Patent application number | Description | Published |
20080204558 | SECURITY SYSTEM TRIGGERED BY HEART RATE DETECTION - A security system is provided for a facility ( | 08-28-2008 |
20080226039 | Emergency call service with automatic third party notification and/or bridging - A system for processing emergency calls in a telecommunications network includes: receiving a first call at a node ( | 09-18-2008 |
20080276126 | Methods and Apparatus for Measuring Performance in Processing System - Techniques are disclosed for measuring performance in processing systems such as communications systems and computing systems. For example, a method of measuring performance in a processing system having a plurality of processing devices includes the following steps. A measurement system coupled to the plurality of processing devices generates an interrupt signal. The measurement system applies the interrupt signal to a set of processing devices under test, wherein the set of processing devices under test is selected from the plurality of processing devices, such that each processing device of the set under test makes data available to the measurement system. The available data represents data associated with the execution of at least one function performed by each processing device of the set under test. The measurement system obtains the available data and utilizes at least a portion of the available data to determine a measure of performance associated with each of the processing devices of the set under test. | 11-06-2008 |
20080282134 | Methods and Apparatus for Detection of Performance Conditions in Processing System - Techniques are disclosed for detection of performance conditions in processing systems. For example, a method of detecting a performance condition in at least one particular processing device of a processing system having a plurality of processing devices includes the following steps. Data is input to a data structure associated with the particular processing device, over a given time period. The input data may be a buffer or a bucket. The input data represents data associated with the execution of at least one function performed by the particular processing device. The given time period includes the time period between consecutive heartbeat signals transmitted by the particular processing device. At least a portion of the input data is removed from the data structure associated with the particular processing device, near the end of the given time period. The removed input data is compared to an expected function execution level. An alarm signal is generated, when warranted, based on the comparison of the removed input data to the expected function execution level such that a performance condition in the particular processing device is determinable. | 11-13-2008 |
20090003552 | Personal message expiration - A method for eliminating expired personal messages routed over a telecommunications network includes: receiving a message from a message originator for an intended recipient; at least temporarily storing the message; determining when the message expires based upon an expiration parameter included with the message; and, deleting the stored message automatically after the message expires. | 01-01-2009 |
20090003617 | Noise cancellation for buildings and/or structures - A noise cancellation system for a building ( | 01-01-2009 |
20090054057 | Transmission power level regulation for high priority wireless calls - A method is provided for regulating transmission power levels for wireless calls. The method includes: determining whether or not a mobile station (MS) ( | 02-26-2009 |
20090273713 | DEVICE AND/OR METHOD FOR WARNING ALERT RECEPTION DURING POWER OUTAGE - An electrically powered device ( | 11-05-2009 |
20090285402 | Service induced privacy with synchronized noise insertion - A mechanism is disclosed for protecting the privacy of communication content by means of a synchronized noise insertion process operated by counterpart sending and receiving devices. In send mode, a synchronized noise pattern is introduced by a sending device onto a source content, rendering the source content unreadable (or at least partially obfuscating the source content so as to inhibit interception of the content); and in receive mode, a corresponding pattern is introduced 180-degrees out of phase so as to effectively subtract the synchronized noise pattern and yield the original source content. In such manner, communication privacy is achievable without encrypting, encoding or transforming the source content at the sending or receiving device. | 11-19-2009 |
20100009633 | SECURITY ENCRYPTION FOR WIRELESS PERIPHERALS - An apparatus is provided for securing data wirelessly transmitted between a wireless peripheral ( | 01-14-2010 |
20100009671 | AUTOMATIC DATA CAPTURE WHEN WIRELESS SERVICE DISRUPTION IS DETECTED - A method is provided in a wireless telecommunications network ( | 01-14-2010 |
20100061865 | SYSTEM AND/OR METHOD FOR MONITORING AND/OR CONTROLLING THE RELATIVE INTERNAL AIR PRESSURE OF A FACILITY - A system is provided for maintaining a balanced interior air pressure in a building ( | 03-11-2010 |
20100117828 | Alarm scheme with olfactory alerting component - An alarm system integrating the sense of smell (i.e., an olfactory component) as an alerting modality is described. The olfactory component is uniquely recognizable and distinguishable from traditional visual or audible alerting components and can be used to increase the number of separate alarms that a person can respond to and/or decrease the reaction time for responding to the alarms. | 05-13-2010 |
20100173588 | Method and apparatus for suppressing radio frequency interference from bluetooth wireless communication channels - A method and apparatus whereby RF (radio frequency) interference in a Bluetooth wireless communications link is suppressed using an enhancement to the Bluetooth protocol which operates to eliminate noise that is induced on the RF path by external electronic interference. The sampling rate at a Bluetooth transmitter is doubled, and samples are transmitted alternately with and without audio data (e.g., the microphone input data for a Bluetooth headset in transmit mode, or the speaker output data for a Bluetooth mobile phone in transmit mode) included therein. At the Bluetooth receiver, received samples which have been transmitted without audio data are subtracted from (i.e., inverted and digitally added to) corresponding ones of the received samples which have been transmitted with audio data, and the receiver then advantageously uses (only) the (modified) samples resultant therefrom, thereby removing the interference from the signal without reducing the effective sampling rate. | 07-08-2010 |
20100278314 | METHOD AND APPARATUS FOR DISSEMENATING INFORMATION RELATING TO A LOCAL EMERGENCY CONDITION - A method for disseminating information relating to a local emergency condition includes: a) receiving an incoming message from a user device directed to a destination device within a emergency response organization; b) determining if the incoming message can be connected to the destination device without wait time; and c) sending an outgoing message to the user device if the incoming message cannot be connected without wait time. The outgoing message may provide a status report for the local emergency condition within a geographic area served by the emergency response organization and a guidance report with a response measure. A network node associated with the method may include an incoming message module for receiving the incoming message, a message handling module for determining if the incoming message can be connected to the destination device without wait time, and an outgoing message module for sending the outgoing message to the user device. | 11-04-2010 |
20100278315 | METHOD AND APPARATUS FOR DISSEMENATING INFORMATION RELATING TO A LOCAL EMERGENCY CONDITION - A method for disseminating information relating to a local emergency condition includes providing a user device with access to an outgoing announcement via a network node in a communication network, the outgoing announcement accessible via a non-emergency network address for a destination device of an information service organization that provides information service relating to local emergency conditions for a geographic area, the outgoing announcement providing information for a local emergency condition within the geographic area; receiving an incoming call originated by the user device and directed to the non-emergency network address, the network node and the user device being located within the predetermined geographic area; connecting the incoming call to the destination device; and routing the outgoing announcement from the destination device to the user device through the network node. A network node associated with the method may include an input module, a handling module, and an output module. | 11-04-2010 |
20100303214 | ONE-WAY VOICE DETECTION VOICEMAIL - A telephone answering system includes a receiver, a detector and a transmitter. The receiver is configured to receive a voice signal. The detector is adapted to detect voice activity on the signal. The transmitter is adapted to transmit an initial prompt. In the event that the detector detects a gap in the voice activity after the initial prompt, transmitter is configured to transmit a notice. | 12-02-2010 |
20110074572 | Method and apparatus for the creation of an event-associated electronic device directory - A manner of creating an electronic device directory containing the identity of electronic devices that registered in an area associated with a plurality of events, which events are similar in certain respects. The directory is useful, for example, investigating criminal cases. When such an event occurs, an application server is notified and generates one or more device registration capture requests to determine which electronic devices are registered in the area and at approximately the same time at which the event occurs. The device registration capture associated with this event is compared with other device registration captures associated with other, similar events to create the electronic device directory. The electronic device directory entries are preferable filtered to select the devices most likely to be associated with the actual events in question. | 03-31-2011 |
20110075829 | METHOD AND APPARATUS FOR CONTROLLING A CONFERENCE BRIDGE - A method for controlling a conference bridge may include: a) establishing status information for a conference call and storing the status information in a storage device, the status information for maintaining a participant status for user devices; b) setting the status information to indicate user devices participating in the conference call are connected; c) transmitting a unique identifier to each user device via an in-band signal; d) receiving a line-on-hold signal and the corresponding unique identifier from at least one user device, the line-on-hold signal being an in-band signal; and e) updating the status information in response each line-on-hold signal received to indicate the corresponding user device has placed the conference call on hold. An apparatus for may include a storage device for storing the status information, a processor, a transmitting device for transmitting the unique identifier, and a receiving device for receiving the line-on-hold signal. | 03-31-2011 |
20110142207 | METHOD AND APPARATUS FOR NOTIFYING EMERGENCY RESPONSE ORGANIZATION OF EMERGENCY MESSAGE CLUSTER - A method for notifying an emergency response organization of an emergency message cluster may include: a) detecting emergency messages directed to a first emergency response organization during a time window; b) detecting an emergency message cluster to the first emergency response organization at least in part by determining a quantity of emergency messages detected during the first time window exceeds a threshold value; and c) sending a notification message to a second emergency response organization in response to detecting the emergency message cluster. A network node associated with the method may include a switching module for handling the emergency messages in normal fashion, a message detecting logic for detecting emergency messages to the first emergency response organization, a cluster detecting logic for detecting the emergency message cluster, and an output module for sending the notification message. | 06-16-2011 |
20110208974 | Countermeasure Against Keystroke Logger Devices - An anti-key logging protocol executable by a computer platform and a corresponding keystroke input device (e.g., keyboard or keypad) functions as a countermeasure to a key logger device. Following an authentication procedure, the computer platform sends encryption parameters to the keystroke input device, and the keystroke input device uses the encryption parameters to scramble or otherwise encrypt keystrokes entered on the keystroke input device before sending them to the computer platform. In such manner, keystrokes and/or keystroke representations sent from the keystroke input device to the computer platform are unrecognizable to a key logger device yet can be decoded by the computer platform. | 08-25-2011 |
20110213888 | METHOD AND APPARATUS FOR SCREENING REQUEST TO ESTABLISH SIP SESSION - A method and apparatus for screening a request to establish a SIP session is provided. The method may include a) receiving a request to establish a SIP session at a network node of an internet protocol network and incrementing a counter, b) determining whether the request includes a resource priority parameter with an elevated priority value and, if so, incrementing a counter, c) comparing a ratio of the priority request count to the total request count to a threshold, and d) processing each request that includes the elevated priority value using more comprehensive screening after the ratio exceeds the threshold, allowing processing for each request that includes the elevated priority value to continue in accordance with the elevated priority value after the ratio does not exceed the threshold, and allowing processing for each request that does not include the elevated priority value to continue in accordance with a routine priority. | 09-01-2011 |
20110228308 | METHOD AND APPARATUS FOR DETECTING A MISALIGNED PAGE - A capability is provided for detecting a misaligned page of a document. A method includes detecting that a page is misaligned and generating a control signal adapted for use in triggering presentation of an alarm indicating that the page is misaligned. A method includes detecting that a page is misaligned and initiating one or more control actions for the misaligned page. These and other methods may be performed on any suitable copy device, such as on a fax machine, a photocopy machine, a scanner, a photograph copying device, a user device, a network device, and the like, as well as devices having combinations of such functionality. | 09-22-2011 |
20110267192 | Individualized Baggage Tracking And Notification System - An individualized baggage tracking and notification system provides airline baggage tracking information to individual customers for purposes of customer convenience and/or theft avoidance. The individualized baggage tracking information may indicate, for each of one or more baggage items affiliated with the customer, indicia of one or more baggage handling nodes visited by the baggage items, indicia of recorded arrival times of the baggage items at the visited nodes, indicia of one or more baggage handling nodes not yet visited by the baggage items and indicia of projected arrival times of the baggage items at those nodes. In an instance where a customer baggage item has reached a terminating node (e.g., a baggage carousel), the system may indicate the arrival time of the baggage item at the terminating node; or in the instance the baggage item has not yet reached the terminating node, the system may indicate a projected arrival time of the baggage item at the terminating node. | 11-03-2011 |
20140143870 | METHOD AND SYSTEM FOR REDUCING CYBER ATTACKS - A system and method for reducing cyber attacks on vetted web sites includes a haven web site hosted on a server computer. A list of certified web sites meeting specified criteria is maintained by the haven web site. The certified list is accessible over a global computer network for query or download. A computer virus or the like, operating on a remote computer, runs software coding, available for download on the haven web site, that determines whether a proposed targeted address is on the certified list. If so, the attack by the remote computer is aborted, and if not, the attack proceeds. Alternatively, a certification marker is included on certified web sites, and the remote computer runs software coding, available for download on the haven web site, to determine whether a proposed targeted address corresponds to a certified web site. | 05-22-2014 |