Patent application number | Description | Published |
20080298278 | Techniques for a mixed audio conference - Techniques for a mixed audio conference are described. An apparatus may comprise an audio video multipoint control unit to mix call information from multiple call connections established over a packet-switched network for a conference call. The apparatus may comprise a telephony gateway communicatively coupled to the audio video multipoint control unit. The telephony gateway may establish a bridge connection with a conference bridge servicing a call connection over a circuit-switched network, the telephony gateway to translate call information from the call connection for use by the audio video multipoint control unit. Other embodiments are described and claimed. | 12-04-2008 |
20090216837 | SECURE RESERVATIONLESS CONFERENCING - Techniques are disclosed providing secure reservationless conferencing, allowing an organizer to arrange a meeting while off-line from a conferencing server, with the conferencing server still enforcing security for the meeting. | 08-27-2009 |
20100082825 | INTEGRATING ENTERPRISE IDENTITY AUTHORIZATION IN CONFERENCES - Disclosed herein are embodiments for validating a user joining a conferencing session. According to various embodiments, a first identifier is received. A user is identified from a plurality of users based at least in part on the first identifier. A second identifier is received that corresponds to the first identifier and the user and the user is validated based on both the first identifier and the second identifier. The user may then join the conferencing session, with the user's identity being revealed to others attending the conferencing session. | 04-01-2010 |
20100223334 | DISTRIBUTED ROUTING OF CONFERENCES USING CONFERENCE IDENTIFIER - Users attempting to join a conference facilitated by an enhanced communication system employing a network communication protocol such as SIP and having a distributed architecture are enabled to request the conference through a numeric conference identifier. The conference directory identifier is assigned to an associated resource, rather than directly to a pool of resources in the communication system. If a pool is decommissioned, any conference directories with remaining data may be assigned to other pools, like users may be moved, to ensure continuity of the system. | 09-02-2010 |
20110295957 | CONTINUOUS REPLICATION FOR SESSION INITIATION PROTOCOL BASED COMMUNICATION SYSTEMS - User defined routing rules are managed within a primary/backup architecture through continuous replication between home servers and their corresponding presence servers in an automatic manner. User set-up rules are stored and published by a designated presence server to home servers on which the user can register including the user's home registrar and any backup registrars. Changes to the rules may be disseminated and synchronized through comparison of versions and exchange of batches between the presence server and registrars. | 12-01-2011 |
20110307541 | SERVER LOAD BALANCING AND DRAINING IN ENHANCED COMMUNICATION SYSTEMS - Resilient load balancing servers in an enhanced communication system is provided mitigating server failures or scheduled shutdowns. A repeatable but virtually random sequence of servers is generated for a given pool of homogeneous servers based on a user identifier in a request message. If a request cannot be routed to a first choice server, for any reason, then subsequent servers in the sequence are selected. A communication protocol within the system is adapted to permit an individual server to indicate that it cannot accept new requests. Following the indication from the server, traffic associated with existing dialogs is allowed to continue to be processed by the server, but new dialogs are directed to other servers. | 12-15-2011 |
20120209913 | INTEGRATING ENTERPRISE IDENTITY AUTHORIZATION IN CONFERENCES - Disclosed herein are embodiments for validating a user joining a conferencing session. According to various embodiments, a first identifier is received. A user is identified from a plurality of users based at least in part on the first identifier. A second identifier is received that corresponds to the first identifier and the user and the user is validated based on both the first identifier and the second identifier. The user may then join the conferencing session, with the user's identity being revealed to others attending the conferencing session. | 08-16-2012 |
20120221642 | HIGH AVAILABILITY CONFERENCING - A method, system, and architecture for providing a conference system that effectively achieves high availability conferencing is provided. The conference system architecture provides a conference system that comprises a set of stateless conference servers and a shared conference store to provide highly available conferencing to its users. The conference servers serve (host) conferences (meetings) that allow users to conduct distributed conferences. Each conference server generally performs conference provisioning operations and conference control operations. The shared conference store provides for the storage of conference state information, thus allowing the conference servers in the conference server pool to be stateless by maintaining conference state information on the shared conference store. A stateless conference server may also locally maintain, for example, in cache memory, some of the conference state information that is maintained on the shared conference store. | 08-30-2012 |
20130070912 | UNIVERSAL PHONE NUMBER FOR CONTACTING GROUP MEMBERS - A universal phone number is provided for connecting to communication methods, including fixed line, mobile line, and internet communication methods. A communication group of communication methods may include multiple communication methods belonging to one individual or to multiple individuals within the communication group, such as a family. The universal phone number may be designated as the primary contact number for the communication group such incoming phone calls and text messages may be automatically routed to the communication methods in the communication group. The universal phone number may provide alerts to the multiple communication methods for notifying when incoming phone calls are answered. A universal voicemail box may also be provided for a scenario when the incoming call is not answered. Additionally, the universal phone number may provide the ability to keep the contact information for each of the individual communication methods private. | 03-21-2013 |
20130263216 | PARTICIPANT AUTHENTICATION AND AUTHORIZATION FOR JOINING A PRIVATE CONFERENCE EVENT VIA A CONFERENCE EVENT ENVIRONMENT SYSTEM - Concepts and technologies are described herein for a mechanism by which participants who have been invited to attend a conference event and who are physically present within a conference event environment, such as a meeting room, can provide authentication credentials to join the conference event via a conference event environment system. When an individual attempts to join a conference event via a conference event environment system, the individual is prompted to provide his or her authentication credentials to join the conference event via the conference event environment system to participate in the conference event. The conference event environment system may inherit the individual's permissions, such as in regards to whether or not the individual has been permitted to present content during the conference event. A conference event roster may be used to indicate that the individual has joined the conference via the conference event environment system. | 10-03-2013 |
20140136878 | Scaling Up and Scaling Out of a Server Architecture for Large Scale Real-Time Applications - Scaling up and scaling out of a server architecture for large scale real-time applications is provided. A group of users may be provisioned by assigning them to a server pool and allotting them to a group. Grouped users help to reduce inter-server communication when they are serviced by the same server in the pool. High availability may be provided by choosing a primary server and one or more secondary servers from the pool to ensure that grouped users are serviced by the same server. Operations taken on the primary server are synchronously replicated to secondary servers so that when a primary server fails, a secondary server may be chosen as the primary for the group. Servers for multiple user groups may be load balanced to account for changes in either the number of users or the number of servers in a pool. Multiple pools may be paired for disaster recovery. | 05-15-2014 |
20140137187 | Scalable and Highly Available Clustering for Large Scale Real-Time Applications - Scaling and highly available clustering for large scale real-time applications is provided. A ring may be formed which includes multiple nodes for providing a set of services in a system. When a network partition is detected which affects communications between each of the nodes in the ring, the formation of additional rings is prevented by shutting down nodes which include a minority of voting nodes in the ring while maintaining the availability of the nodes which include a majority of the voting nodes to continue providing the set of services in the system. | 05-15-2014 |
Patent application number | Description | Published |
20110188410 | Using Consultation Call to Transfer Call Across Endpoints - A method for transferring a telephone call from a client computer to a second electronic device includes establishing a connection for a telephone call between the client computer and a first electronic device, and sending a request to a server computer to transfer the telephone call from the client computer to the second electronic device, the client computer and the second electronic device having the same user, the request initiating a consultation call to the second electronic device. The method also includes receiving a response from the server computer that the second electronic device has accepted the telephone call, and replacing the client computer with the second electronic device as a party in the telephone call with the first electronic device, the continuity of the telephone call being maintained at the first electronic device during the time that the client computer is replaced with the second electronic device. | 08-04-2011 |
20150078332 | VOICE CALL CONTINUITY IN HYBRID NETWORKS - Voice call continuity is provided for calls that are carried over a hybrid network infrastructure in which access connections are distributed over loosely coupled network portions including a backend network such as a core VoIP (Voice over Internet Protocol) service network, one or more cellular mobile networks, and a public switched telephone network (“PSTN”). The calls are routed through the core VoIP network regardless of their points of origination or termination in other network portions so that signaling and call context are anchored in the core VoIP network. The conditions under which user equipment operate are continuously monitored so that when a connection is determined to have been unacceptably degraded or is likely to be interrupted, and/or a more optimal connection is available, a handover of the call to another connection is initiated so that call continuity is maintained using the lowest cost connection that provides acceptable call quality. | 03-19-2015 |
20150163341 | VIRTUAL PERSONAL OPERATOR - Various technologies for managing mobile device communications can be offered to implement a virtual personal operator. Incoming calls and texts can be managed intelligently based on a rich network-stored context, allowing the network to make decisions and interact with callers. Because context is stored by the network, the virtual personal operator can function without contacting the called mobile phone, and can even provide helpful information to callers if the mobile phone is offline. Rich do-not-disturb functionality can be provided, and privileged callers can be given additional information or functionality based on their privileged status. Numerous other features that assist with communications management can be supported. | 06-11-2015 |
20150188727 | TUNNELING VOIP CALL CONTROL ON CELLULAR NETWORKS - Signaling from a mobile device is transparently tunneled through a cellular voice network to a Voice over Internet Protocol (“VoIP”) core network so that multi-party calls, including conference calls and call waiting, can be managed entirely within the VoIP core network. The tunneled signals enable call control to be implemented in the VoIP core network and also establish a way to communicate requests, instructions, and call state. The signaling is transparent to the cellular network because that network does not receive and interpret the signaling. Instead, the cellular network's existing and unmodified control plane is repurposed by the mobile device by placing new, brief outgoing calls through the cellular network to the VoIP core network where the called party number (i.e., the caller-ID) encodes specific information. The VoIP core network immediately releases the new cellular call once the caller-ID is received and the encoded information is interpreted. | 07-02-2015 |
Patent application number | Description | Published |
20090116634 | ACCOMMODATION OF TWO INDEPENDENT TELEPHONY SYSTEMS - Independent telephony systems are integrated by using symmetric forking from both systems. Calls received by either system are forked to the other system. Thus, a call can be accepted by one of the systems, using its external interfaces, and presented to all devices in both systems. Each system is enabled to leverage internal call control advanced features to enhance overall user experience. Internally inserted parameters to call requests are used between the two systems for preventing endless loop of calls between the integrated systems. | 05-07-2009 |
20110299387 | SURVIVABLE AND RESILIENT REAL TIME COMMUNICATION ARCHITECTURE - Enhanced communication systems with various resiliency and survivability aspects are provided. Data center, cluster, network, and load balancer survivability are provided for seamless communication experience in case of data center, cluster, discovery infrastructure, or hardware load balancer failures. Call, data, and authentication survivability are provided through dynamic re-routing over alternative networks, continuous data replication, and alternative authentication mechanisms. Seamless failover is ensured through use of identical signaling protocols and data carried by protocols between primary and backup clusters. Voicemail resiliency is achieved by re-routing calls directed to voicemail over alternative paths such as PSTN connections. | 12-08-2011 |
20130039360 | HYBRID UNIFIED COMMUNICATIONS DEPLOYMENT BETWEEN CLOUD AND ON-PREMISE - A hybrid Unified Communications (UC) telephony deployment includes users of a tenant that are hosted between a UC cloud deployment and a UC on-premise deployment that offers PSTN connectivity for the users. An identity of a tenant and its' users are maintained consistently between the on-premise and cloud based UC deployment (e.g. telephone numbers, dialing preferences, voice mail . . . ). Each user of the tenant can register with the UC service from one or more locations (e.g. on-premise, off-premise . . . ) whether or not they are hosted by the on-premise deployment or the cloud based UC deployment. Functionality of the UC deployment may also be maintained at one or more locations within the hybrid UC deployment. For example, some services (e.g. voicemail, or other services) can be hosted in the cloud while the remaining services are hosted on-premise. Different Telco providers may be chosen by the tenant to provide PSTN services for one or more users of the tenant. | 02-14-2013 |
20130094407 | SYSTEM, METHOD AND DEVICE FOR CALL POLICY ENFORCEMENT AND ROUTING BASED ON USER LOCATION - Call policy enforcement and routing is based on user location. A plurality of endpoints is provided for receiving and making calls. Each of the plurality of endpoints are assigned a default policy for controlling call authorization and providing call routing rules. A mapping of policies for a plurality of locations is stored. A location of a client associated with one of the plurality of endpoints is identified. A location-based policy is obtained from the stored mapping of policies of the plurality of locations based on the identified location of the client. The obtained location-based policy is applied instead of the default policy assigned to the client associated with one of the plurality of endpoints. | 04-18-2013 |