing the one or more determined characteristics to known clinical sign characteristics. The PSAP may additionally or alternatively utilize the detection of the clinical signs to assist and/or provide an advisory recommendation in the decision of which, if any first responder resources should be dispatched; the recommendation may include which resources and at what priority the resources should be dispatched. | 10-23-2014 |
20140357215 | METHOD AND APPARATUS TO ALLOW A PSAP TO DERIVE USEFUL INFORMATION FROM ACCELEROMETER DATA TRANSMITTED BY A CALLER'S DEVICE - A Public Safety Answering Point (PSAP) is configured to receive a description of detected movement associated with one or more inertial sensors of a communication device. The description of the detected movement may then be analyzed to determine a likelihood of injury associated with the movement, whether or not the user associated with the communication device is experiencing abnormal neuromuscular activity, and/or whether the user is outside a range of the communication device such that the user is unlikely to hear audio information originating from the communication device. The PSAP may additionally or alternatively utilize the description of the movement information to assist and/or provide an advisory recommendation in the decision of which, if any first responder resources should be dispatched; the recommendation may include which resources and at what priority the resources should be dispatched. | 12-04-2014 |
20140358874 | COMPRESSION SYSTEM AND METHOD - A plurality of lines of data from a file are stored in a cache. The lines of data typically come from a file that is being compressed. The process gets an additional line of data to compress. Based on a compression level, the additional line of data is compared with the lines of data in the cache to determine if there is a best matched line of data from the plurality of lines in the cache. In response to determining the best matched line of data, the additional line of data is compressed with a first compression algorithm based on the best matched line of data to create a compressed line. The compressed line is written to the file. In response to not determining the best matched line of data, the additional line of data is written to the file. The additional line of data is stored in the cache. | 12-04-2014 |
20150180791 | ADAPTIVE MODIFICATION OF CLASS OF SERVICE FOR SUPPORTING BANDWIDTH OVER-ALLOCATION - Disclosed is a system and method for adaptive modification of class of service (DSCP) for supporting bandwidth over-allocation. | 06-25-2015 |
Patent application number | Description | Published |
20120163576 | SYSTEM AND METHOD FOR CHANGING CONFERENCE MODERATORS DURING A CONFERENCE CALL - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for changing moderators during a e-conference. To change moderators during an e-conference, a system identifies a departure of the original moderator from the e-conference. A moderator can indicate his intention to leave an e-conference through the conferencing system. A participant to replace the original moderator is identified and subsequently promoted to replacement moderator while maintaining the e-conference. Additionally, changing moderators during an e-conference is accomplished by creating a new conference bridge and transferring each participant to the new conference bridge. This method allows for a seamless transfer between moderators during an e-conference without the inconvenience of reconnecting. | 06-28-2012 |
20120166242 | SYSTEM AND METHOD FOR SCHEDULING AN E-CONFERENCE FOR PARTICIPANTS WITH PARTIAL AVAILABILITY - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for scheduling an e-conference for participants with partial availability. Initially, a system identifies a group of participants for the e-conference. The system receives a declaration of availability for the e-conference from at least one participant of the group. The declaration contains the partial availability of the participant based on time restrictions and topics of interest to the participant. Next, a schedule is determined for the e-conference based on the availability of the participants. Finally, the declarations of availability are displayed to the group of participants. In one aspect, participants update their declarations of availability during the e-conference and a schedule is updated to reflect the new declaration of availability. | 06-28-2012 |
20120166534 | SYSTEM AND METHOD FOR GROUPING CONFERENCE PARTICIPANTS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for grouping e-conference participants. A system identifies participants for an e-conference and identifies groups based on e-conference participant characteristics. Participant characteristics such as job function, skill set, department, business unit or physical location are used to group participants. Each of the e-conference participants is associated with at least one group and the system visually displays participants in groups through an e-conference user interface. Additionally, the system retrieves a stored list of e-conference participants and groups from a previous e-conference and restores the list of participants and groups for a current e-conference. | 06-28-2012 |
20130063543 | SYSTEM AND METHOD FOR VIRTUAL CALL HOLD - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for accomplishing a virtual call on hold. A client communication device, such as a telephone, smartphone, or computer, receives a notification of a communication session to which the user is invited, and establishes a relationship with the communication session. Alternatively, a server associated with the communication session can establish the relationship with the client communication device. Then, the communication device can present an indication of the relationship with the communication session for a duration of the communication session, such that the user can join the communication session at will via a communication channel, and such that the communication channel is not occupied by the communication session unless or until the user joins the communication session. The communication session can be a conference call, video conference, a multi-modal chat wherein multiple users communicate via different modalities. | 03-14-2013 |
20130066978 | SYSTEM AND METHOD FOR A COMMUNICATION SESSION IDENTIFIER - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for a communication session identifier. A communication session identifier can act as a virtual relay between conference participants, forwarding emails, phone calls, attachments, messages, and other information from a central address associated with the communications session identifier. In this manner, a user who desires to communicate with other conference participants only needs to send the communication to the communication session identifier, which in turn distributes the communication to the other parties. These communications can include emails, social networking messages, instant messaging, voice messages, and other forms of communication. | 03-14-2013 |
20130181834 | SYSTEM AND METHOD FOR TRACKING IN MULTI-STORY BUILDINGS - System and method to locate a person in a multi-level building, including: a portable transmitter coupled to the person, the portable transmitter configured to transmit a signal comprising an identification code; a plurality of receivers located in a multi-level building to receive the signal, substantially each receiver producing a received signal, wherein at least a first receiver is located on a first level and at least a second receiver is located on a second level, wherein the second level is different than the first level; a signal strength estimator coupled to at least one receiver, the signal strength estimator configured to produce a signal strength estimation of the received signal received by the at least one receiver; and a processor configured to receive the signal strength estimations, and from the signal strength estimations calculate a level of the multi-level building on which the person is located. | 07-18-2013 |
20130254279 | SYSTEM AND METHOD FOR CONCURRENT ELECTRONIC CONFERENCES - Method for scheduling and implementing an electronic meeting conducted among remotely-located users communicating with an agenda server, including: accepting a meeting agenda that includes a plurality of topics, a quorum, an identification of resources used by each topic, an identification of data used by each topic, and an identification of data produced by each topic; partitioning the meeting agenda into at least a first and second group of topics; searching for data dependencies between the first and second groups of topics; searching for resource dependencies between the first and second groups of topics; if data dependencies or resource dependencies are found between the first and second groups of topics, then repartitioning the meeting agenda until the data dependencies and resource dependencies between the first and second groups of topics are reduced below a predetermined dependency threshold; and concurrently scheduling and executing the first and second groups of topics. | 09-26-2013 |
20130329863 | SYSTEM AND METHOD TO USE ENTERPRISE COMMUNICATION SYSTEMS TO MEASURE AND CONTROL WORKPLACE NOISE - System and method are disclosed to mitigate noise in an area monitored by a plurality of telecommunication terminals in communication with a controller, the method including: detecting an excessive noise originating in the area monitored by the plurality of telecommunication terminals, the detection performed by one or more terminals of the plurality of telecommunication terminals; identifying a location of a first terminal of the plurality of telecommunication terminals by use of the detected excessive noise, wherein the first terminal is closest to a source of the excessive noise; and providing a mitigation message to the identified first terminal. | 12-12-2013 |
20140003450 | SYSTEM AND METHOD FOR AGGRESSIVE DOWNSTREAM BANDWIDTH CONSERVATION BASED ON USER INACTIVITY | 01-02-2014 |
20140050104 | SYSTEM AND METHOD FOR OBVIATING A MEET-ME CONFERENCE HUB - System and method to obviate a conferencing hub, in one embodiment the method including: subscribing to a meet-me conference call that comprises a plurality of endpoints; monitoring for a triggering condition related to the meet-me conference call; and if the triggering condition is triggered then, for each endpoint of the conference call, redirecting a media stream produced by the endpoint from the conferencing hub to another endpoint. In another embodiment, the method includes: receiving a call from a first endpoint to join a new meet-me conference; waiting a predetermined waiting-time; if no other endpoints have joined the meet-me conference during the waiting-time, disconnecting the first endpoint from the meet-me conference in order to obviate the meet-me conference hub; receiving a call from a second endpoint to join the meet-me conference; calling back the first endpoint; and bridging together the first endpoint and the second endpoint to reassemble the meet-me conference. | 02-20-2014 |
Patent application number | Description | Published |
20090037985 | Automated Peer Authentication - An apparatus and methods are disclosed for performing peer authentication without the assistance of a human “guard.” In accordance with the illustrative embodiments, a peer is selected from a non-empty set of candidates at authentication time based on one or more of the following dynamic properties: the current geo-location of the user to be authenticated; the current geo-locations of the candidates; the current time; the contents of one or more directories (e.g., a telephone directory, an organizational chart or directory, etc.), the contents of one or more call logs; and the candidates' schedules. | 02-05-2009 |
20090086940 | Facilities Management System - A technique is disclosed that enables the managing of environmental conditions within an enterprise workplace and, in doing so, provides an improvement in facilities cost management over some techniques in the prior art. A data-processing system such as a private-branch exchange monitors the workplace by using one or more telephones, or other “telecommunications endpoints” to which the exchange is connected, in the workplace area. The exchange determines whether people are present in the workplace area by monitoring which endpoints are in use. Additionally, the exchange monitors the sounds that are received by the microphones of the endpoints. Based on knowing which endpoints are in use, the exchange generates control signals for the purpose of controlling one or more environmental conditions such as temperature, lighting, and so forth. In some embodiments of the present invention, the exchange examines the audio content of the received signals and bases the control signals on the audio content analyzed. | 04-02-2009 |
20090131015 | Determining Authentication Challenge Timing and Type - An apparatus and methods are disclosed for authenticating users of wireless telecommunications terminals. In particular, the present invention enables the timing and type of authentication challenges to vary based on one or more of: the user's current geo-location, the current day and time, the presence or absence of other nearby users, and the identity of any nearby users. In accordance with the illustrative embodiment, the re-authentication time period (i.e., the length of time between authenticating and re authenticating a user) and the authentication challenge type (e.g., username/password, fingerprint recognition, etc.) can be determined based on these factors. The present invention is advantageous in that it enables the shortening of the re-authentication time and the selection of a more secure type of authentication challenge when it is more likely that a user's wireless telecommunications terminal might be accidentally left behind or stolen. | 05-21-2009 |
20090133106 | Authentication Frequency And Challenge Type Based On Environmental And Physiological Properties - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.). | 05-21-2009 |
20090133117 | Authentication Frequency And Challenge Type Based On Application Usage - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage. | 05-21-2009 |
20100064345 | Continual Peer Authentication - A method for orchestrating peer authentication during a call (e.g., a telephone call, a conference call between three or more parties, an instant messaging [IM] chat session, etc.) is disclosed. In particular, a user is first authenticated in order to participate in a call (e.g., via entering a password, etc.), and subsequently during the call the user may be peer authenticated. In accordance with the illustrative embodiment, a user who participates in a call might be prompted to authenticate another user on the call based on particular events or user behavior during the call. | 03-11-2010 |
20110078383 | Cache Management for Increasing Performance of High-Availability Multi-Core Systems - An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance. | 03-31-2011 |
20110225586 | Intelligent Transaction Merging - An apparatus and methods are disclosed for intelligently determining when to merge transactions to backup storage. In particular, in accordance with the illustrative embodiment, queued transactions may be merged based on a variety of criteria, including, but not limited to, one or more of the following: the number of queued transactions; the rate of growth of the number of queued transactions; the calendrical time; estimates of the time required to execute the individual transactions; a measure of importance of the individual transactions; the transaction types of the individual transactions; a measure of importance of one or more data updated by the individual transactions; a measure of availability of one or more resources; a current estimate of the time penalty associated with shadowing a page of memory; and the probability of rollback for the individual transactions, and for the merged transaction. | 09-15-2011 |
20120201255 | METHOD AND SYSTEM FOR COMMUNICATION SESSION BANDWIDTH CONTROL BASED ON ACTUAL BANDWIDTH USAGE - A method and system for allocating bandwidth among communication sessions are disclosed. In one embodiment, a method includes performing a first allocation to a first communication session and performing a second allocation to a second communication session. The method includes performing a reallocation of bandwidth from the first communication session to the second communication session based on a predetermined criteria. | 08-09-2012 |
20130103910 | CACHE MANAGEMENT FOR INCREASING PERFORMANCE OF HIGH-AVAILABILITY MULTI-CORE SYSTEMS - An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance. | 04-25-2013 |
20140028789 | TIME SHIFTING IN TELECONFERENCES CONDUCTED WITHIN VIRTUAL WORLDS - System and method to provide an immersive virtual world conference environment, the method including: establishing a live virtual world conference, by use of a virtual world server; recording, in a memory coupled to the virtual world server, events related to live participants in the live virtual world conference, wherein the live participants are communicatively coupled to the virtual world server; receiving a request from a first virtual user to experience the virtual world conference at a predetermined virtual time that is different than a present real time; retrieving from the memory events related to live participants that occurred no later than the predetermined virtual time; restoring a conference state based upon the retrieved events; and providing an interaction responsive to the conference state and the first virtual user, in order to produce the immersive virtual world conference state. | 01-30-2014 |
20140092202 | MITIGATING PEAK TRAFFIC TIMES IN A MULTIMEDIA CONFERENCE - The present invention is directed to mitigating peak traffic in a multimedia conference. In one aspect, one or more requests for starting a first type of conference over the network are received. Thereafter, a second type of conference is started based on predefined parameters, wherein the second type of conference consumes lower bandwidth than the first type of conference. | 04-03-2014 |
20140253671 | SYSTEMS AND METHODS TO DUPLICATE AUDIO AND VISUAL VIEWS IN A CONFERENCING SYSTEM - A conferencing system includes an authentication module for establishing a communication session. The communication session includes a communication interface to a plurality of participants. The conferencing system further includes a selection module for letting a participant select a leader among the plurality of participants. The conferencing system further includes a duplication module configured to provide audio and visual views of the communication session to the participant based upon audio and visual views of the communication session associated with the leader. The conferencing system further includes a recording module for storing a history of actions made by the leader in the conferencing system and letting the participant view the history of actions made by the leader and reach a present state of audio and visual views of the communication session associated with the leader. | 09-11-2014 |
20150178486 | Authentication Frequency and Challenge Type Based on Environmental and Physiological Properties - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.). | 06-25-2015 |
20150230086 | Authentication Based on Geo-Location History - Methods and apparatus are disclosed for authenticating a user based on the geo-location history of a geo-location-enabled wireless device (e.g., a GPS-enabled wireless telecommunications terminal, a smart card, an RFID tag, etc.). In a first illustrative embodiment, a user of a geo-location-enabled wireless telecommunications terminal (e.g., a GPS-enabled cell phone, a GPS-enabled notebook computer, etc.) who attempts to access a restricted resource is challenged with one or more questions that are generated from the terminal's geo-location history. In a second illustrative embodiment, a user of a data-processing system who attempts to access a restricted resource is asked to provide a username Z. The user is then challenged with one or more questions that are generated from the geo-location history of a wireless device that is associated with username Z (e.g., a cell phone that belongs to the user whose username is Z, etc.). | 08-13-2015 |