Abstract:
The disclosure generally relates to various methods to discover, configure, and leverage relationships in Internet of Things (IoT) networks. More particularly, the methods disclosed herein may support automated processes to create configurable sub-divisions and access controls in an IoT network based on usage associated with objects that are registered in the IoT network and interactions among the registered objects. Furthermore, in one embodiment, relationships between IoT devices that belong to different users may be implicitly discovered and/or ranked based on meetings (e.g., interactions) between the IoT devices, and relationships between the different users may likewise be implicitly discovered and/or ranked. Moreover, locations and interactions associated with IoT devices may be tracked over time to further discover user-specific and potentially asymmetric relationships among the IoT devices and/or the users associated therewith (e.g., where one user considers another user a close friend and the other user considers the first user an acquaintance).
Abstract:
A method of optimizing call dialing may include receiving a first call including one or more of a session identification number, a contact identification number, a contact name and a direct inward dialing number, determining a call provider and a callee provider based on the first call, determining cost information associated with one or more numbers corresponding to a callee and routing a second call between the caller and the callee based on one or more of the caller provider, the callee provider and the cost information.
Abstract:
The present disclosure generally relates to systems and methods for establishing and maintaining communication between two or more communication devices coupled to communication networks. Some specific aspects relate to communication between a plurality of communication devices each of which is coupled to a respective network. Other aspects relate to establishing such communication by way of contact lists maintained and facilitated on systems coupled to the networks. Users of multiple communication networks, such as VoIP, PSTN and wireless, employ multiple communication devices to communicate with their contacts. For example, a VoIP enabled computer is necessary to access contacts on a VoIP network and a mobile or cellular telephone is used to access contacts on wireless and PSTN networks. A contact list, stored on one communication device, in some instances, cannot be accessed from another communication device. For example, a contact list stored in a VoIP enabled computer cannot be accessed from PSTN or wireless phone devices. Various embodiments described herein provide a convenient solution that can integrate contacts stored on different communication devices and make them accessible from a single device.
Abstract:
The disclosure is directed to controlling of Internet of Things (IoT) devices based on detecting a device and obtaining control information and associated rules for controlling the device. The control functions available to a smart controller can vary based on the condition of the various rules and/or the interaction of the various devices detected.
Abstract:
The disclosure generally relates to enabling communication among one or more Internet of Things (IoT) device groups. In particular, various heterogeneous IoT devices that may need to interact with one another in different ways may be organized into IoT device groups to support efficient interaction among the IoT devices. For example, pre-defined IoT device groups may be formed organize certain IoT devices that perform similar activities and certain IoT devices may be dynamically allocated to ad-hoc IoT device groups for certain contexts (e.g., the ad-hoc IoT device groups may include IoT devices that can implement a desired function and therefore be dynamically formed to implement the desired function). Furthermore, the IoT groups may communicate hierarchically, wherein messages may be exchanged among IoT group owners or ranking members to support efficient communication between different IoT groups.
Abstract:
Methods and apparatus for providing voicemail services to callers of wireless devices may include providing customized outgoing messages to callers based upon the caller's identification. A subscriber to the voicemail service may select one or more contacts associated with the subscriber to receive a customized outgoing message while the remaining callers receive a general outgoing message. The methods and apparatus may further include distributing voicemail messages from a subscriber's voicemail accounts to one or more social networking sites. The subscriber to the voicemail services may share one or more received voicemail messages via one or more social networking accounts associated with the subscriber.
Abstract:
Methods and apparatus for providing voicemail services to callers of wireless devices may include providing customized outgoing messages to callers based upon the caller's identification. A subscriber to the voicemail service may select one or more contacts associated with the subscriber to receive a customized outgoing message while the remaining callers receive a general outgoing message. The methods and apparatus may further include distributing voicemail messages from a subscriber's voicemail accounts to one or more social networking sites. The subscriber to the voicemail services may share one or more received voicemail messages via one or more social networking accounts associated with the subscriber.
Abstract:
The disclosure is related to providing interconnectivity between a plurality of user devices. A wireless interconnectivity device connects to a first user device of the plurality of user devices over a first local wireless network, connects to a second user device of the plurality of user devices over a second local wireless network, receives a request from the first user device to transfer data from the first user device to the second user device, determines whether or not a third user device has granted permission to transfer the data from the first user device to the second user device, and transfers the data from the first user device to the second user device based on the third user device having granted permission to transfer the data from the first user device to the second user device.