Patent application number | Description | Published |
20090296930 | TECHNIQUES TO PROVISION AND MANAGE A DIGITAL TELEPHONE TO AUTHENTICATE WITH A NETWORK - Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management component may also comprise a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a computing device, and decrypt the encrypted security credentials with the PIN. The digital telephone management component may further comprise a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to authenticate the digital telephone using the security credentials. Other embodiments are described and claimed. | 12-03-2009 |
20090327426 | REMOTE CALL CONTROL AND CONFERENCING USING PAIRED DEVICES - In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session. | 12-31-2009 |
20100185787 | DYNAMIC CALL HANDLING FROM MULTIPLE ATTACHED DEVICES - Multiple peripheral devices are used for various modes of communication in a unified communication application. Employing standard or custom protocols, connected peripheral devices can be configured automatically and different modes of communication such as audio, video, data, and text, are routed to available or selected peripheral devices. Incoming communication requests can be extended to multiple peripheral devices synchronously and users enabled to switch between peripheral devices seamlessly during a communication session. | 07-22-2010 |
20100322402 | ADVANCED CALL ROUTING USING LINKED IDENTITIES - Architecture for enabling user identities of callers to be collected from data sources and aggregated into respective meta-identities for each caller. Alternate user identities are searched, collected and associated with the meta-identity that can be a user name. A routing rule applied to the meta-identity is then applied across the alternate identities. The user identities can include a name of the caller, a phone number of the caller, or caller information collected from an external source. The phone numbers can include a partial phone number that is normalized into a full phone number format. The user identities can be mapped to the meta-identity and stored according to a hierarchy of confidence ratings. The user identities can be tagged with corresponding data source identifiers that designate respective data sources of the user identities. Conflict resolution is provided for selecting a suitable call routing path between callers having similar meta-identities. | 12-23-2010 |
20130155876 | Captive Portal State Detection and Avoidance for Multiple-Interface Traffic Offloading - In one embodiment, a mobile device connecting to a Wi-Fi hotspot first performs a connectivity check to determine whether the wireless connection is trapped in the walled garden of a captive portal by transmitting a connectivity check message to one or more external endpoints in the public IP network. If no response is received, the mobile device determines that it is in the captive portal state, and generates a browser window bound to the Wi-Fi state tracker of the mobile device displaying the portal page for the captive portal. In such a manner, the mobile device does not offload any traffic from its wireless cellular interface to its Wi-Fi interface until it is certain the Wi-Fi interface may access the public IP network, thereby preventing data interruption for mobile applications. | 06-20-2013 |
20130198383 | Network Access Based on Social-Networking Information - In one embodiment, a method includes receiving a request at a wireless access point from a client system to access a network through the wireless access point. The wireless access point sends an identifier associated with the client system to a social-networking system, the social-networking system including user profiles arranged in one or more social graphs. The social graphs store relationships between the user profiles. The method further includes receiving at the wireless access point from the social-networking system an authorization determination. The authorization determination is based upon a first user profile of the plurality of user profiles. The first user profile includes the identifier associated with the client system. The method further includes providing the client system with access to the network through the wireless access point in accordance with the authorization determination. | 08-01-2013 |
20140114738 | Automatic Check-In Using Social-Networking Information - In one embodiment, a method includes detecting by a computer system of an entity a client system identifier. The detection is accomplished using a first wireless communication method. The method further includes sending by the computer system the client system identifier to a social-networking system. The social-networking system includes multiple user profiles arranged in at least one social graph that stores relationships between the user profiles. The method also includes receiving at the computer system from the social-networking system user profile information from a user profile of the user profiles, the user profile identified by the social-networking system as being associated with the client system identifier. The method further includes sending information associated with the entity to the client system in response to receiving the user profile information. | 04-24-2014 |