Patent application number | Description | Published |
20090126001 | TECHNIQUES TO MANAGE SECURITY CERTIFICATES - Techniques to manage security certificates are described. An apparatus may comprise a certificate proxy server having a transceiver and a certificate manager module. The certificate manager module may be operative to register a digital identity certificate for a call terminal to perform authentication operations on behalf of the call terminal, and manage the digital identity certificate for the call terminal. Other embodiments are described and claimed. | 05-14-2009 |
20090182819 | TECHNIQUES TO SELECTIVELY SHARE MESSAGES - Techniques to selectively share messages are described. An apparatus may comprise a trusted delegate server having a message sharing module. The message sharing module may be operative to selectively retrieve messages for a primary message recipient from a unified messaging server based on a message type defined by a message sharing policy. The messaging sharing module may send the messages to a secondary message recipient for the message type as defined by the message sharing policy over a packet-switched network. Other embodiments are described and claimed. | 07-16-2009 |
20130237240 | IDENTIFYING MEETING ATTENDEES USING INFORMATION FROM DEVICES - Physical presence of a mobile device in proximity to a physical meeting place can be recognized. Identifying information can be retrieved from the device, and it can be determined whether the identifying information correlates to identifying information for a profile in an invitee list for a current meeting at the meeting place. If the retrieved identifying information correlates to identifying information for the profile in the invitee list for the meeting at the meeting place, then the profile can be included as an attendee at the meeting (e.g., by including identifying information for the profile in an attendee list). The identifying information such as the attendee list may also be used to perform one or more additional acts, such as sending notifications, personalizing settings, etc. | 09-12-2013 |
20130298204 | Automatic Detection of Wireless Network Type - Techniques for facilitating automatic detection of a type of wireless network are described. In accordance with one or more embodiments, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. In accordance with one or more embodiments, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identifies a type of an available wireless network. Identification can be based, for example, upon information received in an information element and/or iterative probing of the wireless network beacon. | 11-07-2013 |
20130343553 | Detection of Device Configuration - Devices connected with a computer system are interrogated to detect whether they are configured and functioning. In an audio device implementation, a known audio sample is output to a loudspeaker. If the loudspeaker is properly configured and functional, an attached microphone will capture the sound corresponding to the audio sample generated by the loudspeaker. If sound corresponding to the audio sample is detected, an indication is provided to the user that the microphone and loudspeaker are operational. If no sound corresponding to the audio sample is detected, an indication is provided to the user that the loudspeaker is not enabled and additional configuration is required. | 12-26-2013 |
20140344366 | AUTOMATIC UTILIZATION OF RESOURCES IN A REALTIME CONFERENCE - The architecture facilitates the association of resources (e.g., hardware software) with a meeting location such as a conference room or conference space. Additionally, the room and resources can be associated with a realtime conference or meeting at the meeting location. Still further, the resources can be automatically joined to the meeting being held in the room, for both the organizer of the meeting and the remote participants of the meeting. The resources are network addressable and register to a communications infrastructure for online availability. The architecture automatically joins the conference room resources to any conference or call that is being held in the locale (e.g., room) of the conference, and which the user has joined using a realtime conferencing application. The resources distributed across multiple meeting locations can be utilized for a single session, as well. | 11-20-2014 |
20150067536 | Gesture-based Content Sharing Between Devices - Various embodiments provide an ability to join a virtual conference session using a single input-gesture and/or action. Upon joining the virtual conference, some embodiments enable a computing device to share content within the virtual conference session responsive to receiving a single input-gesture and/or action. Alternately or additionally, the computing device can acquire content being shared within the virtual conference session responsive to receiving a single input-gesture and/or action. In some cases, content can be exchanged between multiple computing devices connected to the virtual conference session. | 03-05-2015 |
20150200786 | Accessing and Configuring Meeting Attributes - Techniques for accessing and configuring meeting attributes are described. In at least some embodiments, a meeting object is leveraged to store meeting attributes and pointers to meeting-related content. A meeting object, for instance, can serve as a manifest for meeting attributes. According to various embodiments, different entities (e.g., applications, services, and so forth) can access a meeting object to ascertain and/or configure meeting attributes for a meeting. For instance, a meeting application programming interface (API) can be employed to enable different entities to interact with a meeting object in various ways. | 07-16-2015 |