AVAYA TECHNOLOGY LLC Patent applications |
Patent application number | Title | Published |
20100027528 | Notification of Impending Media Gateway Resource Exhaustion - A method is disclosed that enables a media gateway controller to optimize the selection of a media gateway from which to acquire call-related resources, in a multi-gateway environment. In accordance with the illustrative embodiment, the controller sets a high utilization threshold and a low utilization threshold for each media gateway it controls, for the purpose of receiving a notification when a threshold is crossed. As resources are utilized, removed from service, or become available for use, the media gateway recalculates the resource utilization of one or more predetermined resources and notifies the controller if a threshold for a particular resource has been crossed. The controller, in turn, uses the current threshold states as part of the selection of media gateway to serve one or more subsequent calls. The disclosed method can increase the probability of selecting a media gateway with sufficient resources for a successful call completion on the first attempt. | 02-04-2010 |
20090316880 | Purposeful Degradation of Sidetone Audio for Providing Feedback about Transmit-Path Signal Quality - An enhanced sidetone system is disclosed which provides the user of a telecommunications terminal, while speaking, with immediate audio feedback that corresponds to what the far-end party is probably hearing. The sidetone system continuously samples the input speech signal from the user and also obtains signal quality statistics of the transmission path. These statistics can include descriptions of network quality-of-service characteristics (e.g., packet loss rate, etc.) and/or media quality characteristics (e.g., audio distortion due to echo cancellation, etc.). These statistics enable the disclosed technique to determine whether the transmitted signal quality is acceptable. When an unacceptable condition in transmit-path signal quality is detected, the technique modifies the traditional (main) sidetone signal. For example, a delayed sidetone signal can be transmitted back to the user's terminal, in addition to the main sidetone signal generated, so that the user perceives the combination of sidetone signals as a hollow-sounding, objectionable sound. | 12-24-2009 |
20090300694 | OPEN CABLE APPLICATION PLATFORM (OCAP) AND SET-TOP BOX (STB)-BASED CALENDERING APPLICATION - One exemplary aspect is advanced multimedia communications via OCAP using customer specific profiles resident in the STB for calendar management. Additional aspects relate to invitation management including auto-calendaring, forwarding of an invitation details to a specific destination, conflict resolution, auto-rescheduling, global rescheduling and automatic reminders based on an invitation. Still further aspects relate to enabling confirmation of an appointment based on a received reminder and a technique to confirm an appointment with the ability to forward an appointment confirmed identifier to the appointment setter. Rescheduling routines are also provided for use with the calendaring application. | 12-03-2009 |
20090300668 | OPEN CABLE APPLICATION PLATFORM (OCAP) AND SET-TOP BOX (STB)-BASED BILL NOTIFICATION AND PAYMENT APPLICATION - One exemplary aspect is advanced multimedia communications via OCAP using customer specific profiles resident in the STB for bill management. Aspects of the invention also relate to managing payment preferences, auto payment of bills or invoices, managing bill notification preferences, triggering a notification to be sent to one or more of an associated device and the STB upon receipt of a bill, analyzing an incoming bill with an intelligent agent and optionally initiating a communication to the vendor associated with a bill based on the analysis, acquiring additional information about the bill including an image of the bill and/or additional details, and forwarding invoice information to a destination associated with the STB. | 12-03-2009 |
20090296908 | Telecommunications Endpoint that Prompts a User to Focus on a Monitored Call - A telecommunications endpoint and method are disclosed that involve the monitoring of a conference call by the endpoint, on behalf of a call participant who is either at the endpoint or elsewhere, and the prompting of the participant when his/her presence is needed. The monitoring of the call involves determining whether certain phrases that are relevant to and initialized by the participating endpoint user are spoken during the call. Such phrases might comprise the user's name, the name of a relevant project, the name of a relevant work item, and so forth. At a point in the call when one of the phrases has been spoken, the endpoint prompts the user of the event and provides relevant information that enables the user to refocus attention towards the call. | 12-03-2009 |
20090285367 | Purposeful Receive-Path Audio Degradation for Providing Feedback about Transmit-Path Signal Quality - A technique applicable to a telecommunications system is disclosed that provides quality-related information in a receive path, in which the information serves as feedback about the call quality that is present in the corresponding transmit path. It is recognized that when a first party on a call hears degradation, he tends to change the way that he speaks or reacts to a second party. Based upon this recognition, the present invention addresses the problem of one-way degradation by providing a feedback signal to the first party, in the form of intentional degradation of the voice signals that he is receiving from the second party. The degradation that is introduced by the disclosed data-processing system is based on the current quality of the voice path from the first party to the second party (i.e., the transmit path), instead of the other way around (i.e., the receive path). | 11-19-2009 |
20090274292 | Assignment of Call-Center Agents to Incoming Calls - A technique is disclosed that optimizes the background noise experienced by a party who is calling into a call center. Working as part of an overall call-assignment algorithm, the technique considers the acoustic noise that is present in the vicinities of multiple call-center agents who are otherwise satisfactory candidates to handle a call. The technique then selects an agent to handle the call who is associated with an optimal acoustic noise. Typically, the selected agent is associated with lowest background noise level. The background noise is monitored at each call agent's station by evaluating the signals that are present at the agent's microphone. Usually, this is done when a call agent is between calls and, as a result, is not using her headset at that moment. In other words, the background noise is actually measured, and the measurements are then used to assign a call agent to the incoming call. | 11-05-2009 |
20090274144 | Multi-Node and Multi-Call State Machine Profiling for Detecting SPIT - An apparatus and method for detecting potentially-improper call behavior (e.g., SPIT, etc.) are disclosed. The illustrative embodiment of the present invention is based on finite-state machines (FSMs) that represent the legal states and state transitions of communications protocols at nodes during Voice over Internet Protocol (VoIP) calls. In accordance with the illustrative embodiment, a library of FSM execution profiles associated with improper call behavior and a set of rules (or rule base) associated with improper FSM behavior over one or more calls are maintained. When the behavior of one or more finite-state machines during one or more calls matches either an execution profile in the library or a rule in the rule base, an alert is generated. | 11-05-2009 |
20090274143 | State Machine Profiling for Voice Over IP Calls - An apparatus and method for detecting potentially-improper call behavior (e.g., SPIT, etc.) are disclosed. The illustrative embodiment of the present invention is based on finite-state machines (FSMs) that represent the legal states and state transitions of a communications protocol at a node during a Voice over Internet Protocol (VoIP) call. In accordance with the illustrative embodiment, a library of FSM execution profiles associated with improper call behavior is maintained. When there is a match between the behavior of a finite-state machine during a call and an execution profile in the library, an alert is generated. | 11-05-2009 |
20090274040 | Mid-call Redirection of Traffic Through Application-Layer Gateways - A method and apparatus are disclosed for redirecting traffic associated with an application so that the traffic advantageously traverses (or “hairpins”) through an application-layer gateway. Because the present invention advantageously redirects traffic without any participation by routers, no changes to or replacement of routers in a network is required. The illustrative embodiment is disclosed in the context of Internet telephony, but is also applicable to other kinds of applications and types of communication (e.g., Internet Protocol Television [IPTV], instant messaging [IM], videoconferencing, etc.) | 11-05-2009 |
20090249306 | Off-Line Program Analysis and Run-Time Instrumentation - A technique is disclosed for determining off-line the number and location of instrumentation probes to be inserted into a program under testing, and subsequently instrumenting the program at run-time based on the off-line analysis. In accordance with the illustrative embodiment, an off-line analyzer first determines instrumentation locations for a program under test in accordance with a method called the Super Nested Block Method. After the instrumentation locations have been determined, a testing/monitoring tool executes the program and a run-time instrumenter in parallel. The run-time instrumenter accordingly inserts probes into the program, removes probes after they have been executed once, and generates and reports information about code coverage based on the probes. | 10-01-2009 |
20090249305 | Super Nested Block Method to Minimize Coverage Testing Overhead - A method for determining the number and location of instrumentation probes to be inserted into a program is disclosed. The method advantageously inserts the minimum number of probes that are required to obtain execution coverage for every node in the program's control-flow graph. In addition, the method requires only one bit to store each probe and does not require the assignment of weights to arcs or nodes of the control-flow graph. In the illustrative embodiment, the nodes of a control-flow graph are partitioned into non-empty sets, where each non-empty set corresponds to a super nested block of the program. | 10-01-2009 |
20090249285 | Automatic Generation of Run-Time Instrumenter - A method and apparatus for automatically generating a run-time instrumenter are disclosed. In accordance with the illustrative embodiment, an off-line analyzer first determines instrumentation locations for a program under test in accordance with a method called the Super Nested Block Method. After the instrumentation locations have been determined, source code for a run-time instrumenter is automatically generated based on the source code for the program under test and the instrumentation locations. The source code for the program under test and the run-time instrumenter are then compiled into executables, and a testing tool then executes the program under test and the run-time instrumenter in parallel. | 10-01-2009 |
20090245492 | SURVIVABLE PHONE BEHAVIOR USING SIP SIGNALING IN A SIP NETWORK CONFIGURATION - Provided are methods, devices, and systems for maintaining a SIP survivable User Agent. The present invention is adapted to allow the User Agent to detect the status of the network, thus providing the User Agent to perform failover/failback operations. The User Agent may be adapted to determine the status of the network based on its own monitoring mechanisms and/or based on messages received from other network components. | 10-01-2009 |
20090245183 | SIMULTANEOUS ACTIVE REGISTRATION IN A SIP SURVIVABLE NETWORK CONFIGURATION - Provided are methods, devices, and systems for maintaining a SIP survivable network. The present invention is adapted to allow SIP endpoints or User Agents to discover and select the controller or controllers that the SIP endpoint will register with. Selection of the controller or controllers may be based upon the relative attributes of the controllers and the needs of the SIP endpoint. | 10-01-2009 |
20090245098 | FAILOVER/FAILBACK TRIGGER USING SIP MESSAGES IN A SIP SURVIVABLE CONFIGURATION - Provided are methods, devices, and systems for maintaining a SIP survivable network. The present invention may utilize messages, such as SIP NOTIFY messages, to trigger various network components to failover and failback based on the determined status of the SIP network. | 10-01-2009 |
20090241160 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 09-24-2009 |
20090241159 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 09-24-2009 |
20090241158 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 09-24-2009 |
20090241153 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 09-24-2009 |
20090222512 | Entryway Communication System - A premises entryway communications device and system enable a visitor to the premises and an occupant of the premises to communicate via icons and text. | 09-03-2009 |
20090204677 | CONTEXT BASED FILTER METHOD AND APPARATUS - A context sensitive filter method and apparatus is provided. In particular, information regarding the context in which a request for content is made is gathered, and is used to select filter parameters for application to content returned in response to the request. Context information can include information from a calendar application, location information, user preferences or other inputs. | 08-13-2009 |
20090191915 | Call-Handling for an Off-Premises, Telecommunications Terminal with an Installed Subscriber Identity Module - An apparatus and method are disclosed that enable an organization's enterprise-wide network to accommodate roaming wireless terminals that are affiliated with the local enterprise networks within the enterprise-wide network. In particular, the illustrative-embodiment system is capable of handling a wireless terminal such as a cellular telephone that is able to use different subscriber identity module cards, or “SIM” cards, in different geographic regions or service-provider networks. A mobility client that is part of the wireless terminal registers when it detects that a new SIM card has been installed at the wireless terminal, whereby the client provides the subscriber-specific information that the wireless terminal reads from the SIM card. The mobility client identifies itself to the server by a user identifier, such as the station extension with which the terminal is affiliated back at the home local enterprise network. Upon successful registration, the client receives an access number that is suitable for its current location. | 07-30-2009 |
20090187398 | Script Selection Based On SIP Language Preference - The “Accept-language” header field of a first Session Initiative Protocol (SIP) message identifies the preferred language of a first party to a communication, a database correlates languages with writing scripts, and the correlation is used to populate the “P-Asserted-Identity”, “From”, or “Contact” header field of a second SIP message with the name of a second party to the communication expressed in the writing script of the first party's preferred language. | 07-23-2009 |
20090185673 | Voice-Over-IP Call Recording in Call Centers - An apparatus and methods are disclosed for recording calls in a Voice over Internet Protocol (VoIP)-based call center. In accordance with the illustrative embodiment, one of a plurality of data-processing systems in the call center is selected for each call to decompress and decrypt the call's media stream(s). The selection criteria include the type of compression algorithm, the type of encryption scheme, the processing capabilities of the data-processing systems, the current processing load of the data-processing systems, and the available communication bandwidth into and out of the data-processing systems. The selected data-processing system is subsequently incorporated into the call path between the calling SIP endpoint and the call center SIP endpoint, if necessary, and for the duration of the call decompresses/decrypts the media stream(s), generates a copy of the decompressed/decrypted stream(s), and transmits the copied stream(s) to a recording device in the call center. | 07-23-2009 |
20090177604 | Telecommunications-Based Social-Trust Networks - A method of facilitating the construction, maintenance, and usage of social-trust networks is disclosed. The illustrative embodiment monitors the call processing details of communication events between users of a telecommunications system as the basis for estimating whether or not a relationship exists between the users that can be exploited in a social-trust network. This is possible because the call processing details of communication events between users is an excellent indicator of the nature of the relationship between users. For example, if Alice calls Brian three times a day on average, including nights, weekends, and holidays, and Brian answers Alice's calls quickly and returns her unanswered calls quickly, then it is reasonable to infer that Alice and Brian have a relationship that is substantial enough to be used in a social-trust network. | 07-09-2009 |
20090158441 | SENSITIVE INFORMATION MANAGEMENT - Information is identified as sensitive and a lapsed time job (Chron Job) is created that will allow the deletion of sensitive information after a period of time. The interval could be set to be longer than vacation or other planned use, and yet short enough to limit the period where risk to the organization or individual is incurred. The Chron Job could be integrated with the user's calendar, such that the Chron Job considers holiday time as a means of delaying execution of the Chron Job which would allow a shorter interval to be selected. In addition to deletion of the information identified as sensitive, additional steps could also be taken, such as the purging of the recycle bin, modification of the FAT, and optionally the deletion of related information. Once information is identified as sensitive, the information and derivative works are tracked and managed. | 06-18-2009 |
20090147931 | Instant Messaging and Voice Mail Integration - A method of enabling a user of an instant messaging client to forward an audio recording to another person via his or her instant messaging client is disclosed. The recipient's instant messaging client then inquires whether the recipient would like to hear the audio recording immediately. If the recipient answers yes, then the audio recording is played for the recipient through the instant messaging client. In contrast, if the user answers no, or is “unavailable,” or does not answer at all, the instant messaging client forwards the audio recording a voice mailbox associated with the recipient for later retrieval in well-known fashion via a telephone. This invention is particularly advantageous when the recipient is engaged in a telephone call when the audio recording arrives because it enables the recipient to hear the message immediately and without having to access the voice mail system while engaged in call. | 06-11-2009 |
20090141647 | Acknowledgment of Media Waveforms between Telecommunications Endpoints - An apparatus and method are disclosed that enable a first telecommunications endpoint to ensure that a second endpoint is receiving the first endpoint's packet stream transmissions with a satisfactory waveform quality. When the second endpoint receives the packet stream, it decodes the media waveform from the stream, encodes the waveform back into a second packet stream, and transmits some or all of the packets in the second stream back to the first endpoint. The first endpoint then decodes the received waveform in the second stream and compares it to the original waveform transmitted to the second endpoint. Based on the comparison, the first endpoint adjusts the value of a quality indication, and provides the quality indication to its user and to the second endpoint. Advantageously, the user at the second endpoint is able to determine whether the received waveform is, in fact, close enough to the waveform that the first endpoint's user intended to be received and understood. | 06-04-2009 |
20090135740 | Enhanced Application-Layer Multicast for Peer-to-Peer Conferencing - An application-layer multicast-based (ALM-based), peer-to-peer conferencing system is disclosed that leverages the differing capabilities of the participating peer nodes. A conference call can be set up among peer nodes of three different types. A bridging node is capable of mixing individual audio signals that are associated with a call into a composite audio signal and of providing the composite audio signal to another node. A mixing-capable node is capable of mixing the individual audio signals that are associated with a call, but not of relaying those signals to another node. A mixing-incapable node does not support the mixing of individual audio signals. The conferencing architecture of the illustrative embodiment is able to account for the differences between the three types of nodes that are to participate in a conference call, resulting in an optimal allocation of bandwidth and processing resources. | 05-28-2009 |
20090131015 | Determining Authentication Challenge Timing and Type - An apparatus and methods are disclosed for authenticating users of wireless telecommunications terminals. In particular, the present invention enables the timing and type of authentication challenges to vary based on one or more of: the user's current geo-location, the current day and time, the presence or absence of other nearby users, and the identity of any nearby users. In accordance with the illustrative embodiment, the re-authentication time period (i.e., the length of time between authenticating and re authenticating a user) and the authentication challenge type (e.g., username/password, fingerprint recognition, etc.) can be determined based on these factors. The present invention is advantageous in that it enables the shortening of the re-authentication time and the selection of a more secure type of authentication challenge when it is more likely that a user's wireless telecommunications terminal might be accidentally left behind or stolen. | 05-21-2009 |
20090125594 | Instant Messaging Intercom System - A method of communication via instant messaging that avoids some of the costs and disadvantages for doing so in the prior art. In particular, the illustrative embodiment enables instant messaging clients to function as an intercom, in which one user can cause audio signals, such as speech, to be output from a second user's instant messaging client without any action on the part of the second user. This is in direct contrast to a traditional telephone call in which the second user must take some action to “answer” the call before the first user's voice is heard. Such an instant messaging intercom capability will be especially useful for secretaries and others who collaborate on work. | 05-14-2009 |
20090122966 | Controlling Voice Mail Systems From Instant Messaging Clients - A method of controlling a voice mail system with an instant messaging client is disclosed. For example, the illustrative embodiment enables a user of a instant messaging client to forward a voice mail message to one or more people listed in the instant messaging client's buddy list. Furthermore, the instant messaging client also enables the user to annotate the voice mail message and to send the voice mail commentary alone with the voice mail message to one or more people listed in the instant messaging client's buddy list. | 05-14-2009 |
20090122720 | Estimating Network-Layer Topology Using End-to-End Measurements - A method for estimating the network-layer topology of a telecommunications network is described. In particular, the illustrative embodiment of the present invention estimates the existence and connectivity of nodes in the topology based on the detection of network-wide end-to-end path intersections. This is based on the assumption that pairs of streams of packets that share a common node will interfere and that the interference can be detected in the received streams. In general, this interference is manifested as jitter. By transmitting streams on each pair of end-to-end paths in the network, and detecting interference (or a lack of interference) a matrix of path intersections for the network can be created. Using logic and supposition, the topology of the network can be estimated using the matrix of path intersections. Once the estimate of the topology is complete, the maintenance and operation of the network can proceed based on the topology. | 05-14-2009 |
20090122719 | Detecting Interfering Packet Streams in Packet Networks - A method for estimating the network-layer topology of a telecommunications network is described. In particular, the illustrative embodiment of the present invention estimates the existence and connectivity of nodes in the topology based on the detection of network-wide end-to-end path intersections. This is based on the assumption that pairs of streams of packets that share a common node will interfere and that the interference can be detected in the received streams. In general, this interference is manifested as jitter. By transmitting streams on each pair of end-to-end paths in the network, and detecting interference (or a lack of interference) a matrix of path intersections for the network can be created. Using logic and supposition, the topology of the network can be estimated using the matrix of path intersections. Once the estimate of the topology is complete, the maintenance and operation of the network can proceed based on the topology. | 05-14-2009 |
20090122713 | Interfering Packet Streams in Packet Networks - A method for estimating the network-layer topology of a telecommunications network is described. In particular, the illustrative embodiment of the present invention estimates the existence and connectivity of nodes in the topology based on the detection of network-wide end-to-end path intersections. This is based on the assumption that pairs of streams of packets that share a common node will interfere and that the interference can be detected in the received streams. In general, this interference is manifested as jitter. By transmitting streams on each pair of end-to-end paths in the network, and detecting interference (or a lack of interference) a matrix of path intersections for the network can be created. Using logic and supposition, the topology of the network can be estimated using the matrix of path intersections. Once the estimate of the topology is complete, the maintenance and operation of the network can proceed based on the topology. | 05-14-2009 |
20090116635 | Handling of a Session Initiation Protocol-Capable Telecommunications Terminal that is Put on Hold - A method is disclosed that enables the proper treatment of a queued call by a call center, or other data-processing system capable of queuing calls, in which the calling terminal of the queued call has been put on hold by its user. The call center is able to detect the terminal being put on hold by monitoring for a SIP re-INVITE request, in which the session description signifies an on-hold condition. When it is determined that the calling terminal is on hold, the call center modifies its treatment of the queued call. For example, the call center might freeze the call's position in the queue until the calling party takes the phone off of hold. As another example, the call center might allow the call to work its way to the top of the queue, with the terminal on hold, and then maintain the call's position at the top of the queue until a service agent is available. | 05-07-2009 |
20090103701 | Call Screening Via Observing Called-Party Behavior - A method is disclosed that enables the screening of unwanted telephone calls, such as voice or video calls, for one or more called parties. In accordance with the illustrative embodiment of the present invention, an anti-SPAM system receives signaling information for one or more telephone calls made to one or more called parties by a calling party. Although the calling party can be a human caller, in a SPAM-over-Internet-Telephony context the calling party can alternatively be a server or other network element that originates SPAM voice calls for advertising purposes; both possibilities are accounted for in the illustrative embodiment. The anti-SPAM system then observes the behavior of the called party or parties that is exhibited in response to receiving the telephone calls. Based on the observed behavior, the anti-SPAM system then updates one or more rules for handling future telephone calls made to the protected called parties. | 04-23-2009 |
20090086952 | Multi-conferencing capability - A system and method for providing the capability to simultaneously manage multiple conference calls, move participants in the conference calls from one conference call to another and subdivide or join multiple conference calls together, and the like, wherein a participant seeking to initiate conference calls does so at his or her endpoint by selecting conference call identifiers, where the identifiers identify conference calls to be created. The initiating participant then selects the participants to be associated with the particular calls and confirms the selection. Upon confirmation of the selection, the conference calls among the selected participants are established. | 04-02-2009 |
20090086951 | Telecommunications endpoint for managing multi-conferencing - An apparatus or endpoint device is disclosed for providing the capability to simultaneously manage multiple conference calls, move participants in the conference calls from one conference call to another and subdivide or join multiple conference calls together, and the like, wherein the apparatus or endpoint device provides a multi-conferencing capability that enables one or more teleconferencing participants to manage multiple teleconferences simultaneously. Each participant in the teleconference call manages their respective teleconference through their apparatus or endpoint device at their specific location by using it to adjust the teleconferencing topology, i.e., who should form what part of each specific teleconference call. | 04-02-2009 |
20090086940 | Facilities Management System - A technique is disclosed that enables the managing of environmental conditions within an enterprise workplace and, in doing so, provides an improvement in facilities cost management over some techniques in the prior art. A data-processing system such as a private-branch exchange monitors the workplace by using one or more telephones, or other “telecommunications endpoints” to which the exchange is connected, in the workplace area. The exchange determines whether people are present in the workplace area by monitoring which endpoints are in use. Additionally, the exchange monitors the sounds that are received by the microphones of the endpoints. Based on knowing which endpoints are in use, the exchange generates control signals for the purpose of controlling one or more environmental conditions such as temperature, lighting, and so forth. In some embodiments of the present invention, the exchange examines the audio content of the received signals and bases the control signals on the audio content analyzed. | 04-02-2009 |
20090080642 | Enterprise-Distributed Noise Management - A method is disclosed that enables the managing of the overall sound level in an enterprise environment where telephones are used. A data-processing system such as a private branch exchange monitors whether one or more telephones are in use. Based on detecting when a first endpoint is in use and, therefore, when the endpoint's user is present, the private branch exchange controls one or more characteristics of the loudspeaker volume at a second endpoint. By accounting for other considerations such as the spatial closeness between the endpoints, which can be determined from office dimensions stored in a database, the private branch exchange of the illustrative embodiment is able to determine the degree of sound that is coupling over from one endpoint location to another. On a larger scale, the exchange is able to control the loudspeaker volumes of all of the endpoints in the workplace area. In doing so, the exchange manages the overall acoustic noise present. | 03-26-2009 |
20090073962 | Modular messaging log application on an IP phone - Presented is a method for selectively retrieving voice messages. The method includes accessing a list of received calls, and accessing a subset of the list of received calls. Each of the calls in the subset has an associated stored message. The method further includes selectively accessing information associated with a particular call in the subset of received calls, and retrieving the message associated with the particular call. Also presented is an internet protocol (IP) phone that includes a screen configured to display a list of received calls, a soft key configured to display a subset of the list of received calls when pressed. Each of the calls in the subset has an associated stored message. The phone further includes soft keys configured to selectively display information associated with a particular call in the subset of received calls when pressed, and retrieve the message associated with the particular call when pressed. | 03-19-2009 |
20090073957 | Apparatus and methods for data distribution devices having selectable power supplies - A network apparatus includes an independent power supply providing a first power signal, and a data distribution device which is operably coupled to the independent power supply and a remote data distribution device, where the remote distribution data device exchanges data and provides a second power signal to the data distribution device, and further where the data distribution device selects the first power signal or the second power signal for operational power. A method includes scanning a plurality of sensors, each coupled to a plurality of power inputs, to ascertain if a power signal is present, determining whether a power signal associated with an independent power supply is present at a power input, sourcing power from the independent power supply if the power signal is associated with an independent power supply, and sourcing power from an alternative supply if the power signal is not associated with an independent power supply. | 03-19-2009 |
20090070875 | Distributed Stateful Intrusion Detection for Voice Over IP - An apparatus and method are disclosed for detecting intrusions in Voice over Internet Protocol systems without an attack signature database. The illustrative embodiment is based on two observations: (1) various VoIP-related protocols are simple enough to be represented by a finite-state machine (FSM) of compact size, thereby avoiding the disadvantages inherent in signature-based intrusion-detection systems.; and (2) there exist intrusions that might not be detectable locally by the individual finite-state machines (FSMs) but that can be detected with a global (or distributed) view of all the FSMs. The illustrative embodiment maintains a FSM for each session/node/protocol combination representing the allowed (or “legal”) states and state transitions for the protocol at that node in that session, as well as a “global” FSM for the entire session that enforces constraints on the individual FSMs and is capable of detecting intrusions that elude the individual FSMs. | 03-12-2009 |
20090070874 | Signature-Free Intrusion Detection - An apparatus and method are disclosed for detecting intrusions in Voice over Internet Protocol systems, without the use of an attack signature database. In particular, the illustrative embodiment is based on the observation that some VoIP-related protocols (e.g., the Session Initiation Protocol [SIP], etc.) are simple enough to be represented by a finite-state machine (FSM) of compact size. A finite-state machine is maintained for each session/node/protocol combination, and any illegal state or state transition—which might be the result of a malicious attack—is flagged as a potential intrusion. | 03-12-2009 |
20090061819 | Method and apparatus for controlling access and presence information using ear biometrics - A method and apparatus control the operations of an audio device by obtaining by the audio device biometric information about an ear of a user; identifying the user by processing the biometric information; and controlling the operation of the audio device in response to the identification of the user. Also, a method and apparatus control the operations of an external database by receiving biometric information about the ear of a user from an audio device; identifying the user by processing the biometric information; and transmitting a control message to another system. Further, a method and apparatus control the operations of a telecommunication system by receiving biometric information about an ear of a user from a telecommunication set; identifying the user by processing the biometric information; and controlling the operation of the telecommunication system in response to the identification of the user. | 03-05-2009 |
20090060243 | Method and apparatus for communicating to a hearing aid using an aimed electro-magnetic field - A method and apparatus configure an audio device to communicate audio information to a hearing aid by receiving location information defining a location of a receiving inductive coil of the hearing aid; aiming a transmitting inductive coil of the audio device at the location; and controlling the transmitting inductive coil to generate an electro-magnetic field to communicate the audio information. | 03-05-2009 |
20090060240 | Method and apparatus for configuring a handheld audio device using ear biometrics - A method and apparatus configure a handheld audio device to communicate audio information by identifying an ear being used with the handheld audio device and by configuring the handheld audio device in response to the ear identification to communicate audio information to the ear. The identification may use sonic or visual techniques to identify the ear. | 03-05-2009 |
20090060170 | Method and apparatus for call control using motion and position information - A method and apparatus perform call control by obtaining initial biometric information of ears of a user of a handheld audio device; detecting a change in the biometric information of the ears of the user; determining a position and motion of the handheld audio device by analyzing the detected change in biometric information; and performing call control based on the determined position and motion. Further, the method and apparatus perform a first call control operation in response to the determined motion and position if the handheld audio device is communicating with a first endpoint and a second call control operation if communicating with a second endpoint. In addition, the method and apparatus change an internal call control operation of a handheld audio device by determining motion and a position of the handheld audio device. Also, the method and apparatus control internal operations of an endpoint by determining motion and position of the handheld audio device without terminating communication with the handheld audio device wherein the endpoint is one of a voice messaging system, conferencing system, or telephone operator. | 03-05-2009 |
20090060163 | Call Establishment in Call Centers Having Heterogeneous Terminals - A method of establishing calls with call centers that have heterogeneous hardware and software is disclosed. In particular, the data processing system for establishing a call selects one or more terminals for call based on the set of capabilities of the respective terminals and on the quality-of-service parameters that characterize the telecommunications channels connecting the terminals. | 03-05-2009 |
20090052650 | Rapid Response To User Input at a Telecommunications Terminal - An apparatus and methods are disclosed for use by organizations that have PBXs at a plurality of sites. The invention pertains to cell phone calls from an affiliated terminal to her “home” private branch exchange. For example, an employee who works at the Chicago branch office might call the Chicago office's PBX to invoke a feature such as setting up call forwarding, retrieving voice mail, etc. Such calls might be automatically and transparently directed to another PBX when it is advantageous to do so. In the illustrative embodiment, the need or desirability to redirect such calls to another PBX is ascertained while the caller is still in the process of entering all of the required calling information. The effect of assessing whether to redirect the call in parallel with the caller entering the information is to reduce the delays otherwise experienced by the caller when placing calls outside of the enterprise area served by the home private branch exchange. | 02-26-2009 |
20090049544 | Habit-Based Authentication - A method for authentication is disclosed. During use, the observed usage of the device is compared to an expected pattern of usage of the device. Deviation between the observed and expected usage indicates that the user might not be authorized to use the device. If the deviation exceeds a threshold, a credential is required from the user to authenticate itself as the authorized user. | 02-19-2009 |
20090041020 | CLOCK MANAGEMENT BETWEEN TWO ENDPOINTS - Clock correlation can be achieved, for example, utilizing the RTP stream between a sender and receiver by determining a baseline at the start of, for example, a communication. This baseline is derived as a point in time from an arriving packet and represents a point from which subsequent packets deviate. Using this baseline, an early packet or a late packet can be detected. An early packet pushes the baseline down to that earlier point, while late arriving packets, if they are arriving late for a continuous period of time, represents a shift in the opposite direction from the baseline, resulting in a baseline moving to the “earliest” packet out of the sequence of the late arriving packets. | 02-12-2009 |
20090037985 | Automated Peer Authentication - An apparatus and methods are disclosed for performing peer authentication without the assistance of a human “guard.” In accordance with the illustrative embodiments, a peer is selected from a non-empty set of candidates at authentication time based on one or more of the following dynamic properties: the current geo-location of the user to be authenticated; the current geo-locations of the candidates; the current time; the contents of one or more directories (e.g., a telephone directory, an organizational chart or directory, etc.), the contents of one or more call logs; and the candidates' schedules. | 02-05-2009 |
20090034711 | Multiple Queuing and Servicing of a Contact - A contact originator is given a choice to enqueue the contact in multiple contact queues, to serve multiple needs or interests of the originator. If the contact reaches the head of the queue for the primary need while the contact is being serviced from a queue for a secondary need, the contact either remains at the head of the primary-need queue until the servicing at the secondary-need queue is completed, or a resource of the primary-need queue is conferenced in with the contact and the resource of the secondary-need queue so that the resources can serve both needs simultaneously. | 02-05-2009 |
20090027485 | Automatic Monitoring of a Call Participant's Attentiveness - A system is disclosed that enables a first call participant, such as an agent at a call center, to receive feedback about his attentiveness towards a second call participant while on a video call. Using the real-time image of the first call participant while on a video call, as well as additional information, the system of the illustrative embodiment evaluates one or more facial characteristics of the first participant, such as eye gaze; accumulates a record of predetermined, attentiveness-related conditions having been met; and notifies the first participant, or some other person such as the participant's supervisor, of the participant's attentiveness patterns. | 01-29-2009 |
20090027484 | Call Resource Management Based on Calling-Party Disengagement from a Call - A system is disclosed that addresses a problem that can occur when a calling party of a video call withdraws from the call, but does not actually hang up. For example, after the calling party begins working through an interactive voice and video response (IVVR) session, the party might put his phone down, step away, drop the phone inadvertently, or otherwise disengage from the call without hanging up. In this event, the terminal itself is still connected to the call, so the call resource is tied up serving the terminal, even though the calling party has temporarily disengaged from the call. The system of the illustrative embodiment detects the disengagement of the party from the call and, as a result, suspends the use of the call resource that has been allocated for the call until the party re-engages with the call. | 01-29-2009 |
20090027479 | Dynamic Visual Background For Call-Center Agents - A system is disclosed that enables a first call participant, such as an agent at a call center, to project a carefully-controlled appearance towards a second call participant, such as a customer calling for technical support, while on a video call. Using the real-time image of the first call participant while on a video call, as well as additional information, the system of the illustrative embodiment selects and superimposes a visual background that appears to the caller as being behind the agent. The visual background can be selected to cater towards what the caller expects or wants to see, or what the message is that the agent-represented business wants to convey. The system of the illustrative embodiment can dynamically change the visual background during a call or from one call to another, depending on factors related to the calling party, factors related to the called party, and so forth. | 01-29-2009 |
20090022303 | Reduction of Wireless Communication Costs in Enterprises - Methods and apparatus are disclosed for reducing wireless telecommunication costs for enterprises having a plurality of PBX-equipped sites, connected by either a public network (e.g., the PSTN, the Internet, etc.), a private network (e.g., leased lines, a virtual private network [VPN] over the Internet, etc.), or some combination of public and private networks. In particular, the illustrative embodiments of the present invention attempt to reduce telecommunication costs by advantageously routing calls from an off-premises wireless terminal belonging to the enterprise via one or more of the enterprise's private branch exchanges. The present invention is especially advantageous in that it can reduce telecommunication costs for calls from an off-premises wireless terminal to any type of destination: another cell phone, a wireline terminal, a private branch exchange, etc. | 01-22-2009 |
20090022302 | Cost-Conscious Telecommunications Terminal - A method and apparatus are disclosed for routing calls over an organization's private network of private branch exchanges. In particular, when a member of the organization (e.g., an employee, etc.) places a call from his or her affiliated off-premises telecommunications terminal (e.g., cell phone, etc.), the call is automatically routed to its destination through at least a portion of the private network of private branch exchanges when doing so reduces the cost of the call. In the illustrative embodiment, the call routing is performed automatically and transparently via software on the affiliated terminals (i.e., employees' cell phones) and on the organization's private branch exchanges. | 01-22-2009 |
20090016370 | Creating a Telecommunications Channel from Multiple Channels that Have Differing Signal-Quality Guarantees - A technique is disclosed that enables the adaptive pooling of M transmission paths that offer a first signal-quality guarantee, or no guarantee at all, with N transmission paths that offer a second signal-quality guarantee. Through this adaptive pooling, a telecommunications channel is created that meets the quality of service or waveform quality required for a packet stream being transmitted, while not excessively exceeding the required quality. The technique adaptively recaptures any excess signal quality from one path and uses it to boost the quality of an inferior path. A node of the illustrative embodiment selects the paths to handle a current segment of source packets, based on one or more parameters that are disclosed herein. The node adapts to changing conditions by adjusting the transmission characteristics for each successive segment of packets from the source packet stream. | 01-15-2009 |
20080319940 | Message Log Analysis for System Behavior Evaluation - A technique is disclosed that enables the run-time behavior of a data-processing system to be analyzed and, in many cases, to be predicted. In particular, the illustrative embodiment of the present invention comprises i) transforming the messages that constitute an unstructured log into a numerical series and ii) applying a time-series analysis on the resultant series for the purpose of pattern detection. Indeed, it is recognized in the illustrative embodiment that the problem really is to detect patterns that depict aspects of system behavior, regardless of the textual content of the individual log messages. In other words, by analyzing the totality of the messages in the log or logs—as opposed to looking for pre-defined patterns of the individual messages—system behavior can be mapped and understood. The mapping helps in characterizing the system for the purposes of predicting failure, determining the time required to reach stability during failure recovery, and so forth. | 12-25-2008 |
20080307519 | PEER-TO-PEER NETWORK OVER A VIRTUAL PRIVATE NETWORK - The present invention provides a new network topology. More specifically, a peer-to-peer network is defined on a virtual private network. The peer-to-peer network comprises a set of specified users within a virtual private network that are allowed to communicate according to predetermined rules enforced by the peer-to-peer network itself. This affords secure communication between the specified users of the peer-to-peer network independent of the virtual private network. | 12-11-2008 |
20080239148 | Sharing a Video Display Between Telephony and Computing Devices - An apparatus and method are disclosed that enable the sharing, between a telephone and a computer, of input peripherals such as a keyboard and mouse and of output peripherals such as a video display. Historically, a telephone and a computer have possessed different interfaces with their user and with peripheral devices. Therefore, except where the telephone functionality is in the form of a softphone implemented on a computer, the telephone in the prior art is often incapable of sharing certain peripherals with a physically-adjacent computer. The telephone device of the illustrative embodiment enables sharing between the telephone and a computer, in contrast to sharing peripherals between computers in the prior art. The telephone device is able to determine which user inputs from a shared keyboard or mouse are intended for which data-processing device (i.e., the telephone device itself or the computer), and to transmit displayable signals from both the telephone device and computer to a shared video display device. | 10-02-2008 |
20080236099 | Packaging for Electrical Equipment - Packaging for electrical equipment is disclosed in which metal electrically conductive staples are stapled—in contrast to tacked—through the packaging to provide an electrical path between the inside and the outside of the packaging. On the inside of the packaging, each staple clutches and is electrically connected to a wire that is connected to a jack on the electrical equipment. This provides an electrical path between the outside of the packaging and the electrical equipment. When the electrical equipment is to be tested or configured, the testing tool is connected to the staples on the outside of the packaging with spring-load clips. This provides as many electrical paths between the testing tool and the electrical equipment as necessary or desirable and for very little cost. | 10-02-2008 |
20080233934 | Teleconferencing System with Multiple Channels at Each Location - A method is disclosed that breaks the “one line, one location” paradigm of teleconferencing in the prior art. The teleconference bridge in the illustrative embodiment is able to utilize more than one audio channel from each location, where there are multiple signal sources present in the room. As a result, the bridge is able to determine acoustically whether two are more endpoints are collocated with each another. During an initialization sequence, the bridge transmits special audio signals to one or more endpoints present in a particular sound field; those endpoints then play the signals out of their loudspeakers. Based on a characteristic (e.g., amount of correlation, signal strength, etc.) of the signals received at each microphone present in the same sound field, the bridge determines whether to include or exclude signals that are received from a first endpoint when preparing a signal for transmission to a second endpoint during a conference call. | 09-25-2008 |
20080233933 | Structured Conference Calls - A conference call is disclosed that is partitioned into two or more topics by a host. Participants to the conference call can then inform the illustrative embodiment which topic or topics they are interested in and where they can be reached over the course of the conference call. At that point, those people who are not interested in the immediate topic can hang up or put their terminal on mute or other go about their business. As the conference call progresses from topic to topic, the host, or another person, informs the illustrative embodiment which topic is next to be discussed. The illustrative embodiment then alerts the participants who indicated their interest in the topic if their terminal is on mute or standby and adds the participants that are not connected to the conference call at all. | 09-25-2008 |
20080232573 | User-Programmable Call Progress Tone Detection - A telecommunications system is disclosed that enables a telecommunications switch to be “user” programmable in the “field”—in contrast to only programmable by the manufacturer or third-party software company—with audio samples. Each audio sample is exemplar of a sound that might be encountered during or after the establishment of a telecommunications call that is handled by the telecommunications switch. In accordance with the illustrative embodiment, the audio samples are received by the telecommunications switch through one or more of the same ports that the telecommunications switch uses to route calls, in contrast to programs and program data that are received by the telecommunications switch through a programming port. | 09-25-2008 |
20080232570 | Automatic Reconstitution of Telecommunications Sessions - A telecommunications feature is disclosed that enables a person to disconnect from a telecommunications session (e.g., a telephone call, a chat session, a video conference, etc.) and to be automatically reconnected at a later time. For example, Fred might be required to participate in his project group's weekly conference call, but as a practical matter Fred really only need to participate at the beginning and end of the meeting. After the conference call begins and Fred learns that the meeting will end at 4:00 PM, Fred uses the present invention to program his telephone to disconnect from the conference call now and to automatically reconnect to the conference call at 3:45 PM. This gives Fred the opportunity to get some work done and yet not miss the end of the conference call. | 09-25-2008 |
20080232569 | Teleconferencing System with Multi-channel Imaging - A method is disclosed that breaks the “one line, one location” paradigm of teleconferencing in the prior art. The teleconference bridge in the illustrative embodiment is able to utilize more than one audio channel from each location. By having access to more than one audio channel from a teleconference location's sound field, the bridge is able to create a multi-channel effect during a conference call. When more than one microphone is present in the first sound field, they can be used to create a multi-channel effect in a second or other sound field involved in a conference call that has more than one loudspeaker. With the bridge mimicking the multi-channel imaging in one room with the multi-channel imaging in another, the conference call participants can experience audio depth during a conference call and can experience two-dimensional imaging, depending on the microphone or speaker separation that is present. | 09-25-2008 |
20080232568 | Adaptive, Multi-channel Teleconferencing System - A method is disclosed to determine the presence of one or more cellular phones in the same sound field as an endpoint that is dedicated for teleconferencing, such as a speakerphone. The teleconference bridge of the illustrative embodiment continually receives geo-location information about the cell phone. Based on the geo-location of the cell phone relative to the position of the speakerphone, the bridge determines whether to include or exclude signals that are received from the cell phone when preparing a signal for transmission to the speakerphone during a conference call. The bridge also determines whether to refrain from transmitting an audio signal to the cell phone, when the bridge infers that the cell phone is being used as a satellite microphone, such as when the cell phone is placed on a conference room table. As a result, each conference call participant is able to use his or her own cell phone as a personal satellite microphone, which can improve the sound quality of the conference call. | 09-25-2008 |
20080232566 | Adaptive, Context-Driven Telephone Number Dialing - A technique is disclosed that enables a context-driven, adaptive technique for generating a list of telephone numbers. The technique of the illustrative embodiment of the present invention seeks to dynamically anticipate what telephone numbers a user might want to dial—even before the user knows—and presents the names of the parties and their telephone numbers to the user at his or her terminal. In particular, the technique monitors a user, the user's locale, and one or more terminals in that locale; selects one or more telephone numbers from a master set of numbers, based on the monitored information; and presents the selected numbers to the user—for example, in the form of a speed-dial list or a one-touch dial list. The user can then examine the presented telephone numbers and decide if he or she wants to call one of them. The technique can be implemented at the user's computer, telephone, private branch exchange, or other device in the relevant telecommunications system. | 09-25-2008 |
20080232556 | Keyword Alerting in Conference Calls - A conferencing system is disclosed in which a participant to a conference call can program the embodiment to listen for one or more “keywords” in the conference call. The keywords might be a participant's name or words associated with him or her or words associated with his or her area of knowledge. The embodiments uses speech recognition technology to listen for those words. When the embodiments detects that those words have been spoken, the embodiment alerts the participant—using audible, visual, and/or tactile signals—that the participant's attention to the call is warranted. When the keywords are chosen wisely, the benefit can be great. | 09-25-2008 |
20080232358 | Data Distribution in a Distributed Telecommunications Network - A technique is disclosed that enables a set of information to be represented by data packets, where those data packets can then be distributed as needed throughout the telecommunications system that uses the data. The data packet of the illustrative embodiment is an autonomous encapsulation of data, a subsection of a data model at a certain time in relation to other data in the system at another time. The data packet is identified at a particular time and value with a globally unique identifier. Relationships of the data packet to other data packets are made known by using references to the other packets. As a result, referenced data packets are retrieved throughout the system based on their relationships to each other. Whenever a data packet is transmitted or received, each node involved in the transmission applies rules that determine where the data has to be transmitted to and what to do with the data when received. | 09-25-2008 |
20080227439 | Emulation of Private Branch Exchange Behavior - An apparatus and methods are disclosed for use by organizations that have PBXs at a plurality of sites. The invention pertains to cell phone calls from an to his or her “home” private branch exchange. For example, an employee who works at the Chicago branch office might call the Chicago office's PBX to invoke a feature such as setting up call forwarding, retrieving voice mail, etc. In the illustrative embodiment, such calls might be automatically and transparently directed to another PBX when it is advantageous to do so (e.g., for the purposes of security, reducing toll charges, because of unavailability of a particular PBX, etc.) Factors that might be used to determine whether to re-direct a call and to which PBX to re-direct a call include the day and time of the call, the network that the cell phone is currently connected to, etc. | 09-18-2008 |
20080201418 | Web-Based Sharing of Documents - A technique is disclosed that enables telecommunications endpoints to conveniently share the addressing information—that is, the Uniform Resource Identifiers (URI)—of documents that are available on the World Wide Web. In particular, a server is used to provide a bookmark service. The server acts as a repository of tag-URI pairs, in which each tag functions as a shorthand label for the corresponding URI. In the disclosed technique, a first user creates the tag for the intended URI by assigning a keyword to represent the URI as part of a bookmark tag-URI pair that the server stores. The created tag is presumably shorter than the URI that it represents, making the tag more convenient to use. A second user is then able to retrieve and use the URI by specifying the tag to the bookmark server. In essence, the technique of the illustrative embodiment enables the sharing of Web documents by sharing the bookmarks to those documents. | 08-21-2008 |
20080199009 | Signal Watermarking in the Presence of Encryption - A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as “watermarking.” The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues. | 08-21-2008 |
20080198045 | Transmission of a Digital Message Interspersed Throughout a Compressed Information Signal - A method is disclosed that enables the transmission of a digital message along with a corresponding media information signal, such as audio or video. A telecommunications device that is processing the information signal from its user, such as a speech signal, encodes the information signal by using a model-based compression coder. One such device is a telecommunications endpoint. Then, based on an evaluation of the perceptual significance of each encoded bit, or on some other meaningful characteristic of the signal, the endpoint's processor: (i) determines which encoded bits can be overwritten; and (ii) intersperses the digital message bits throughout the encoded signal in place of the overwritten bits. The endpoint then transmits those digital message bits as part of the encoded information signal. In this way, no additional bits are appended to the packet to be transmitted, thereby addressing the issue of compatibility with existing protocols and firewalls. | 08-21-2008 |