Abstract:
In an embodiment, a Voice over Internet Protocol (VoIP) bidder negotiates with a VoIP provider and/or a VoIP access network to establish the VoIP provider as a preferred or default VoIP provider for the VoIP access network (e.g., a set of particular WiFi APs, a non-roaming cellular access network, etc.). As the preferred or default VoIP provider, the VoIP access network gives preferential performance and/or contract terms (or VoIP opportunities) for providing VoIP service to user equipments (UEs) via the VoIP provider as compared to one or more other VoIP providers that are also configured to provide VoIP service to the UEs over the VoIP access network. In a further embodiment, one of the UEs connects to the VoIP access network and advertises, to a user of the UE, the preferential performance and/or contract terms available to the UE via the VoIP provider over the VoIP access network.
Abstract:
Techniques for detecting and dealing with a lost electronics device are disclosed. In one design, the device may autonomously determine whether it is lost. The device may destroy at least one component to render it inoperable and may perform other actions in response to determining that it is lost. In another design, the device may determine available battery power of the device upon determining that it is lost, select at least one action in a list of possible actions based on the available battery power, and perform the selected action(s). In yet another design, upon determining that it is lost, the device may prevent access to information on the device based on a secondary security key, which is not used for encrypting information during normal operation. In yet another design, the device may notify at least one contact and may perform at least one additional action upon determining that it is lost.
Abstract:
In an embodiment, a client device (CD) maintains a contact profile for a user of the CD, the contact profile including a universal identifier (UID) for the user and a list of devices and addresses at which the user of the CD can be contacted. The CD establishes a communication session with a remote CD (RCD) via a given contact address from the set of contact addresses for the RCD. The CD shares, in response to the communication session establishment, at least a portion of the contact profile to the RCD. The RCD generates and/or updates a given contact profile for the user of the CD that is maintained on the RCD based on the shared contact profile. The RCD can also share its profile with the CD in response to the communication session establishment, causing the CD to generate and/or update a contact profile for the RCD.
Abstract:
In an embodiment, a client device (CD) maintains a contact profile for a user of the CD, the contact profile including a universal identifier (UID) for the user and a list of devices and addresses at which the user of the CD can be contacted. The CD establishes a communication session with a remote CD (RCD) via a given contact address from the set of contact addresses for the RCD. The CD shares, in response to the communication session establishment, at least a portion of the contact profile to the RCD. The RCD generates and/or updates a given contact profile for the user of the CD that is maintained on the RCD based on the shared contact profile. The RCD can also share its profile with the CD in response to the communication session establishment, causing the CD to generate and/or update a contact profile for the RCD.
Abstract:
Techniques for detecting and dealing with a lost electronics device are disclosed. In one design, the device may autonomously determine whether it is lost. The device may destroy at least one component to render it inoperable and may perform other actions in response to determining that it is lost. In another design, the device may determine available battery power of the device upon determining that it is lost, select at least one action in a list of possible actions based on the available battery power, and perform the selected action(s). In yet another design, upon determining that it is lost, the device may prevent access to information on the device based on a secondary security key, which is not used for encrypting information during normal operation. In yet another design, the device may notify at least one contact and may perform at least one additional action upon determining that it is lost.
Abstract:
A method for allowing multiple devices to communicate includes initiating a multi-media communication session between a first device and a second device, each of the first and second device having access to at least one additional device, identifying at least a portion of the multi-media communication session to direct to the at least one additional device, the first device obtaining a unique identifier of the at least one additional device and directing the identified at least a portion of the multi-media communication session to the at least one additional device.
Abstract:
Aspects for enhancing call control for directing a content path over multiple connections may include a method which includes establishing a first connection to a destination to use as a content path, receiving information from the destination for establishing an alternative connection, establishing as the alternative connection a background connection to the destination based on the information received, evaluating whether the background connection is preferable to the first connection for use as the content path, and switching the content path to the background connection when the background connection is preferable. Another method may include establishing a first connection as a content path and a background connection simultaneously to a destination for exchanging call traffic representing the same content, evaluating whether the background connection is preferable to the first connection for use as the content path, and switching the content path to the background connection when the background connection is preferable.