Patent application number | Description | Published |
20100185787 | DYNAMIC CALL HANDLING FROM MULTIPLE ATTACHED DEVICES - Multiple peripheral devices are used for various modes of communication in a unified communication application. Employing standard or custom protocols, connected peripheral devices can be configured automatically and different modes of communication such as audio, video, data, and text, are routed to available or selected peripheral devices. Incoming communication requests can be extended to multiple peripheral devices synchronously and users enabled to switch between peripheral devices seamlessly during a communication session. | 07-22-2010 |
20100239081 | DYNAMIC CONFIGURATION OF CALL CONTROLS FOR COMMUNICATION PERIPHERALS - Callers of an enhanced communication system are enabled to improve their communication experience by receiving context specific call controls on their peripheral device before, during, and/or after a call. A communication application determines context specific commands and configures/reconfigures call controls on the peripheral device. The peripheral device displays the call context specific controls in different stages of operation and forwards user selection(s) to the communication application without a need to understand the commands of perform actions associated with the commands. | 09-23-2010 |
20120017172 | DISPLAY-AGNOSTIC USER INTERFACE FOR MOBILE DEVICES - Application user interfaces can be displayed on different sizes and types of displays without having to modify the application for each different display by scaling a layout of the user interface automatically for specific displays, especially smaller size displays such as mobile device displays, reducing a need to create customized versions of the application. | 01-19-2012 |
Patent application number | Description | Published |
20090296930 | TECHNIQUES TO PROVISION AND MANAGE A DIGITAL TELEPHONE TO AUTHENTICATE WITH A NETWORK - Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management component may also comprise a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a computing device, and decrypt the encrypted security credentials with the PIN. The digital telephone management component may further comprise a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to authenticate the digital telephone using the security credentials. Other embodiments are described and claimed. | 12-03-2009 |
20090327426 | REMOTE CALL CONTROL AND CONFERENCING USING PAIRED DEVICES - In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session. | 12-31-2009 |
20100329461 | AUTOMATIC DETECTION OF WIRELESS NETWORK TYPE - A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted net work requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled net work supporting WPA anchor an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks The detection component identities a type of an available wireless network. Identification can be based for example, upon information received in an information element and/or iterative probing of the wireless network beacon. | 12-30-2010 |
20110282985 | NETWORK AND INTERFACE SELECTION ON A COMPUTING DEVICE CAPABLE OF ESTABLISHING CONNECTIONS VIA MULTIPLE NETWORK COMMUNICATIONS MEDIA - A system and method for carrying out network and interface selections across multiple media is disclosed. The disclosed system facilitates automated network interface configuration decision-making that spans a set of networks supporting communications via differing media. A set of media specific modules associated with differing communications media acquire network interface status/capabilities information. A rules engine thereafter applies a designated network selection rule(s) to the acquired network interface status/capabilities information, and any other appropriate parameters attributable to either an interface or network, to select one or more networks and interfaces with which to establish/maintain a connection. | 11-17-2011 |
20120300014 | LOCAL PARTICIPANT IDENTIFICATION IN A WEB CONFERENCING SYSTEM - An event computer receives video in which one or more local participants of a conferencing event are viewable. The event computer receives head detection information of the local participants and assigns contextual data to the head detection information for each of the local participants for which head detection information is received. The event computer then sends the video, the head detection information, and the contextual data to one or more remote participant computer systems by which one or more remote participants can view the local participants and their corresponding contextual data within the video. | 11-29-2012 |
20130263216 | PARTICIPANT AUTHENTICATION AND AUTHORIZATION FOR JOINING A PRIVATE CONFERENCE EVENT VIA A CONFERENCE EVENT ENVIRONMENT SYSTEM - Concepts and technologies are described herein for a mechanism by which participants who have been invited to attend a conference event and who are physically present within a conference event environment, such as a meeting room, can provide authentication credentials to join the conference event via a conference event environment system. When an individual attempts to join a conference event via a conference event environment system, the individual is prompted to provide his or her authentication credentials to join the conference event via the conference event environment system to participate in the conference event. The conference event environment system may inherit the individual's permissions, such as in regards to whether or not the individual has been permitted to present content during the conference event. A conference event roster may be used to indicate that the individual has joined the conference via the conference event environment system. | 10-03-2013 |
20140267559 | Smart Device Pairing and Configuration for Meeting Spaces - Pairing and configuring a computing device for use in a meeting space is provided. An appliance may communicate a broadcast to a computing device which announces the availability of a meeting space for a meeting. The computing device may establish a connection with the appliance. The computing device may then join the meeting in the meeting space. | 09-18-2014 |
20150350267 | ENHANCED DISCOVERY FOR AD-HOC MEETINGS - Systems, methods, and software are disclosed herein for enhancing ad-hoc online meetings. In an implementation, a service client receives an initial handoff of an online session from an initial service client that was ongoing between the initial service client and at least one other service client. The service client detects when proximate to an in-room service client. When proximate to the in-room service client, the service client initiate a subsequent handoff of the online session to the in-room service client. | 12-03-2015 |
20150350333 | ENHANCED DISCOVERY FOR AD-HOC MEETINGS - Systems, methods, and software are disclosed herein for enhancing ad-hoc online meetings. A service client, when executed by a computing system, directs the computing system to at least detect an in-room discovery signal, identify a room from the in-room discovery signal, identify a session based on the room associated with the in-room discovery signal, and join the session. | 12-03-2015 |
Patent application number | Description | Published |
20090126001 | TECHNIQUES TO MANAGE SECURITY CERTIFICATES - Techniques to manage security certificates are described. An apparatus may comprise a certificate proxy server having a transceiver and a certificate manager module. The certificate manager module may be operative to register a digital identity certificate for a call terminal to perform authentication operations on behalf of the call terminal, and manage the digital identity certificate for the call terminal. Other embodiments are described and claimed. | 05-14-2009 |
20090182819 | TECHNIQUES TO SELECTIVELY SHARE MESSAGES - Techniques to selectively share messages are described. An apparatus may comprise a trusted delegate server having a message sharing module. The message sharing module may be operative to selectively retrieve messages for a primary message recipient from a unified messaging server based on a message type defined by a message sharing policy. The messaging sharing module may send the messages to a secondary message recipient for the message type as defined by the message sharing policy over a packet-switched network. Other embodiments are described and claimed. | 07-16-2009 |
20130237240 | IDENTIFYING MEETING ATTENDEES USING INFORMATION FROM DEVICES - Physical presence of a mobile device in proximity to a physical meeting place can be recognized. Identifying information can be retrieved from the device, and it can be determined whether the identifying information correlates to identifying information for a profile in an invitee list for a current meeting at the meeting place. If the retrieved identifying information correlates to identifying information for the profile in the invitee list for the meeting at the meeting place, then the profile can be included as an attendee at the meeting (e.g., by including identifying information for the profile in an attendee list). The identifying information such as the attendee list may also be used to perform one or more additional acts, such as sending notifications, personalizing settings, etc. | 09-12-2013 |
20130298204 | Automatic Detection of Wireless Network Type - Techniques for facilitating automatic detection of a type of wireless network are described. In accordance with one or more embodiments, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. In accordance with one or more embodiments, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identifies a type of an available wireless network. Identification can be based, for example, upon information received in an information element and/or iterative probing of the wireless network beacon. | 11-07-2013 |
20130343553 | Detection of Device Configuration - Devices connected with a computer system are interrogated to detect whether they are configured and functioning. In an audio device implementation, a known audio sample is output to a loudspeaker. If the loudspeaker is properly configured and functional, an attached microphone will capture the sound corresponding to the audio sample generated by the loudspeaker. If sound corresponding to the audio sample is detected, an indication is provided to the user that the microphone and loudspeaker are operational. If no sound corresponding to the audio sample is detected, an indication is provided to the user that the loudspeaker is not enabled and additional configuration is required. | 12-26-2013 |
20140344366 | AUTOMATIC UTILIZATION OF RESOURCES IN A REALTIME CONFERENCE - The architecture facilitates the association of resources (e.g., hardware software) with a meeting location such as a conference room or conference space. Additionally, the room and resources can be associated with a realtime conference or meeting at the meeting location. Still further, the resources can be automatically joined to the meeting being held in the room, for both the organizer of the meeting and the remote participants of the meeting. The resources are network addressable and register to a communications infrastructure for online availability. The architecture automatically joins the conference room resources to any conference or call that is being held in the locale (e.g., room) of the conference, and which the user has joined using a realtime conferencing application. The resources distributed across multiple meeting locations can be utilized for a single session, as well. | 11-20-2014 |
20150067536 | Gesture-based Content Sharing Between Devices - Various embodiments provide an ability to join a virtual conference session using a single input-gesture and/or action. Upon joining the virtual conference, some embodiments enable a computing device to share content within the virtual conference session responsive to receiving a single input-gesture and/or action. Alternately or additionally, the computing device can acquire content being shared within the virtual conference session responsive to receiving a single input-gesture and/or action. In some cases, content can be exchanged between multiple computing devices connected to the virtual conference session. | 03-05-2015 |
20150200786 | Accessing and Configuring Meeting Attributes - Techniques for accessing and configuring meeting attributes are described. In at least some embodiments, a meeting object is leveraged to store meeting attributes and pointers to meeting-related content. A meeting object, for instance, can serve as a manifest for meeting attributes. According to various embodiments, different entities (e.g., applications, services, and so forth) can access a meeting object to ascertain and/or configure meeting attributes for a meeting. For instance, a meeting application programming interface (API) can be employed to enable different entities to interact with a meeting object in various ways. | 07-16-2015 |
Patent application number | Description | Published |
20100246448 | AUTOMATIC UTILIZATION OF RESOURCES IN A REALTIME CONFERENCE - The disclosed architecture facilitates the association of resources (e.g., hardware software) with a meeting location such as a conference room or conference space. Additionally, the room and resources can be associated with a realtime conference or meeting at the meeting location. Still further, the resources can be automatically joined to the meeting being held in the room, for both the organizer of the meeting and the remote participants of the meeting. The resources are network addressable and register to a communications infrastructure for online availability. The architecture automatically joins the conference room resources to any conference or call that is being held in the locale (e.g., room) of the conference, and which the user has joined using a realtime conferencing application. The resources distributed across multiple meeting locations can be utilized for a single session, as well. | 09-30-2010 |
20100278322 | USER-BASED AUTHENTICATION FOR REALTIME COMMUNICATIONS - Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location. | 11-04-2010 |
20100319063 | ACCESS CONTROL TO SECURED APPLICATION FEATURES USING CLIENT TRUST LEVELS - Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features. | 12-16-2010 |
20130182832 | USER-BASED AUTHENTICATION FOR REALTIME COMMUNICATIONS - Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location. | 07-18-2013 |
Patent application number | Description | Published |
20080210475 | Ink Editing Architecture - A system and process for capturing and rendering ink is described. An ink canvas object may contain none, one, or more objects or elements and may specify the z-order of the objects or elements. The ink canvas object may host a variety of objects or elements and, therefore, provide ink functionality to the objects or elements, even though the objects or elements themselves may not have ink functionality. The ink canvas object is attached to an ink editor that has an associated modifiable ink editor behavior, whereby ink specific behaviors are collected in the ink edit behavior. | 09-04-2008 |
20090189879 | Synchronization of Plugins - A system and process for ensuring the smooth flow of electronic ink is described. Dynamic rendering is give priority over other event handlers. Priority may be the use of one or more queues to order when events occur and may be performing dynamic rendering prior to other steps. | 07-30-2009 |
20110225331 | GENERIC INTERFACE - A system and process for ensuring the smooth flow of electronic ink is described. Dynamic rendering is given priority over other event handlers. Priority may be the use of one or more queues to order when events occur and may be performing dynamic rendering prior to other steps. | 09-15-2011 |
20120242625 | GENERIC INTERFACE - A system and process for ensuring the smooth flow of electronic ink is described. Ink-stroke information associated with one or more data packets is received, and it is determined that the ink-stroke information comprises a gesture indication. The gesture indication is communicated to an ink collection object which causes the ink collection object to delete the ink stroke information. | 09-27-2012 |