Patent application number | Description | Published |
20140133638 | Seamless Call Transfer - Techniques for providing for a seamless call transfer in a virtual desktop environment are supported. An apparatus may be capable of requesting access to a remote computer system for registration with a call manager, determining whether a call associated with the apparatus is active, automatically initiating suspension of the call in response to determining that the call is active and requesting registration of a telephone associated with the call, and resuming the suspended call. The seamless call transfer system may result in a more favorable calling experience during authentication with a virtual desktop environment and registration with a call manager. | 05-15-2014 |
20140297817 | Managing Software Operations Based Upon User Status In A Unified Communications Environment - Operation of a computing device is facilitated within a unified communications platform, where a user status designation is assigned to the computing device. A user configuration table for the computing device is established, where the user configuration table provides information relating to a plurality of user status designations associated with operation of the computing device within the unified communications platform. In response to identifying an automated software operation scheduled to be performed in association with the computing device, the user configuration table is consulted to determine a rule associated with the user status designation and the automated software operation. In response to a determination of the rule, the rule is applied that controls performance of the automated software operation at the computing device. | 10-02-2014 |
20140342685 | SYSTEM FOR USING A PRESENCE STATUS INDICATION TO INFORM A COLLABORATION ENVIRONMENT OF AN EMERGENCY - In one embodiment, a method includes determining when a first party has initiated contact with a second party, wherein the first party initiates contact with the second party on a communications link. The method also includes identifying identification information of the second party, and updating a presence status indication of the first party to indicate that the first party has initiated contact with the second party. The presence status indication includes information associated with the second party. The presence status indication is provided to a first application arranged to monitor the presence status of the first party. Finally, the method includes presenting the presence status indication of the first party with respect to the first application. | 11-20-2014 |
20150081806 | Techniques for Requesting Web Conference Recordings Automatically via a Conference Invitation Response - Techniques are presented for recording and delivering content associated with a teleconference meeting. At a server device, a message is sent to a first endpoint device. The message comprises an invitation to join a teleconference meeting. The message also comprises an option for a user at the first endpoint device to respond to the message with a request to record the teleconference meeting. A response message is received from the first endpoint device. The response message contains an indication of whether or not the user will join the teleconference meeting and a request to record the teleconference meeting. A host at a second endpoint device is presented with the request from the user to record the teleconference meeting. | 03-19-2015 |
20150244682 | METHOD AND APPARATUS FOR IDENTIFYING AND PROTECTING CONFIDENTIAL INFORMATION IN A COLLABORATION SESSION - In one embodiment, a method includes initiating a session and determining whether a first indication arranged to indicate that confidential information is to be shared during the session is obtained. The session includes a plurality of participants in attendance. The method also includes, after it is determined that the first indication is obtained, determining whether each participant of the plurality of participants has agreed to maintain confidentiality with respect to the confidential information. Finally, after it is determined that each participant of the plurality of participants has agreed to maintain the confidentiality with respect to the confidential information, a second indication is provided during the session, the second indication being arranged to indicate that the confidential information is currently being shared during the presentation. | 08-27-2015 |
Patent application number | Description | Published |
20090245286 | METHOD AND APPARATUS FOR PHYSICAL LAYER ROUTING IN A WIRELESS DEVICE - A method includes, in a physical layer of a communication stack of a wireless communication device, receiving a first radio frequency (RF) signal, converting the first RF signal to a first digital data signal, and passing the first digital data signal to a higher communication stack layer. The method also includes, in the physical layer, receiving a second digital data signal from the higher communication stack layer, converting the second digital data signal to a second RF signal, and transmitting the second RF signal. The method further includes, in the physical layer, forwarding a signal, wherein forwarding comprises receiving a third RF signal, converting the third RF signal to a fourth RF signal, and transmitting the fourth RF signal. | 10-01-2009 |
20090257420 | Process Control System With Enhanced Communication Throughput Using Frequency Agility - A process control system having wireless nodes (field devices, routers, wireless gateways, etc.) communicating with enhanced throughput using frequency hopping. The frequency channel using which each node transmits is determined by frequency agility/frequency hopping technique. Multiple nodes then transmit the packets in their respective channels, but in overlapping duration. In one embodiment such a technique is employed in combination with TDMA, with the boundaries of time slots being ‘global’ (same for all the nodes in the network) and thus the overlapping duration equals the duration of the time slot. In an alternative embodiment employed in combination of SDMA, each node transmits in a (substantially) non-overlapping corresponding beam area, but without reference to global boundaries. In yet another alternative embodiment, a combination of SDMA, TDMA and overlapping duration is used. | 10-15-2009 |
20100315298 | METHOD FOR ACHIEVING INTRINSIC SAFETY COMPLIANCE IN WIRELESS DEVICES USING ISOLATED OVERLAPPING GROUNDS AND RELATED APPARATUS - A system includes a wireless radio board, an antenna, and a ground pattern having a radio board ground and an antenna ground. At least a portion of the radio board ground and at least a portion of the antenna ground overlap. The radio board ground could include a first portion in a first layer of the ground pattern and a second portion in a second layer of the ground pattern, and the antenna ground could include a first portion in the first layer of the ground pattern. The antenna ground could further include a second portion in the second layer of the ground pattern. The radio board and antenna grounds could be separated by a minimum distance, such as 0.5 mm or 3.0 mm. | 12-16-2010 |
20120315842 | WIRELESS TELEMETRY AUTO TUNING FOR TORQUE MEASUREMENT SYSTEM - A torque measurement system that includes a rotor device and a stator device can perform automatic tuning to improve the initial tuning performed during design and assembly. The stator device can include a variable capacitive element and a micro-controller configured to adjust a capacitance value of the variable capacitive element. Additionally or alternatively, the rotor device can include a variable capacitive element and a micro-controller configured to adjust a capacitance value of the variable capacitive element. The adjustment of the capacitive elements can be based on the quality of signal detected at either the rotor device or stator device. | 12-13-2012 |
20140146897 | WIRELESS TELEMETRY AUTO FOR TORQUE MEASUREMENT SYSTEM - A torque measurement system that includes a rotor device and a stator device can perform automatic tuning to improve the initial tuning performed during design and assembly. The stator device can include a variable capacitive element and a micro-controller configured to adjust a capacitance value of the variable capacitive element. Additionally or alternatively, the rotor device can include a variable capacitive element and a micro-controller configured to adjust a capacitance value of the variable capacitive element. The adjustment of the capacitive elements can be based on the quality of signal detected at either the rotor device or stator device. | 05-29-2014 |
Patent application number | Description | Published |
20100239132 | FINGERPRINT TEMPLATE GENERATION, VERIFICATION AND IDENTIFICATION SYSTEM - A system to generate a template of a fingerprint input image is described. The system provides for smoothing the input image, forming a binary image from it, and further processing the binary image to extract the minutia of the fingerprint. The minutiae are stored in the template, in the form of locations of each minutia in relation to all other minutiae. The system includes optional identification and verification steps, which compare the template generated according to the system with templates stored in a fingerprint database. | 09-23-2010 |
20140052557 | METHOD AND APPARATUS FOR REDEEMING A SOFTWARE SUBSCRIPTION WHILE DETERRING PIRACY - A method and apparatus for redeeming a software subscription while deterring piracy. The method comprises receiving a request to activate a software subscription, wherein the request comprises a redemption code and a userID; validating the redemption code; retrieving a user profile based on the userID; validating a sales region where the software subscription was purchased against a country code in the user profile; and activating the software subscription upon successful validation of the redemption code and sales region. | 02-20-2014 |
20140053277 | METHOD AND APPARATUS FOR PROVISIONING SUBSCRIPTION PRODUCTS - A method and apparatus for provisioning a subscription product is disclosed. The method comprises receiving a request for a subscription product; retrieving a profile and at least one subscription associated with the profile, wherein the at least one subscription comprises a plurality of subscription details; validating the plurality of subscription details; retrieving product data for the subscription product based on the validated subscription details; determining a dominant subscription product when there are at least two subscriptions associated with the profile; and sending the product data for the dominant subscription product, wherein the product data enables activation of a product license. | 02-20-2014 |
20140067502 | METHOD AND APPARATUS FOR PROVISIONING A PRICE-DIFFERENTIATED PRODUCT WHILE DETERRING PIRACY - A method and apparatus for provisioning price-differentiated products while deterring piracy comprising creating a plurality of triples, wherein each triple comprises a first component, a second component, and a third component, wherein each triple uniquely identifies a price-differentiated product; providing to a vendor of the product a plurality of pairs, wherein each pair in the plurality of pairs comprises the first component and the second component of the triple for each price-differentiated product provided to the vendor; receiving the pair from the vendor when the product is sold; providing to a purchaser identification verifier the pair for the product that was sold; receiving from the purchaser identification verifier the second component of the triple upon verification of an identity of a purchaser; and providing product activation information to the identity verified purchaser in response to receiving the second component, wherein the activation information enables use of the product. | 03-06-2014 |
20140201730 | METHOD AND APPARATUS FOR REMOTE PURCHASE, INSTALLATION, AND LICENSING OF SOFTWARE - A method and apparatus for remote purchase, installation, and licensing of software is disclosed. The method comprising receiving, from a mobile device, a request for a software application; determining compatibility between at least one registered device and the software application; providing, to the mobile device, a list comprising compatible registered devices; placing the software application on an installation queue for the selected registered device in response to an input; and downloading the queued software application to the registered device. | 07-17-2014 |
20140358802 | METHOD AND APPARATUS FOR LICENSING WEB ASSETS - A computer implemented method and apparatus for licensing web assets. The method comprises loading a web asset for use by one or more software applications when an entitlement to use the web asset exists for a first user of the web asset, wherein the entitlement defines a purchased license to the web asset, and wherein the web asset is use agnostic. | 12-04-2014 |
20150032560 | METHOD AND APPARATUS FOR VERSION INDEPENDENT POINT OF SALE ACTIVATION (POSA) PRODUCT DOWNLOAD - A computer implemented method and apparatus for version independent Point of Sale Activation (POSA) product download. The method comprises accessing a database, wherein the database comprises a plurality of entries associated with a plurality of Point of Sale Activation (POSA) cards available for purchase at a retail store; retrieving, from the database, a plurality of entries associated with a previous version of a software product, wherein the previous version of the software product has not been redeemed; generating a serial number for each retrieved entry, wherein each serial number is associated with a current version of the software product; and updating, in the database, each retrieved entry with the generated serial number. | 01-29-2015 |
20150095177 | METHOD AND APPARATUS FOR PROVIDING SUBSCRIBER ELIGIBILITY VERIFICATION USING COMMUNITY VALIDATION - A computer implemented method and apparatus for providing subscriber eligibility verification using community validation. The method comprises: receiving credentials to verify a user as eligible to be a member of a group; matching the credentials to member information of a plurality of verified members of the group; requesting a reference from a plurality of matched verified members of the group, verifying that the user is eligible to be a member of the group; and validating the user as a member of the group upon receipt of at least one of the requested references. | 04-02-2015 |
20150095905 | METHOD AND APPARATUS FOR REMOTELY DELIVERING SOFTWARE - A computer implemented method and apparatus for remotely delivering software. The method comprises installing a provisioning application on a first device, in response to accessing an advertisement for a software product; determining one or more second devices that are synchronized with the first device, wherein the one or more second devices are remote from the first device, and wherein the one or more synchronized second devices are not registered with a software provider of the software product; registering the one or more synchronized second devices with the software provider of the software product; receiving, from the first device, a selection of one or more of the registered devices for installation of the software product; and directing installation of the software product on the one or more selected registered devices. | 04-02-2015 |
20150135333 | METHOD AND APPARATUS FOR MANAGING SOFTWARE ENTITLEMENTS - A computer implemented method and apparatus for managing software entitlements. The method comprises receiving a user request to enable access to a first software product that requires a special entitlement, wherein the user is entitled to access one or more second software products that require a corresponding one or more general entitlements, and wherein the first software product and the one or more second software products are resident in a memory accessible via a single access portal; verifying a user entitlement to the first software product requiring the special entitlement; and providing a license to enable access to the first software product that requires the special entitlement and the one or more second software products that require the general entitlement. | 05-14-2015 |
20150363405 | METHOD AND APPARATUS FOR GENERATING ORDERED USER EXPERT LISTS FOR A SHARED DIGITAL DOCUMENT - A computer implemented method and apparatus for generating ordered user expert lists for a shared digital document. The method comprises accessing a digital document, wherein the digital document relates to one or more topics; generating a list of expert students, wherein the expert students have authored one or more annotations relating to a topic similar to a topic in the digital document; ordering the list of expert students according to a rank, wherein the rank identifies a level of expertise of the expert students; and presenting the ordered list of expert students, where the ordered list comprises a pre-defined number of expert students with a level of expertise meeting a predefined threshold. | 12-17-2015 |
20150365399 | METHOD AND APPARATUS FOR SHARING SERVER RESOURCES USING A LOCAL GROUP - A computer implemented method and apparatus for sharing server resources. One or more applications are registered to a first local group on a device, and one or more applications are registered to a second local group on the device. If a user and device have been authenticated, and a device token already acquired for obtaining authorization for a first application of the first local group to access resources from a server, the same device token is available for use in obtaining authorization for a second application of the first group to access (share) resources from the server. Thus, the user need not re-submit authentication credentials to the authorization server. When the user signs out of an application of the same group, the sign out procedure is processed locally for all applications of the group. A device token is surrendered when it is not needed by applications of any other group. | 12-17-2015 |
Patent application number | Description | Published |
20130339786 | SMART ACTIVE-ACTIVE HIGH AVAILABILITY DAS SYSTEMS - A high availability DAS system uses a solid state cache to provide near active-active performance in a DAS duster, while retaining the implementation simplicity of active-passive or dual active system. Each node in the duster may include a solid state cache that stores hot I/O in an active-active mode, which allows the data to be read from or written to the underlying dual-active or active/passive DAS RAID system only when access to the “hot Region” cools down or in the case of Cache Miss. The hot I/O data includes hot read data that accumulated dynamically regardless of ownership of the drives where the hot read data is permanently stored. The hot I/O data also includes hot write data that is mirrored across the solid state cache memories to avoid potential dirty write data conflicts and also to provide High Availability in case of server failures. | 12-19-2013 |
20140089545 | LEASED LOCK IN ACTIVE-ACTIVE HIGH AVAILABILITY DAS SYSTEMS - A method and system for IO processing in a storage system is disclosed. In accordance with the present disclosure, a controller may take long term “lease” of a portion (e.g., an LBA range) of a virtual disk of a RAID system and then utilize local locks for IOs directed to the leased portion. The method and system in accordance with the present disclosure eliminates inter-controller communication for the majority of IOs and improves the overall performance for a High Availability Active-Active DAS RAID system. | 03-27-2014 |
20140173330 | Split Brain Detection and Recovery System - The invention provides for split brain detection and recovery in a DAS cluster data storage system through a secondary network interconnection, such as a SAS link, directly between the DAS controllers. In the event of a communication failure detected on the secondary network, the DAS controllers initiate communications over the primary network, such as an Ethernet used for clustering and failover operations, to diagnose the nature of the failure, which may include a crash of a data storage node or loss of a secondary network link. Once the nature of the failure has been determined, the DAS controllers continue to serve all I/O from the surviving nodes to honor high availability. When the failure has been remedied, the DAS controllers restore any local cache memory that has become stale and return to regular I/O operations. | 06-19-2014 |
20140344523 | System and Method of Selective READ Cache Retention for a Rebooted Node of a Multiple-Node Storage Cluster - The disclosure is directed to a system and method for managing READ cache memory of at least one node of a multiple-node storage cluster. According to various embodiments, a cache data and a cache metadata are stored for data transfers between a respective node (hereinafter “first node”) and regions of a storage cluster. When the first node is disabled, data transfers are tracked between one or more active nodes of the plurality of nodes and cached regions of the storage cluster. When the first node is rebooted, at least a portion of valid cache data is retained based upon the tracked data transfers. Accordingly, local cache memory does not need to be entirely rebuilt each time a respective node is rebooted. | 11-20-2014 |
20140351523 | System and Method of Rebuilding READ Cache for a Rebooted Node of a Multiple-Node Storage Cluster - The disclosure is directed to a system and method for managing cache memory of at least one node of a multiple-node storage cluster. According to various embodiments, a first cache data and a first cache metadata are stored for data transfers between a respective node and regions of a storage cluster receiving at least a first selected number of data transfer requests. When the node is rebooted, a second (new) cache data is stored to replace the first (old) cache data. The second cache data is compiled utilizing the first cache metadata to identify previously cached regions of the storage cluster receiving at least a second selected number of data transfer requests after the node is rebooted. The second selected number of data transfer requests is less than the first selected number of data transfer requests to enable a rapid build of the second cache data. | 11-27-2014 |
20150019822 | System for Maintaining Dirty Cache Coherency Across Reboot of a Node - Nodes in a data storage system having redundant write caches identify when one node fails. A remaining active node stops caching new write operations, and begins flushing cached dirty data. Metadata pertaining to each piece of data flushed from the cache is recorded. Metadata pertaining to new write operations are also recorded a corresponding data flushed immediately when the new write operation involves data in the dirty data cache. When the failed node is restored, the restored node removes all data identified by the metadata from a write cache. Removing such data synchronizes the write cache with all remaining nodes without costly copying operations. | 01-15-2015 |