Patent application number | Description | Published |
20090249094 | POWER-AWARE THREAD SCHEDULING AND DYNAMIC USE OF PROCESSORS - Techniques and apparatuses for providing power-aware thread scheduling and dynamic use of processors are disclosed. In some aspects, a multi-core system is monitored to determine core activity. The core activity may be compared to a power policy that balances a power savings plan with a performance plan. One or more of the cores may be parked in response to the comparison to reduce power consumption by the multi-core system. In additional aspects, the power-aware scheduling may be performed during a predetermined interval to dynamically park or unpark cores. Further aspects include adjusting the power state of unparked cores in response to the comparison of the core activity and power policy. | 10-01-2009 |
20100250230 | ENLIGHTENMENT FOR LOW OVERHEAD HARDWARE ACCESS - A computing system in which a software component executing on a platform can reliably and efficiently obtain state information about a component supported by the platform through the use of a shared memory page. State information may be supplied by the platform, but any state translation information needed to map the state information as supplied to a format as used may be provided through the shared page. In a virtualized environment, the state translation information can be used to map the value of a virtual timer counter or other component from a value provided by a virtual processor to a normalized reference time that will yield the same result, regardless of whether the software component is migrated to or from another virtual processor. Use of a shared page avoids the inefficiency of an intercept into a virtualized environment or a system calls in native mode operation. | 09-30-2010 |
20100251235 | TIMER ACCESS FROM USER MODE THROUGH A SHARED MEMORY PAGE - A computing system in which a software component executing on a platform can reliably and efficiently obtain state information about a component supported by the platform through the use of a shared memory page. State information may be supplied by the platform, but any state translation information needed to map the state information as supplied to a format as used may be provided through the shared page. In a virtualized environment, the state translation information can be used to map the value of a virtual timer counter or other component from a value provided by a virtual processor to a normalized reference time that will yield the same result, regardless of whether the software component is migrated to or from another virtual processor. Use of a shared page avoids the inefficiency of an intercept into a virtualized environment or a system calls in native mode operation. | 09-30-2010 |
20110307730 | Power-Aware Thread Scheduling and Dynamic Use of Processors - Techniques and apparatuses for providing power-aware thread scheduling and dynamic use of processors are disclosed. In some aspects, a multi-core system is monitored to determine core activity. The core activity may be compared to a power policy that balances a power savings plan with a performance plan. One or more of the cores may be parked in response to the comparison to reduce power consumption by the multi-core system. In additional aspects, the power-aware scheduling may be performed during a predetermined interval to dynamically park or unpark cores. Further aspects include adjusting the power state of unparked cores in response to the comparison of the core activity and power policy. | 12-15-2011 |
20130160012 | TIMER ACCESS FROM USER MODE THROUGH A SHARED MEMORY PAGE - A computing system in which a software component executing on a platform can reliably and efficiently obtain state information about a component supported by the platform through the use of a shared memory page. State information may be supplied by the platform, but any state translation information needed to map the state information as supplied to a format as used may be provided through the shared page. In a virtualized environment, the state translation information can be used to map the value of a virtual timer counter or other component from a value provided by a virtual processor to a normalized reference time that will yield the same result, regardless of whether the software component is migrated to or from another virtual processor. Use of a shared page avoids the inefficiency of an intercept into a virtualized environment or a system calls in native mode operation. | 06-20-2013 |
Patent application number | Description | Published |
20080248748 | Systems and methods for pairing Bluetooth devices - Embodiments of software-supervised pairing processes are provided. The processes enable a user to pair a mouse and keyboard with a Bluetooth transceiver without having to use a second mouse and keyboard. At least two separate processes are provided, including a long transition for initial pairing or re-pairing and a short transition for re-establishing a connection after devices have already been paired. | 10-09-2008 |
20120238212 | SYSTEMS AND METHODS FOR PAIRING BLUETOOTH DEVICES - Embodiments of software-supervised pairing processes are provided. The processes enable a user to pair a mouse and keyboard with a Bluetooth transceiver without having to use a second mouse and keyboard. At least two separate processes are provided, including a long transition for initial pairing or re-pairing and a short transition for re-establishing a connection after devices have already been paired. | 09-20-2012 |
20130232350 | Accessory Device Authentication - Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication. | 09-05-2013 |
20130232571 | Accessory Device Authentication - Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication. | 09-05-2013 |
20140020484 | Input Device Sensor Configuration - Input device configurations are described. In one or more implementations, an input device includes a sensor substrate having one or more conductors and a flexible contact layer spaced apart from the sensor substrate. The flexible contact layer is configured to flex to contact the sensor substrate to initiate an input of a computing device. The flexible contact layer includes a force concentrator pad that is configured to cause pressure to be channeled through the force concentrator pad to cause the flexible contact layer to contact the sensor substrate to initiate the input. | 01-23-2014 |
20140022177 | Input Device Configuration having Capacitive and Pressure Sensors - Input device configurations are described. In one or more implementations, an input device includes a sensor substrate having one or more conductors and a flexible contact layer spaced apart from the sensor substrate. The flexible contact layer is configured to flex to contact the sensor substrate to initiate an input of a computing device. The flexible contact layer includes a force concentrator pad that is configured to cause pressure to be channeled through the force concentrator pad to cause the flexible contact layer to contact the sensor substrate to initiate the input. In one or more implementations, an input device includes a capacitive sensor assembly arranged in an array that is configured to detect a location of an object that is proximal to a respective capacitive sensor of the capacitive sensor assembly and a pressure sensitive sensor assembly including a plurality of pressure sensitive sensor nodes that are configured to detect an amount of pressure applied by the object against a respective pressure sensitive sensor node of the pressure sensitive sensor assembly. | 01-23-2014 |
20140351901 | SYSTEMS AND METHODS FOR PAIRING BLUETOOTH DEVICES - Embodiments of software-supervised pairing processes are provided. The processes enable a user to pair a mouse and keyboard with a Bluetooth transceiver without having to use a second mouse and keyboard. At least two separate processes are provided, including a long transition for initial pairing or re-pairing and a short transition for re-establishing a connection after devices have already been paired. | 11-27-2014 |
Patent application number | Description | Published |
20090275320 | MEASURING END USER ACTIVITY OF SOFTWARE ON A MOBILE OR DISCONNECTED DEVICE - A hardware and/or software facility measures end user activity associated with a software application or service on a mobile phone or other mobile device. The facility tracks and stores usage data associated with a mobile user's use of the application or service. When the mobile user initiates transmission of the usage data, the facility retrieves from the mobile phone or other mobile device a usage code representing the usage data. The facility relies on user transcription, text input-buffer insertion, or other indirect means of data transport to deliver the usage code from the mobile phone or other mobile device to an application developer, service provider, or another entity. The recipient extracts the usage data contained in the usage code, and may perform various data mining and analysis techniques on the usage data in order to evaluate how the application or service is used. | 11-05-2009 |
20100121870 | METHODS AND SYSTEMS FOR PROCESSING COMPLEX LANGUAGE TEXT, SUCH AS JAPANESE TEXT, ON A MOBILE DEVICE - A system and method to search for items characterized by Japanese text using a mobile device. The search system receives keyed user input and converts the input into a set of search terms. After generating search terms, the system searches Japanese text fields for matching items accessible by the mobile device. One or more natural starting points in the text fields are identified for each matching item. Starting points may include, for example, the beginning of a text field and the locations of punctuation or changes in character set in the text field. After determining starting points, the system determines the distance between the matching text and a starting point. The system then provides an ordered set of search results based on the calculated distance and potentially other factors, such as the alignment of the match and the type of item. | 05-13-2010 |
20120098636 | REMOTELY CONTROLLING ONE OR MORE CLIENT DEVICES DETECTED OVER A WIRELESS NETWORK USING A MOBILE DEVICE - According to one general aspect, a method according to the present application includes remotely controlling wirelessly networked devices via a mobile unit, The method includes receiving, at a mobile unit and from a user, an input, analyzing the input to identify a networked device associated with the input, determining whether the networked device is presently accessible via a wireless network; determining whether to establish a connection with the networked device based on whether the networked device is determined to be presently accessible via the wireless network. The method also includes establishing a connection with the networked device if it is determined that the networked device is accessible via the wireless network and enabling the user to interact with the networked device through the mobile unit to remotely control the networked device. | 04-26-2012 |
20130335204 | REMOTELY CONTROLLING ONE OR MORE CLIENT DEVICES DETECTED OVER A WIRELESS NETWORK USING A MOBILE DEVICE - According to one general aspect, a method according to the present application includes remotely controlling wirelessly networked devices via a mobile unit. The method includes receiving, at a mobile unit and from a user, an input, analyzing the input to identify a networked device associated with the input, determining whether the networked device is presently accessible via a wireless network; determining whether to establish a connection with the networked device based on whether the networked device is determined to be presently accessible via the wireless network. The method also includes establishing a connection with the networked device if it is determined that the networked device is accessible via the wireless network and enabling the user to interact with the networked device through the mobile unit to remotely control the networked device. | 12-19-2013 |
20140203922 | REMOTELY CONTROLLING ONE OR MORE CLIENT DEVICES DETECTED OVER A WIRELESS NETWORK USING A MOBILE DEVICE - According to one general aspect, a method according to the present application includes remotely controlling wirelessly networked devices via a mobile unit. The method includes receiving, at a mobile unit and from a user, an input, analyzing the input to identify a networked device associated with the input, determining whether the networked device is presently accessible via a wireless network; determining whether to establish a connection with the networked device based on whether the networked device is determined to be presently accessible via the wireless network. The method also includes establishing a connection with the networked device if it is determined that the networked device is accessible via the wireless network and enabling the user to interact with the networked device through the mobile unit to remotely control the networked device. | 07-24-2014 |
Patent application number | Description | Published |
20090192982 | FAST INDEX WITH SUPPLEMENTAL STORE - A hardware and/or software search facility for searching and retrieving data stored on a mobile device. An index to the data is stored in fast memory (e.g., RAM) on the mobile device. The index contains a minimal amount of information necessary to present search results to a user. A supplemental data file is stored in storage that is local to or remote from the mobile device. The supplemental data files contain additional organized data that may be used to enhance the search results. In response to a search query, the facility uses the index to identify results that are responsive to the search query. The results are presented by the facility in accordance with predetermined rules. The facility may use the supplemental data file to perform further processing and present additional information. In some embodiments, the facility may mount or unmount indices and supplemental files from a device. | 07-30-2009 |
20130166541 | FAST INDEX WITH SUPPLEMENTAL STORE - A hardware and/or software search facility for searching and retrieving data stored on a mobile device. An index to the data is stored in fast memory (e.g., RAM) on the mobile device. The index contains a minimal amount of information necessary to present search results to a user. A supplemental data file is stored in storage that is local to or remote from the mobile device. The supplemental data files contain additional organized data that may be used to enhance the search results. In response to a search query, the facility uses the index to identify results that are responsive to the search query. The results are presented by the facility in accordance with predetermined rules. The facility may use the supplemental data file to perform further processing and present additional information. In some embodiments, the facility may mount or unmount indices and supplemental files from a device. | 06-27-2013 |
20130303111 | MEASURING END USER ACTIVITY OF SOFTWARE ON A MOBILE OR DISCONNECTED DEVICE - A hardware and/or software facility measures end user activity associated with a software application or service on a mobile phone or other mobile device. The facility tracks and stores usage data associated with a mobile user's use of the application or service. When the mobile user initiates transmission of the usage data, the facility retrieves from the mobile phone or other mobile device a usage code representing the usage data. The facility relies on user transcription, text input-buffer insertion, or other indirect means of data transport to deliver the usage code from the mobile phone or other mobile device to an application developer, service provider, or another entity. The recipient extracts the usage data contained in the usage code, and may perform various data mining and analysis techniques on the usage data in order to evaluate how the application or service is used. | 11-14-2013 |
20140242957 | MEASURING END USER ACTIVITY OF SOFTWARE ON A MOBILE OR DISCONNECTED DEVICE - A hardware and/or software facility measures end user activity associated with a software application or service on a mobile phone or other mobile device. The facility tracks and stores usage data associated with a mobile user's use of the application or service. When the mobile user initiates transmission of the usage data, the facility retrieves from the mobile phone or other mobile device a usage code representing the usage data. The facility relies on user transcription, text input-buffer insertion, or other indirect means of data transport to deliver the usage code from the mobile phone or other mobile device to an application developer, service provider, or another entity. The recipient extracts the usage data contained in the usage code, and may perform various data mining and analysis techniques on the usage data in order to evaluate how the application or service is used. | 08-28-2014 |
Patent application number | Description | Published |
20090004999 | Solutions for voice over internet protocol (VoIP) 911 location services - An E-9-1-1 voice-over-IP (VoIP) solution is provided wherein a 911 call from a mobile VoIP device is routed directly to the correct Public Safety Answer Point (PSAP) via dedicated trunks, together with correct location information and call-back number. VoIP gateways are implemented locally, at least one per LATA, and accept VoIP packetized data inbound, and convert it to standard wireline voice calls. Calls are routed to an IP address at the VoIP gateway, which then egresses the call to a voice port at a selective router. Mid-call updating of location of a moving VoIP terminal is provided to a PSAP. The location of the VoIP is validated using HTTP based protocol by pushing location information to a VoIP location server, and comparing it against a geographic location database to confirm that a contained street address is valid. | 01-01-2009 |
20110149851 | Enhanced E911 location information using voice over internet protocol (VoIP) - An E-9-1-1 voice-over-IP (VoIP) solution is provided wherein a 911 call from a wireless VoIP device is routed directly to the correct Public Safety Answer Point (PSAP) via dedicated trunks, together with correct location information and call-back number. VoIP gateways are implemented locally, at least one per LATA, and accept VoIP packetized data inbound, and convert it to standard wireline voice calls. Calls are routed to an IP address at the VoIP gateway, which then egresses the call to a voice port at a selective router. Dedicated voice trunks (CAMA, SS7, FG-D) are installed between each local VoIP gateway and appropriate selective routers. An Automatic Location Identification (ALI) database is provisioned with ESRKs dedicated for VoIP use. TCP/IP circuits may be established between some or all of the various local VoIP gateways. | 06-23-2011 |
20110222441 | Solutions for voice over internet protocol (VolP) 911 location services - An E-9-1-1 voice-over-IP (VoIP) solution is provided wherein a 911 call from a mobile VoIP device is routed directly to the correct Public Safety Answer Point (PSAP) via dedicated trunks, together with correct location information and call-back number. VoIP gateways are implemented locally, at least one per LATA, and accept VoIP packetized data inbound, and convert it to standard wireline voice calls. Calls are routed to an IP address at the VoIP gateway, which then egresses the call to a voice port at a selective router. Mid-call updating of location of a moving VoIP terminal is provided to a PSAP. The location of the VoIP is validated using HTTP based protocol by pushing location information to a VoIP location server, and comparing it against a geographic location database to confirm that a contained street address is valid. | 09-15-2011 |
20130143518 | Automated Proximate Location Association Mechanism for Wireless Emergency Services - Automatic Location Information (ALI) data that is representative of a landline address is digitally retrieved, and automatically transferred to an emergency call taker over a wireless system emergency network. Importantly, the ALI information is determined based on association to a proximate location. Before an emergency call is initiated, additional environmental information, such as a RFID tag, location beacon, WiFi access point, Bluetooth device, or other communication signal with a known location, is included in the wireless session data exchange, used to match one or more location inputs to a fixed civic location (street address) which is used to dispatch emergency responders. Alternatively, the mechanism matches to a precise geodetic location (e.g., where no civic location is available). | 06-06-2013 |
20130163589 | Solutions for Voice Over Internet Protocol (VoIP) 911 Location Services - An E-9-1-1 voice-over-IP (VoIP) solution is provided wherein a 911 call from a mobile VoIP device is routed directly to the correct Public Safety Answer Point (PSAP) via dedicated trunks, together with correct location information and call-back number. VoIP gateways are implemented locally, at least one per LATA, and accept VoIP packetized data inbound, and convert it to standard wireline voice calls. Calls are routed to an IP address at the VoIP gateway, which then egresses the call to a voice port at a selective router. Mid-call updating of location of a moving VoIP terminal is provided to a PSAP. The location of the VoIP is validated using HTTP based protocol by pushing location information to a VoIP location server, and comparing it against a geographic location database to confirm that a contained street address is valid. | 06-27-2013 |
20140189112 | User Plane Location Services Over Session Initiation Protocol (SIP) - A method and mechanism to allow a location server to initiate a user plane location service (e.g., SUPL defined by OMA) procedure to a user plane enabled device via Instant Messaging, or alternatively, via an existing SIP session if a multimedia session is already established. The location request is signaled to the user plane enabled device via a SIP INFO message. The location request uses SIP messaging to overcome firewall and other network security issues. Location using SUPL over SIP may be provided about a caller making an E911 emergency call. An Instant Message may be sent to the user plane enabled device, e.g., a VoIP wireless phone. | 07-03-2014 |
20140286197 | Solutions for Voice Over Internet Protocol (VoIP) 911 Location Services - An E-9-1-1 voice-over-IP (VoIP) solution is provided wherein a 911 call from a mobile VoIP device is routed directly to the correct Public Safety Answer Point (PSAP) via dedicated trunks, together with correct location information and call-back number. VoIP gateways are implemented locally, at least one per LATA, and accept VoIP packetized data inbound, and convert it to standard wireline voice calls. Calls are routed to an IP address at the VoIP gateway, which then egresses the call to a voice port at a selective router. Mid-call updating of location of a moving VoIP terminal is provided to a PSAP. The location of the VoIP is validated using HTTP based protocol by pushing location information to a VoIP location server, and comparing it against a geographic location database to confirm that a contained street address is valid. | 09-25-2014 |
20150289092 | USER PLANE LOCATION SERVICES OVER SESSION INITIATION PROTOCOL (SIP) - A method and mechanism to allow a location server to initiate a user plane location service (e.g., SUPL defined by OMA) procedure to a user plane enabled device via Instant Messaging, or alternatively, via an existing SIP session if a multimedia session is already established. The location request is signaled to the user plane enabled device via a SIP INFO message. The location request uses SIP messaging to overcome firewall and other network security issues. Location using SUPL over SIP may be provided about a caller making an E911 emergency call. An Instant Message may be sent to the user plane enabled device, e.g., a VoIP wireless phone. | 10-08-2015 |
20150373488 | Solutions for Voice Over Internet Protocol (VoIP) 911 Location Services - An E-9-1-1 voice-over-IP (VoIP) solution is provided wherein a 911 call from a mobile VoIP device is routed directly to the correct Public Safety Answer Point (PSAP) via dedicated trunks, together with correct location information and call-back number. VoIP gateways are implemented locally, at least one per LATA, and accept VoIP packetized data inbound, and convert it to standard wireline voice calls. Calls are routed to an IP address at the VoIP gateway, which then egresses the call to a voice port at a selective router. Mid-call updating of location of a moving VoIP terminal is provided to a PSAP. The location of the VoIP is validated using HTTP based protocol by pushing location information to a VoIP location server, and comparing it against a geographic location database to confirm that a contained street address is valid. | 12-24-2015 |
20160080900 | USER PLANE LOCATION SERVICES OVER SESSION INITIATION PROTOCOL (SIP) - A method and mechanism to allow a location server to initiate a user plane location service (e.g., SUPL defined by OMA) procedure to a user plane enabled device via Instant Messaging, or alternatively, via an existing SIP session if a multimedia session is already established. The location request is signaled to the user plane enabled device via a SIP INFO message. The location request uses SIP messaging to overcome firewall and other network security issues. Location using SUPL over SIP may be provided about a caller making an E911 emergency call. An Instant Message may be sent to the user plane enabled device, e.g., a VoIP wireless phone. | 03-17-2016 |
Patent application number | Description | Published |
20090147775 | Ancillary data support in session initiation protocol (SIP) messaging - A SIP ancillary data server provides host to auxiliary data for an emergency SIP session (call) uniquely referred to in a transported SIP header. In a manner similar to how location is represented in an emergency call, a SIP header is extended. The extended SIP Header contains one of two possible types of content elements: either (a) a content pointer element to a SIP Message body part (a “cid:”, or content identifier); or (b) an (a.k.a, “info_URI” in this document). | 06-11-2009 |
20120184239 | Emergency 911 Data Messaging - A data request is generated (e.g., text, email, SMS, multimedia messaging system (MMS), etc.) from a source device. The data request is delivered to a PSAP or other emergency monitoring service location in a useable format. Exemplary useable formats include a canned voice message, delivery to a call center that translates data to voice, text to speech, and text to instant messaging (IM). Additional information and location are staged for use by the PSAP or other monitoring service location. | 07-19-2012 |
20120259984 | Ancillary data support in session initiation protocol (SIP) messaging - A SIP ancillary data server provides host to auxiliary data for an emergency SIP session (call) uniquely referred to in a transported SIP header. In a manner similar to how location is represented in an emergency call, a SIP header is extended. The extended SIP Header contains one of two possible types of content elements: either (a) a content pointer element to a SIP Message body part (a “cid:”, or content identifier); or (b) an (a.k.a, “info_URI” in this document). | 10-11-2012 |
20130143517 | Wireless Emergency Caller Profile Data Delivery Over a Legacy Interface - Dynamically selecting and facilitating stored caller information to a communications recipient device with a communications event, based on communication recipient credentials (e.g. MDN, etc.), preferences outlined in a subscriber profile associated with a relevant calling device, and other variables, e.g., time of day, etc. A subscriber provisions subscriber preferences and subscriber information associated with users of a subscribing communications device in to a subscriber profile, for use during a communications event. Subscriber preferences place restrictive conditions on stored subscriber information that may be transmitted with a communications event initiated by a corresponding communications device. A content collection node dynamically selects customized caller information via a subscriber information content collection process. Customized caller information is transmitted to appropriate recipient devices with a corresponding communications event. In the event of a 911 communications event, customized caller information may be transmitted to emergency dispatch personnel via the legacy E2 query interface. | 06-06-2013 |
20130303107 | Location Determination of a Roaming Subscriber Device Using SMS for Emergency Purposes - Location determination for a roaming subscriber device using a short message service (SMS) to contact emergency services, wherein location information is obtained from a visited carrier network on which the originating subscriber device is roaming. An emergency SMS message is first routed to a predetermined emergency services SMSC. The emergency services SMSC then forwards data relevant to the emergency SMS message to an SMS to emergency services mediator. The SMS to emergency services mediator uses data received for the emergency SMS message to obtain location information therefor. Location information for an emergency SMS message is obtained from an LBS platform on a network carrier currently servicing the originating subscriber device. A next hop URI is then determined for the emergency SMS message based on relevant location information. The emergency SMS message is routed to the next hop URI and eventually routed to an appropriate PSAP. | 11-14-2013 |
20140194085 | Augmented Location Information for Wireless Communication - An Augmented Information server enables inclusion of augmented location data, in relation to an emergency call, expanded beyond that which can be fit into a pre-determined fixed length ALI data response field. A specific type of URI (Uniform Resource Identifier) is included in the ALI data response field, addressing specific augmented location data maintained by the augmented information server, e.g., a map image file, building floor plan, etc. The Augmented Information URI addresses to information accessed by the Augmented Information Server, inserted into an ALI data response field. The augmented, extended or additional location information is stored at a particular web address accessed through a query to the Augmented Information server. | 07-10-2014 |
20140286484 | Index of Suspicion Determination for Communications Request - The risk that an incoming emergency call is a prank call is presented in real-time to the called party, in the form of, e.g., an index of suspicion. An index of suspicion aggregation server quantifies, qualifies, and aggregates risks, suspicions, and/or threats relevant to a call center to formulate a scale of suspicion. Metrics are acquired (e.g., calling device location information, device configuration information, caller information, etc.) relevant to each communications request made to a call center and uses acquired metrics to rate communications requests based on a known scale of suspicion. Once a suspicion rating is determined for a communications request, the communications request is routed to a relevant call-taker terminal, as is the index of suspicion for that incoming call. Real time presentation of the index of suspicion enables call-takers to make better call-handling decisions based on risk analysis and historical call data associated with a given caller. | 09-25-2014 |
20140287714 | Distributed Emergency Text Message Architecture - An internet-protocol (IP) based distributed emergency text message architecture for providing reliable text to 911 services. The distributed emergency text message architecture distributes call routing and media transportation functionalities implemented in a conventional text to 911 solution over the following network entities: an emedia aggregation gateway, an emedia message broker, and an emedia distribution server. An emedia aggregation gateway, emedia message broker, and emedia distribution server each interconnect over an IP network to deliver emergency text messages directly to legacy public safety answering points (PSAPs). Uncoupling emergency services call routing and media transportation functionalities into multiple distributed elements absolves scaling issues associated with the conventional text to 911 solution. An emedia local gateway is preferably positioned on a PSAP in the distributed emergency text message architecture to eliminate the need for a selective router element when routing a teletype (TTY) message to a teletype (TTY) terminal on a legacy PSAP. | 09-25-2014 |
20140289309 | Media Transformation to Routable Message, or Retrievable Content Based on Key - A content server enables a content creating device to send media content to a target consumer/destination device with an uncommon media format by transforming media content transmitted or uploaded by a content creator into media content that is either routable or accessible to a target consumer/destination device. In particular, a content creating device embeds captured media content and an address of a target consumer/destination device into a content transformation message and then routes the content transformation message to the inventive content server. The content server then receives the content transformation message and transforms embedded media content into either a routable SIP signaling message with actual media content or a routable SIP signaling message with retrievable media content. Once media transformation is complete, the content server sends the routable message with actual/retrievable media content to the target consumer/destination device indicated in the content transformation message. | 09-25-2014 |
20150017943 | Emergency 911 Data Messaging - A data request is generated (e.g., text, email, SMS, multimedia messaging system (MMS), etc.) from a source device. The data request is delivered to a PSAP or other emergency monitoring service location in a useable format. Exemplary useable formats include a canned voice message, delivery to a call center that translates data to voice, text to speech, and text to instant messaging (IM). Additional information and location are staged for use by the PSAP or other monitoring service location. | 01-15-2015 |
20150156319 | Index of Suspicion Determination for Communications Request - The risk that an incoming emergency call is a prank call is presented in real-time to the called party, in the form of, e.g., an index of suspicion. An index of suspicion aggregation server quantifies, qualifies, and aggregates risks, suspicions, and/or threats relevant to a call center to formulate a scale of suspicion. Metrics are acquired (e.g., calling device location information, device configuration information, caller information, etc.) relevant to each communications request made to a call center and uses acquired metrics to rate communications requests based on a known scale of suspicion. Once a suspicion rating is determined for a communications request, the communications request is routed to a relevant call-taker terminal, as is the index of suspicion for that incoming call. Real time presentation of the index of suspicion enables call-takers to make better call-handling decisions based on risk analysis and historical call data associated with a given caller. | 06-04-2015 |
20150365812 | Ancillary Data Support in Session Initiation Protocol (SIP) Messaging - A SIP ancillary data server provides host to auxiliary data for an emergency SIP session (call) uniquely referred to in a transported SIP header. In a manner similar to how location is represented in an emergency call, a SIP header is extended. The extended SIP Header contains one of two possible types of content elements: either (a) a content pointer element to a SIP Message body part (a “cid:”, or content identifier); or (b) an (a.k.a, “info_URI” in this document). | 12-17-2015 |
20150373516 | Emergency 911 Data Messaging - A data request is generated (e.g., text, email, SMS, multimedia messaging system (MMS), etc.) from a source device. The data request is delivered to a PSAP or other emergency monitoring service location in a useable format. Exemplary useable formats include a canned voice message, delivery to a call center that translates data to voice, text to speech, and text to instant messaging (IM). Additional information and location are staged for use by the PSAP or other monitoring service location. | 12-24-2015 |
20150373522 | Automated Location Determination to Support VoIP E911 Using Self-Surveying Techniques for Ad Hoc Wireless Networks - Network devices in an Ad-Hoc wireless network self-survey themselves as necessary for approximate location or precise position information, based on methods employed, particularly useful for a non-open-sky environment. A WiFi Access Point (AP) with or without an internal GPS receiver and location conveyance support may utilize the mesh technique. If an Ad-Hoc network device is unable to contact a suitable location server, or a position request has otherwise failed to deliver a precise position, a WiFi AP is manually configured with appropriate location information, and then offers itself as if it were a location server (thereby becoming an ‘internal’ server', containing either the determined or provisioned location of itself, for use by other APs or devices). A location server (either internal to the AP needing location, or external), performs a ‘mesh’ location determination by selecting position information from 3 or more location determined APs for subsequent processing. | 12-24-2015 |
Patent application number | Description | Published |
20090313101 | PROCESSING RECEIPT RECEIVED IN SET OF COMMUNICATIONS - Receipts may be received at a location that a customer normally uses to receive electronic correspondence, such as an e-mail address, an instant messaging address, etc. Among the items that are sent to that location, those items that contain a receipt may be identified. The identified receipts, or information extracted from such receipts, may be sent to a receipt store. An action, such as displaying the receipts to a customer, may be taken based on content stored in the receipt store. The information that is stored in a receipt store and/or that is displayed to customers may have an arbitrary level of detail. | 12-17-2009 |
20090313132 | HANDLING PAYMENT RECEIPTS WITH A RECEIPT STORE - A receipt store may be provided as a service. Electronic payment receipts generated in any type of transaction may be delivered to the receipt store. A customer may subscribe to a particular receipt store, to be used as a repository for that customer's receipts. The customer may carry a device that is used to communicate payment information (such as a credit card number) to a device reader when purchases are made. The device may also identify the customer's receipt store. A commercial establishment that accepts the customer's payment may generate an electronic receipt, and may deliver it to the receipt store specified by the customer's device. The establishment may also deliver the receipt to the customer's device, and the customer's device may send the receipt along to the receipt store. | 12-17-2009 |
20140279905 | TOKEN-BASED ADMISSION CONTROL FOR REPLICATED WRITES - Methods and apparatus for token-based admission control for replicated writes are disclosed. Data objects are divided into partitions, and corresponding to each partition, at least a master replica and a slave replica are stored. A determination as to whether to accept a write request directed to the partition is made based at least in part on one or more of (a) available throughput capacity at the master replica, and (b) an indication, obtained using a token-based protocol, of available throughput capacity at the slave replica. If the write request is accepted, one or more data modification operations are initiated. | 09-18-2014 |
20140379506 | TOKEN-BASED PRICING POLICIES FOR BURST-MODE OPERATIONS - Methods and apparatus for token-based pricing policies for burst-mode operations are disclosed. A pricing policy to be applied to token population changes at a token bucket used for admission control during burst-mode operations at a work target is determined. Over a time period, changes to the token population of that bucket are recorded. A billing amount to be charged to a client is determined, based on the recorded changes in token population and an associated pricing amount indicated in the pricing policy. | 12-25-2014 |
20140379922 | EQUITABLE DISTRIBUTION OF EXCESS SHARED-RESOURCE THROUGHPUT CAPACITY - Methods and apparatus for equitable distribution of excess shared-resource throughput capacity are disclosed. A first and a second work target are configured to access a shared resource to implement accepted work requests. Admission control is managed at the work targets using respective token buckets. A first metric indicative of the work request arrival rates at the work targets during a time interval, and a second metric associated with the provisioned capacities of the work targets are determined. A number of tokens determined based on a throughput limit of the shared resource is distributed among the work targets to be used for admission control during a subsequent time interval. The number of tokens distributed to each work target is based on the first metric and/or the second metric. | 12-25-2014 |
20140380324 | BURST-MODE ADMISSION CONTROL USING TOKEN BUCKETS - Methods and apparatus for burst-mode admission control using token buckets are disclosed. A work request (such as a read or a write) directed to a work target is received. Based on a first criterion, a determination is made that the work target is in a burst mode of operation. A token population of a burst-mode token bucket is determined, and if the population meets a second criterion, the work request is accepted for execution. | 12-25-2014 |
20140380330 | TOKEN SHARING MECHANISMS FOR BURST-MODE OPERATIONS - Methods and apparatus for token-sharing mechanisms for burst-mode operations are disclosed. A first and a second token bucket are respectively configured for admission control at a first and a second work target. A number of tokens to be transferred between the first bucket and the second bucket, as well as the direction of the transfer, are determined, for example based on messages exchanged between the work targets. The token transfer is initiated, and admission control decisions at the work targets are made based on the token population resulting from the transfer. | 12-25-2014 |
20150269239 | STORAGE DEVICE SELECTION FOR DATABASE PARTITION REPLICAS - A system that implements a data storage service may store data in multiple replicated partitions on respective storage nodes. The selection of the storage nodes (or storage devices thereof) on which to store the partition replicas may be performed by administrative components that are responsible for partition management and resource allocation for respective groups of storage nodes (e.g., based on a global view of resource capacity or usage), or the selection of particular storage devices of a storage node may be determined by the storage node itself (e.g., based on a local view of resource capacity or usage). Placement policies applied at the administrative layer or storage layer may be based on the percentage or amount of provisioned, reserved, or available storage or IOPS capacity on each storage device, and particular placements (or subsequent operations to move partition replicas) may result in an overall resource utilization that is well balanced. | 09-24-2015 |
20150379050 | CONFIGURABLE-CAPACITY TIME-SERIES TABLES - Methods and apparatus for configurable-capacity time-series tables are disclosed. A schedule of database table management operations, including at least an operation to change a throughput constraint associated with a table in response to a triggering event, is generated. The table is instantiated with an initial throughput constraint in accordance with the schedule. Work requests directed to the table are accepted based on the initial throughput constraint. The throughput constraint is modified in response to the triggering event. Subsequent work requests are accepted based on the modified throughput constraint. | 12-31-2015 |