Patent application number | Description | Published |
20090189892 | METHODS AND SYSTEMS FOR DETECTING A DIRTY REGION WITHIN A FRAME ENCOMPASSING THREE DIMENSIONAL GRAPHICS - Methods and systems for detecting a dirty region within a frame encompassing three dimensional graphics and three dimensional graphics primitives. The methods and systems include executing an application on a local computing machine, the application generating three dimensional graphics, and issuing at least one function call. An agent also executes on the local computing machine to intercept the issued function call; identify, in response to intercepting the function call, at least one location within a frame that contains three dimensional graphics commands generated by the application, where the identified location corresponding to a drawing region; determine a change in a portion of the three dimensional graphics commands associated with the identified location; and extract the changed portion. The agent may also identify a plurality of locations and a plurality of changed three dimensional graphics commands at those locations. | 07-30-2009 |
20110078318 | METHODS AND SYSTEMS FOR LOAD BALANCING USING FORECASTING AND OVERBOOKING TECHNIQUES - Methods and systems for establishing user sessions between a client and a server or server farm can be carried out by a load balancing agent executing on a computer in communication with the client, server or server farm. The load balancing agent can intercept a connection request generated by an application executing on a client and responsively select a server on which to establish a user session. Selecting the server can be based on overbooking a particular server and choosing a server with a predetermined amount of forecasted load. Forecasted load can be determined by summing the current load on a server with a current load calculated by multiplying: the average load on the user sessions hosted by the server; by the number of cached user sessions stored on the server; and by the probability that a cached user session reconnects. | 03-31-2011 |
20110115800 | METHODS AND SYSTEMS FOR SELECTIVE IMPLEMENTATION OF PROGRESSIVE DISPLAY TECHNIQUES - The present disclosure relates to systems and methods for selective implementation of progressive display techniques based on a number of frames displayed in a window. A first hooking component identifies for a window displaying first application data on a local computing device a number of frames to be displayed in the window. A display manager generates, based on the identified number of frames to be displayed, an instruction to compress an identification of an update to the application data. The data is compressed and sent and transmitted to the local device in order to be displayed on the window. A display manager may determine for another window displaying a different application data on the local device whether or not to compress a second identification of an update to the second application data. The second application data may be transmitted to the local device compressed or not compressed based on the determination. | 05-19-2011 |
20110276806 | Creation and Delivery of Encrypted Virtual Disks - The present application is directed to methods and systems for receiving a request for a virtual disk and creating a virtual disk that includes the virtual disk attributes identified in the request or determined by an organization's security policies. The created virtual disk can then be encrypted and in some aspects, an encryption key for the encrypted virtual disk can be stored in an encryption key database. Upon creating and encrypting the virtual disk, the virtual disk can be transmitted to a client. The client, upon receiving the encrypted virtual disk, can mount the virtual disk into the client system. The encrypted virtual disk may be stored as a file within an unencrypted virtual disk, and the unencrypted virtual disk backed up to a local or remote storage location. | 11-10-2011 |
20120084713 | Providing User Interfaces and Window Previews for Hosted Applications - A local computing device may use a remote computing device to host various resources on behalf of the local computing device. The local computing device may receive data related to a graphical window of the remotely hosted resource and generate a graphical window on the local desktop environment for the remotely hosted resource. The local computing device may also update a taskbar to include the remote hosted resource. Window previews may also be generated by the local computing device and the window previews may include snapshots or dynamic images of the graphical window for the remotely hosted resource. In some instances, the snapshots may be provided to the local computing device from the remote computing device. | 04-05-2012 |
20140095894 | Policy-Based Application Management - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things. | 04-03-2014 |
20140096186 | Policy-Based Application Management - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things. | 04-03-2014 |
20140201679 | PROVIDING USER INTERFACES AND WINDOW PREVIEWS FOR HOSTED APPLICATIONS - A local computing device may use a remote computing device to host various resources on behalf of the local computing device. The local computing device may receive data related to a graphical window of the remotely hosted resource and generate a graphical window on the local desktop environment for the remotely hosted resource. The local computing device may also update a taskbar to include the remote hosted resource. Window previews may also be generated by the local computing device and the window previews may include snapshots or dynamic images of the graphical window for the remotely hosted resource. In some instances, the snapshots may be provided to the local computing device from the remote computing device. | 07-17-2014 |
20140215555 | Conjuring and Providing Profiles that Manage Execution of Mobile Applications - Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein. | 07-31-2014 |
20140297825 | DATA MANAGEMENT FOR AN APPLICATION WITH MULTIPLE OPERATION MODES - A method and system for managing an application with multiple modes are described. A device manager that manages a mobile device may monitor the mobile device. The device manager may detect that a first type of application that runs in a managed mode (or in multiple managed modes) and an unmanaged mode is installed on the mobile device. When the application is executed on the device, the application executes in accordance with the selected application mode, e.g., based on location, user, role, industry presence, or other predefined context. | 10-02-2014 |
20140298402 | Data Management for an Application with Multiple Operation Modes - A method and system for managing an application with multiple modes are described. A device manager that manages a mobile device may monitor the mobile device. The device manager may detect that a first type of application that runs in a managed mode (or in multiple managed modes) and an unmanaged mode is installed on the mobile device. When the application is executed on the device, the application executes in accordance with the selected application mode, e.g., based on location, user, role, industry presence, or other predefined context. | 10-02-2014 |
20140331285 | Mobile Device Locking with Context - A method and system for locking a mobile device on an interface are described. A user logs on to a mobile device with a user name. The mobile device then determines a context for the mobile device based on one or more operational parameters and/or the user name. For example, a context for the mobile device may be a current location of the device. Based on the context and user name, the mobile device may run in locked mode. In locked mode, applications are selected to be presented on the mobile device based on the user name and context. The mobile device is locked on a springboard that presents only the selected applications to the user for launching. A user may switch between launched applications on the mobile device, but the user may only switch between launched applications that are presented on the springboard. | 11-06-2014 |
20140337528 | POLICY-BASED APPLICATION MANAGEMENT - Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things. | 11-13-2014 |
20150067769 | Providing Virtualized Private Network Tunnels - Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects. | 03-05-2015 |
20150095975 | Configuring and Providing Profiles that Manage Execution of Mobile Applications - Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein. | 04-02-2015 |
20150106424 | METHODS AND SYSTEMS FOR LOAD BALANCING USING FORECASTING AND OVERBOOKING TECHNIQUES - Methods and systems for establishing user sessions between a client and a server or server farm can be carried out by a load balancing agent executing on a computer in communication with the client, server or server farm. The load balancing agent can intercept a connection request generated by an application executing on a client and responsively select a server on which to establish a user session. Selecting the server can be based on overbooking a particular server and choosing a server with a predetermined amount of forecasted load. Forecasted load can be determined by summing the current load on a server with a current load calculated by multiplying: the average load on the user sessions hosted by the server; by the number of cached user sessions stored on the server; and by the probability that a cached user session reconnects. | 04-16-2015 |
20150143120 | Controlling Mobile Device Access to Secure Data - Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device. | 05-21-2015 |
20150199213 | PROVIDING MOBILE APPLICATION MANAGEMENT FUNCTIONALITIES - Methods, systems, computer-readable media, and apparatuses for providing mobile application management (MAM) functionalities are presented. In some embodiments, a mobile device may initialize a partially managed application associated with a first managed user account and an unmanaged user account. The mobile device may execute first managed tasks associated with the first managed user account in accordance with a first set of MAM policies provided by a first MAM service provider. The mobile device may execute unmanaged tasks associated with the unmanaged account independent of the first set of MAM policies. In some embodiments, the mobile device may initialize the multi-account managed application associated with a second managed user account. | 07-16-2015 |
20150319178 | REMOTE ASSISTANCE FOR MANAGED MOBILE DEVICES - According to some aspects disclosed herein, a system for remote assistance and control of user devices subject to one or more remote assistance policies may be provided. In some embodiments, an administrator may request remote control of a managed user device. A managed application launcher may be provided by the user device and may be modified by the user device to remove managed applications or otherwise prevent access to applications that have a policy indicating that remote assistance is not allowed. The administrator may open a managed application included in the launcher and remotely control that application. In other embodiments, a user of the managed user device may initiate a request for remote assistance from within a managed application and/or the managed application launcher. The administrator's control of the user device and access to other applications on the user device may be limited based on the remote assistance policies. | 11-05-2015 |
20160057278 | Mobile Device Locking based on Context - A method and system for locking a mobile device on an interface are described. A user logs on to a mobile device with a user name. The mobile device then determines a context for the mobile device based on one or more operational parameters and/or the user name. For example, a context for the mobile device may be a current location of the device. Based on the context and user name, the mobile device may run in locked mode. In locked mode, applications are selected to be presented on the mobile device based on the user name and context. The mobile device is locked on a springboard that presents only the selected applications to the user for launching. A user may switch between launched applications on the mobile device, but the user may only switch between launched applications that are presented on the springboard. | 02-25-2016 |
Patent application number | Description | Published |
20120039448 | TESTING CALL ROUTING - A device may automatically place a call to a call routing device based on one of a list of numbers or addresses. The call may be forwarded by the call routing device to a call agent device. The device may also establish a session with the call agent device to which the call is forwarded by the call routing device and automatically receive, from the call agent device, a message that includes an identifier for a virtual call agent. The device may extract the identifier from the received message, compare the extracted identifier to an identifier that is associated with the call, and determine whether the call routing device correctly forwarded the call based on the comparison. | 02-16-2012 |
20120041965 | LOAD BALANCING BASED ON DEEP PACKET INSPECTION - A device may receive a packet, determine a content identifier of the packet, identify a first processing device that has processed part of content associated with the content identifier, send the packet to the first processing device when the first processing device is identified, select a second processing device among a plurality of processing devices when the first processing device is not identified, and send the packet to the second processing device. | 02-16-2012 |
20120066731 | CUSTOMER SERVICE CONTACT - A method may include receiving, from a first user device, one or more session control protocol messages to establish a session between a workstation and a second user device, wherein the one or more session control protocol messages include context information indicating a context for establishing the session and an identifier of the second user device. The method may further include establishing a session between the network device and the second user device and displaying information indicating the context information on a display for an operator of the network device. | 03-15-2012 |
20120072440 | CUSTOMER SERVICE CONTACT - A method may include receiving session control protocol messages to establish a session between a workstation and a user device. The session control protocol messages may include context information. The context information may include a browser history associated with the user of the user device. The method may further include establishing the session between the workstation and the user device. Further, the method may include displaying information on a display for an operator of the workstation, wherein the displayed information is based on the received context information. | 03-22-2012 |
20120076279 | REAL-TIME ANALYTICS PAYMENT INFORMATION SCREENING - A method including receiving a voice call; analyzing speech in real-time to determine whether payment information is included in the voice call; omitting to record the voice call when it is determined that the voice call includes the payment information; and recording the voice call when it is determined that the voice call does not include the payment information. | 03-29-2012 |
20140153703 | CONTACT CENTER CALL BACK - A method may include receiving a call from a caller and determining whether the call has been queued for at least a predetermined period of time. The method may also include interacting with the customer via an interactive voice response unit, in response to determining that the call has been queued for at least the predetermined period of time, to offer a call back service to the customer. The call back service may include a scheduled call back or an immediate type call back when an agent is available. The method may further include receiving, from the customer and via the interactive voice response unit, an indication that the customer would like a call back and queuing the call back. | 06-05-2014 |
Patent application number | Description | Published |
20090316877 | METHOD AND SYSTEM FOR A CALL TRANSFER - A system for and method of providing a gateway transfer mechanism is presented. In one exemplary embodiment, the system and method of providing a gateway transfer mechanism may be realized as a method, comprising identifying, at a gateway, a call to be routed to a first location, determining whether to transfer the call to a second location, in the event the call is to be transferred to the second location, transferring the call, wherein transferring the call comprises ending a process to route the call to the first location, generating transfer information for the second location, and transferring the call to the second location using the generated transfer information. | 12-24-2009 |
20100158234 | METHOD AND SYSTEM FOR TRUNK INDEPENDENT GATEWAY TRANSFER OF CALLS - Techniques for providing a method and system for trunk independent gateway transfer of calls are disclosed. In one particular exemplary embodiment, the techniques may be realized as a computer implemented method, comprising receiving a call transfer request for a call at a gateway and determining, using a processor of the gateway, whether a trunk to be used for transferring the call requires a transfer command. In the event the trunk requires transfer command, the techniques comprise generating a transfer command, and transferring the call using the transfer command. | 06-24-2010 |
20110069700 | SYSTEM FOR AND METHOD OF INFORMATION ENCODING - A system for and method of information encoding is presented. The system and method include encoding information within other information of a protocol, and then decoding the information and performing actions based on the decoded information. | 03-24-2011 |
20110069827 | METHOD AND SYSTEM FOR TRANSFER OF CALLS FROM AN IP BASED PHONE - A system for and method of providing a call transfer is presented. In one exemplary embodiment, the system and method of providing a call transfer may comprise receiving, via a network interface, a call at an IP based phone, the call originating from outside a network of the IP based phone, parsing one or more portions of call information to identify a unique network interface indicator associated with the network interface, receiving a request to transfer the call, and transferring the call to the network interface using the unique network interface indicator. | 03-24-2011 |
20110321178 | SYSTEM FOR AND METHOD OF DYNAMIC EXTENSION ASSIGNMENT - A system for and method of system for performing dynamic extension assignment is presented. In one exemplary embodiment, the method may comprise receiving, via a network, an extension assignment request associated with a network endpoint, identifying the network endpoint based on one or more properties of the network endpoint, applying one or more rules to identify an extension to be assigned to the network endpoint based on the one or more properties of the endpoint, and assigning the extension to the network endpoint. | 12-29-2011 |
20120261465 | Technical Support Systems and Methods - Exemplary technical support systems and methods are disclosed herein. An exemplary method includes a media content access device obtaining technical support request information from a user, encoding data representative of the technical support request information into a barcode, and providing the barcode for display on a display screen associated with the media content access device. The exemplary method may additionally or alternatively include a mobile device capturing an image of the displayed barcode and transmitting data representative of the image to a technical support subsystem. The exemplary method may additionally or alternatively include a technical support subsystem receiving data representative of the image of the barcode, decoding the barcode code to obtain the technical support request information, and performing one or more technical support operations in response to the technical support request information. Corresponding methods and systems are also disclosed. | 10-18-2012 |
Patent application number | Description | Published |
20080260137 | VOICE PORTAL COMMUNICATIONS - A method includes receiving a telephone call at a network device and forwarding the telephone call to a proxy device. The method also includes forwarding the telephone call, from the proxy device, to a first voice portal and determining that telephone call should be transferred to a second voice portal. The method further includes forwarding, by the first voice portal, a transfer request to the network device and forwarding, by the network device, the telephone call to a second voice portal. | 10-23-2008 |
20120027184 | PROVIDING CALLER-SPECIFIC INFORMATION - A method may include receiving a call from a caller and interacting with the caller, via an interactive voice response (IVR) unit, to identify first information associated with a reason for the call. The method may also include accessing a database storing second information associated with the caller, identifying third information to be provided to the caller based on the stored second information and providing the third information to the caller prior to forwarding the call to an agent. | 02-02-2012 |
20120148040 | INTELLIGENT CALL TRANSFER - A method may include receiving, at a first call center, a call from a caller, forwarding the call to an agent workstation and determining that the call must be transferred. The method may also include providing, at the agent workstation, a user interface identifying a number of items associated with possible reasons for the call and receiving, via the user interface, input selecting one of the items. The method may further include appending information to the call based on the received input and forwarding the call with the appended information to a network device associated with a number of call centers. | 06-14-2012 |
20120224681 | CONTACT CENTER ROUTING - A method may include receiving a call from a caller and determining whether the caller has previously called a call center. The method may also include identifying, in response to determining that the caller has previously called the call center, an agent that handled the previous call from the caller, and forwarding the call to the agent that handled the previous call. | 09-06-2012 |
20120263293 | DYNAMIC UPDATE OF SKILLS DATABASE - A device may include a communication interface to receive messages, a skills database that includes a skills schedule table, and one or more processors. The one or more processors may detect an event based on one of the messages, determine whether the event satisfies a condition for changing a schedule associated with a skill of a call agent of a call center, modify the schedule in the skills schedule table when the event satisfies the condition for changing the schedule associated with the skill of the call agent, and send a request, based on the modified schedule associated with the skill of the call agent, to an automatic call distribution (ACD) device to change the skill of the call agent from a database of the ACD device. | 10-18-2012 |
20130215737 | Method and System for Trunk Independent Gateway Transfer of Calls - Techniques for providing a method and system for trunk independent gateway transfer of calls are disclosed. In one particular exemplary embodiment, the techniques may be realized as a computer implemented method, comprising receiving a call transfer request for a call at a gateway and determining, using a processor of the gateway, whether a trunk to be used for transferring the call requires a transfer command. In the event the trunk requires transfer command, the techniques comprise generating a transfer command, and transferring the call using the transfer command. | 08-22-2013 |
20140086400 | Method and System For A Gateway Transfer - Techniques for providing a gateway transfer mechanism are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising identifying, at a gateway, a call to be routed to a first location, determining whether to transfer the call to a second location, in the event the call is to be transferred to the second location, transferring the call, wherein transferring the call comprises ending a process to route the call to the first location, generating transfer information for the second location, and transferring the call to the second location using the generated transfer information. | 03-27-2014 |
20140169549 | CALL OCCUPANCY MANAGEMENT - A device may receive a history of call volumes and statistics for a call queue. The device may also receive, for each of a number of agents that are associated with the call queue, a work schedule. The device may determine a projected call occupancy for the call queue based on the history of call volumes for the call queue and the work schedules; select a subset of agents, among the number of agents that are associated with the call queue, that are not needed to handle calls in the call queue during a time for which projected call occupancy is below a first threshold; and assign tasks, for the time, to the subset of agents. | 06-19-2014 |
20150016600 | TIERED CALL ROUTING - A computer device may include logic configured to receive a request to route a call from an interactive voice response system; obtain information associated with the call; and obtain one or more metrics associated with a plurality of automatic call distribution centers. The logic may be further configured to select a rule to route the call based on the information associated with the call; and select a particular automatic call distribution center for the call based on the selected rule, based on the obtained information associated with the call, and based on the obtained one or more metrics. | 01-15-2015 |