Patent application number | Description | Published |
20080204558 | SECURITY SYSTEM TRIGGERED BY HEART RATE DETECTION - A security system is provided for a facility ( | 08-28-2008 |
20080226039 | Emergency call service with automatic third party notification and/or bridging - A system for processing emergency calls in a telecommunications network includes: receiving a first call at a node ( | 09-18-2008 |
20090003552 | Personal message expiration - A method for eliminating expired personal messages routed over a telecommunications network includes: receiving a message from a message originator for an intended recipient; at least temporarily storing the message; determining when the message expires based upon an expiration parameter included with the message; and, deleting the stored message automatically after the message expires. | 01-01-2009 |
20090003617 | Noise cancellation for buildings and/or structures - A noise cancellation system for a building ( | 01-01-2009 |
20090004907 | Connector converters for portable electronic device power adapters - A system is provided for selectively connecting a plurality of diverse power adapters ( | 01-01-2009 |
20090054057 | Transmission power level regulation for high priority wireless calls - A method is provided for regulating transmission power levels for wireless calls. The method includes: determining whether or not a mobile station (MS) ( | 02-26-2009 |
20090122701 | Dynamic throttling of priority service calls - A method of throttling priority service traffic in a telecommunications network is disclosed. The method includes: monitoring a rate at which priority service requests are received at a node of the network; comparing the rate to a threshold; disabling a gapping function for priority service traffic when the rate is less than the threshold; enabling the gapping function for priority service traffic when the rate is not less than the threshold, and, dynamically regulating a parameter of the gapping function when the gapping function is enabled. | 05-14-2009 |
20090262906 | TELECOMMUNICATION RELAY SERVICE ASSISTANCE FOR INCOMING CALLS - A method is provided in a telecommunications network for clandestinely providing a transmission relay service (TRS) to a called party ( | 10-22-2009 |
20090273713 | DEVICE AND/OR METHOD FOR WARNING ALERT RECEPTION DURING POWER OUTAGE - An electrically powered device ( | 11-05-2009 |
20100009633 | SECURITY ENCRYPTION FOR WIRELESS PERIPHERALS - An apparatus is provided for securing data wirelessly transmitted between a wireless peripheral ( | 01-14-2010 |
20100009671 | AUTOMATIC DATA CAPTURE WHEN WIRELESS SERVICE DISRUPTION IS DETECTED - A method is provided in a wireless telecommunications network ( | 01-14-2010 |
20100061865 | SYSTEM AND/OR METHOD FOR MONITORING AND/OR CONTROLLING THE RELATIVE INTERNAL AIR PRESSURE OF A FACILITY - A system is provided for maintaining a balanced interior air pressure in a building ( | 03-11-2010 |
20100124878 | METHOD AND APPARATUS FOR BROADCAST MESSAGE DISCRIMINATION - A method for broadcast message discrimination may include: a) forming a first version of a broadcast message with first encoding associated with a first recipient group and a second version of the broadcast message with second encoding associated with a second recipient group, b) transmitting the first and second versions of the broadcast message over a coverage area, c) receiving the first and second versions of the broadcast message at a first receiving device selectively associated with the first recipient group and at a second receiving device selectively associated with the second recipient group, and d) delivering the first version of the broadcast message via the first receiving device and the second version of the broadcast message via the second receiving device. A communication system for broadcast message discrimination may include a communication network, a first receiving device, and a second receiving device. | 05-20-2010 |
20100197226 | Mobile Station Having Wireless Communication and Radio Frequency Tag Detection Capability - An exemplary mobile station has a transceiver portion configured to communicate over an uplink and a downlink. A detector portion is configured to detect a radio frequency tag. An exemplary method of using a mobile station includes selectively conducting wireless communications over an uplink and a downlink. The mobile station is also selectively used to detect at least one radio frequency tag. | 08-05-2010 |
20100278314 | METHOD AND APPARATUS FOR DISSEMENATING INFORMATION RELATING TO A LOCAL EMERGENCY CONDITION - A method for disseminating information relating to a local emergency condition includes: a) receiving an incoming message from a user device directed to a destination device within a emergency response organization; b) determining if the incoming message can be connected to the destination device without wait time; and c) sending an outgoing message to the user device if the incoming message cannot be connected without wait time. The outgoing message may provide a status report for the local emergency condition within a geographic area served by the emergency response organization and a guidance report with a response measure. A network node associated with the method may include an incoming message module for receiving the incoming message, a message handling module for determining if the incoming message can be connected to the destination device without wait time, and an outgoing message module for sending the outgoing message to the user device. | 11-04-2010 |
20100278315 | METHOD AND APPARATUS FOR DISSEMENATING INFORMATION RELATING TO A LOCAL EMERGENCY CONDITION - A method for disseminating information relating to a local emergency condition includes providing a user device with access to an outgoing announcement via a network node in a communication network, the outgoing announcement accessible via a non-emergency network address for a destination device of an information service organization that provides information service relating to local emergency conditions for a geographic area, the outgoing announcement providing information for a local emergency condition within the geographic area; receiving an incoming call originated by the user device and directed to the non-emergency network address, the network node and the user device being located within the predetermined geographic area; connecting the incoming call to the destination device; and routing the outgoing announcement from the destination device to the user device through the network node. A network node associated with the method may include an input module, a handling module, and an output module. | 11-04-2010 |
20100302067 | Dynamic parking place location system - A dynamic parking place location service is disclosed that can assist end users navigating a congested area to find available parking spaces near their location on-demand. An end user initiates a parking information request by contacting an application server and sending location information coincident to the request. Responsive to the request, the application server consults a database of parking space utilization information associated with one or more designated parking spaces and returns one or more candidate parking spaces for the end user at the end user location or projected location. | 12-02-2010 |
20100303214 | ONE-WAY VOICE DETECTION VOICEMAIL - A telephone answering system includes a receiver, a detector and a transmitter. The receiver is configured to receive a voice signal. The detector is adapted to detect voice activity on the signal. The transmitter is adapted to transmit an initial prompt. In the event that the detector detects a gap in the voice activity after the initial prompt, transmitter is configured to transmit a notice. | 12-02-2010 |
20100328103 | Image enhanced parking enforcement system - An image-enhanced parking enforcement system utilizes cameras or other imaging modality to capture, record and/or report instances of parking infractions corresponding to a controlled parking space. In one embodiment, a metering device monitors allotted times for lawful utilization of the parking space and identifies instances of meter expiration; at least one detector monitors utilization status of the parking space; and the cameras or other imaging modality captures images corresponding to the parking space when the meter has expired and the space is occupied. | 12-30-2010 |
20100332960 | METHOD AND APPARATUS FOR ORGANIZING IDENTIFYING INFORMATION FOR WEB-BASED RESOURCES - A method for organizing identifying information for web-based resources may include: a) initializing an organizing tool and a web browser from a user device in operative communication with a network; b) searching the network for web-based resources associated with a search query by accessing the web search engine via the web browser; c) receiving a results list from the web search engine at the user device in response to the search query; and d) creating an organized file with the organizing tool based on the results list, the organized file including a root node with identifying information for the search query and a first level selectively populated with identifying information for one or more web-based resources included in the results list. A system for organizing identifying information for web-based resources may include a network, an organizing tool; and a user device. | 12-30-2010 |
20110023086 | Suppression of malicious SIP messages using the resource priority header - An Internet Service Provider (ISP) node is configured to suppress malicious session initiation protocol (SIP) messages. The ISP node is coupled to receive a new session initiation protocol (SIP) message from a user agent client associated with the ISP. If the SIP message includes a resource priority header (RPH) indicating the new SIP message should be given priority within the network, the ISP node determines whether the user agent client previously sent an initial SIP message with an RPH that has not yet been authorized, and if so, places the new SIP message in a buffer. | 01-27-2011 |
20110074572 | Method and apparatus for the creation of an event-associated electronic device directory - A manner of creating an electronic device directory containing the identity of electronic devices that registered in an area associated with a plurality of events, which events are similar in certain respects. The directory is useful, for example, investigating criminal cases. When such an event occurs, an application server is notified and generates one or more device registration capture requests to determine which electronic devices are registered in the area and at approximately the same time at which the event occurs. The device registration capture associated with this event is compared with other device registration captures associated with other, similar events to create the electronic device directory. The electronic device directory entries are preferable filtered to select the devices most likely to be associated with the actual events in question. | 03-31-2011 |
20110074606 | Vehicle detection and identification system - A vehicle detection and identification system is disclosed that can promote accident avoidance and the reporting of traffic safety violations to public safety personnel, by providing to users (without limitation, visually handicapped users) indicia of vehicles in proximity to the user location, the relative orientation, motion and proximity of the respective vehicles, and identification information associated with the respective vehicles or their owner/operator. | 03-31-2011 |
20110075829 | METHOD AND APPARATUS FOR CONTROLLING A CONFERENCE BRIDGE - A method for controlling a conference bridge may include: a) establishing status information for a conference call and storing the status information in a storage device, the status information for maintaining a participant status for user devices; b) setting the status information to indicate user devices participating in the conference call are connected; c) transmitting a unique identifier to each user device via an in-band signal; d) receiving a line-on-hold signal and the corresponding unique identifier from at least one user device, the line-on-hold signal being an in-band signal; and e) updating the status information in response each line-on-hold signal received to indicate the corresponding user device has placed the conference call on hold. An apparatus for may include a storage device for storing the status information, a processor, a transmitting device for transmitting the unique identifier, and a receiving device for receiving the line-on-hold signal. | 03-31-2011 |
20110093543 | MESSAGE SERVER DEVICE AND METHOD FOR CONTROLLING MESSAGE DELIVERY - An exemplary method of controlling message delivery includes receiving a message from a user at a message server. A determination is made whether the message requires a user-specified delivery criterion to be met prior to delivery of the message. The message is sent to an intended recipient if the message does not require the user-specified delivery criterion. The message is held in a specified delivery buffer if the message does require that the user-specified delivery criterion be met. The message from the specified delivery buffer will be automatically sent on behalf of the user to the intended recipient responsive to the user-specified delivery criterion being met. | 04-21-2011 |
20110142207 | METHOD AND APPARATUS FOR NOTIFYING EMERGENCY RESPONSE ORGANIZATION OF EMERGENCY MESSAGE CLUSTER - A method for notifying an emergency response organization of an emergency message cluster may include: a) detecting emergency messages directed to a first emergency response organization during a time window; b) detecting an emergency message cluster to the first emergency response organization at least in part by determining a quantity of emergency messages detected during the first time window exceeds a threshold value; and c) sending a notification message to a second emergency response organization in response to detecting the emergency message cluster. A network node associated with the method may include a switching module for handling the emergency messages in normal fashion, a message detecting logic for detecting emergency messages to the first emergency response organization, a cluster detecting logic for detecting the emergency message cluster, and an output module for sending the notification message. | 06-16-2011 |
20110151896 | METHOD AND APPARATUS FOR SELECTIVE MESSAGE SERVICE BLOCKING - A method of processing message service requests to a subscriber's communication device in a communication network is provided. The method includes receiving a message service request from a sender at a network element, wherein the message service request includes a message and is directed to the directory number of the communication device; accessing a centralized database that stores message service blocking data for the subscriber; retrieving the message service blocking data for the subscriber; and analyzing the data retrieved from the centralized database and determining whether the message service request should be permitted or denied | 06-23-2011 |
20110208974 | Countermeasure Against Keystroke Logger Devices - An anti-key logging protocol executable by a computer platform and a corresponding keystroke input device (e.g., keyboard or keypad) functions as a countermeasure to a key logger device. Following an authentication procedure, the computer platform sends encryption parameters to the keystroke input device, and the keystroke input device uses the encryption parameters to scramble or otherwise encrypt keystrokes entered on the keystroke input device before sending them to the computer platform. In such manner, keystrokes and/or keystroke representations sent from the keystroke input device to the computer platform are unrecognizable to a key logger device yet can be decoded by the computer platform. | 08-25-2011 |
20110213888 | METHOD AND APPARATUS FOR SCREENING REQUEST TO ESTABLISH SIP SESSION - A method and apparatus for screening a request to establish a SIP session is provided. The method may include a) receiving a request to establish a SIP session at a network node of an internet protocol network and incrementing a counter, b) determining whether the request includes a resource priority parameter with an elevated priority value and, if so, incrementing a counter, c) comparing a ratio of the priority request count to the total request count to a threshold, and d) processing each request that includes the elevated priority value using more comprehensive screening after the ratio exceeds the threshold, allowing processing for each request that includes the elevated priority value to continue in accordance with the elevated priority value after the ratio does not exceed the threshold, and allowing processing for each request that does not include the elevated priority value to continue in accordance with a routine priority. | 09-01-2011 |
20110228308 | METHOD AND APPARATUS FOR DETECTING A MISALIGNED PAGE - A capability is provided for detecting a misaligned page of a document. A method includes detecting that a page is misaligned and generating a control signal adapted for use in triggering presentation of an alarm indicating that the page is misaligned. A method includes detecting that a page is misaligned and initiating one or more control actions for the misaligned page. These and other methods may be performed on any suitable copy device, such as on a fax machine, a photocopy machine, a scanner, a photograph copying device, a user device, a network device, and the like, as well as devices having combinations of such functionality. | 09-22-2011 |
20110246580 | Method And Apparatus For Electronic Mail Management - A system and method for email management. An automatic reply control table is provided, and an entry may be created based on a designation made by a user when composing an email for transmission. An email manager then monitors incoming email to determine whether a particular email includes an indicator that it is an automatic-reply message and, if so, whether it corresponds to an entry on the automatic reply control table. If it does, then the received automatic reply message is deleted or otherwise disposed of. A notification may be generated for presentation to the sender of the original email indicating the disposition of received automatic reply messages corresponding to a particular transmitted email. | 10-06-2011 |
20110267192 | Individualized Baggage Tracking And Notification System - An individualized baggage tracking and notification system provides airline baggage tracking information to individual customers for purposes of customer convenience and/or theft avoidance. The individualized baggage tracking information may indicate, for each of one or more baggage items affiliated with the customer, indicia of one or more baggage handling nodes visited by the baggage items, indicia of recorded arrival times of the baggage items at the visited nodes, indicia of one or more baggage handling nodes not yet visited by the baggage items and indicia of projected arrival times of the baggage items at those nodes. In an instance where a customer baggage item has reached a terminating node (e.g., a baggage carousel), the system may indicate the arrival time of the baggage item at the terminating node; or in the instance the baggage item has not yet reached the terminating node, the system may indicate a projected arrival time of the baggage item at the terminating node. | 11-03-2011 |
20120030759 | SECURITY PROTOCOL FOR DETECTION OF FRAUDULENT ACTIVITY EXECUTED VIA MALWARE-INFECTED COMPUTER SYSTEM - A security protocol is disclosed for detecting occurrences of intruder activity, including hidden or concealed activity that may occur in a computer system including a host platform operably connected to an application platform. The protocol relies on parameters defining a tag sequence and syntax commonly known to the application platform and host platform (and hence the user) to detect occurrences of intruder activity during the session. | 02-02-2012 |
20140143870 | METHOD AND SYSTEM FOR REDUCING CYBER ATTACKS - A system and method for reducing cyber attacks on vetted web sites includes a haven web site hosted on a server computer. A list of certified web sites meeting specified criteria is maintained by the haven web site. The certified list is accessible over a global computer network for query or download. A computer virus or the like, operating on a remote computer, runs software coding, available for download on the haven web site, that determines whether a proposed targeted address is on the certified list. If so, the attack by the remote computer is aborted, and if not, the attack proceeds. Alternatively, a certification marker is included on certified web sites, and the remote computer runs software coding, available for download on the haven web site, to determine whether a proposed targeted address corresponds to a certified web site. | 05-22-2014 |