Abstract:
An apparatus in one embodiment is operable to receive, from a remote control device associated with a video display device, biometric input of a user. Responsive to a match of the biometric input with stored biometric data of the user, the user is authenticated. The remote control device and/or the video display device are then configured based on user settings associated with the stored biometric data of the user. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
Abstract:
A method for recovering a communication session after failure of an endpoint includes establishing a communication session between a first endpoint and a second endpoint, receiving keep alive signals from the first endpoint, detecting an interruption in the keep alive signals, and transferring the communication session with the second endpoint from the first endpoint to a third endpoint. A network device includes an interface that receives keep alive signals from a first endpoint in a communication with a second endpoint, and also includes a process or service that detects an interruption in the keep alive signals and transfers the communication session with the second endpoint from the first endpoint to a third endpoint.
Abstract:
In one embodiment, providing an endpoint access to a locked target includes receiving a virtual key at a grantee endpoint through a wireless link. The virtual key results from a permission from a grantor endpoint, and is operable to unlock a physical lock of the target. The virtual key is wirelessly transmitted to a management system of the target to unlock the lock.
Abstract:
In one embodiment, a method includes receiving a first user profile comprising at least one rule associated with at least one show. The at least one rule is activated upon the occurrence of a first event. The method also includes detecting the occurrence of the first event. Upon detecting the occurrence of the first event, the method further includes activating the at least one rule and processing a first communication based on the at least one rule.
Abstract:
A method for communicating a reminder message includes establishing a first connection between a user and a reminder center. The method includes communicating, from the user to the reminder center, a reminder time. The method also includes scheduling a reminder message at the reminder center, and terminating the first connection between the user and the reminder center. The method includes selecting, at the reminder center, a preferred endpoint associated with the user, from a plurality of endpoints associated with the user. The method also includes attempting to establish a second connection between the user and the reminder center, using the preferred endpoint associated with the user, at is approximately the reminder time, and communicating the reminder message from the reminder center to the user.
Abstract:
In one embodiment, a Media Analysis and Delivery System obtains a set of media delivery rules, wherein the set of media delivery rules includes one or more triggers, each of the triggers identifying a topic of interest. The Media Analysis and Delivery System examines a media stream for at least one of the one or more triggers in accordance with the set of media delivery rules. The Media Analysis and Delivery System provides at least a portion of the media stream in response to at least one of the triggers in accordance with at least one of the set of media delivery rules.
Abstract:
In one embodiment, one or more users may be participating in a conversation. In one example, a first user may be speaking into a speaker end device and a second user may be listening at a listener end device. The second user may be in an environment where noise may be present. Particular embodiments determine characteristics of the noise at the listener end device. Characteristics of a voice signature for a user speaking with the speaker end device are also determined. Comprehension enhancement of voice signals received from speaker end device is then performed based on characteristics of the noise at the listener end device and characteristics of the voice signature. For example, the signature of the voice signals may be altered to lessen the overlap with the noise.
Abstract:
Disclosed is an active or dynamic RFID tag that actively provides current status information regarding a particular item, as well as mechanisms for recognizing dynamic RFID information read from such RFID tag. Static identifying information regarding the particular item is provided either by the same active/dynamic RFID tag or by a different passive RFID tag. While the RFID tag may passively or actively provide general identification, the RFID tag actively provides status information that corresponds to changes in the corresponding item's status. In a first implementation, active RFID tags are positioned next to one or more components within a system so that each active RFID tag is powered and transmitting its RFID information when its corresponding component is operational. In contrast, each active RFID tag is positioned so that it is not powered and not transmitting its RFID information when its component is failing. Accordingly, an RFID reader can then know when a system has a failing component when one of the component's corresponding active RFID tag is not transmitting its RFID information. In this first implementation, the active RFID tag either transmits or fails to transmit based on its component's status state. In a second implementation, a dynamic RFID is associated with a specific component, set of components, or system, and the dynamic RFID tag dynamically provides an RFID reader with RFID information that changes with its associated item's changing status state. The status state may correspond to any suitable parameter of the item or product that can change over time. Thus, the dynamic RFID provides different transmission frequencies based on different status states of its component or system.
Abstract:
In a wide-area communication system, users or numbers in the system to be alerted are ranked so to improve the efficiency of the alert calls. Rankings are based on various factors, including whether two or more users are on the same active call, whether a user is on an active call, how recently a user ended a call, and whether a user recently missed a call. Within rankings, there may be multiple callers or numbers. These users may further be ranked, such as by determining which caller is expected to end a call first based on the current elapsed time of the call and the average call duration for that user or number.
Abstract:
A method for intelligently managing a transportation network is provided. The method may include providing a roadside apparatus 18 to communicate with nodes 14A to 14D associated with vehicles 12A to 12D in a transportation network, the vehicle nodes being in a neighborhood range of the roadside apparatus. The roadside apparatus may dynamically detect the presence of a node 14A associated with a first vehicle 12A, and establish a mobile Internet Protocol (IP) network between the roadside apparatus and the first vehicle's node. The roadside apparatus 18 receives, in real-time, from the first vehicle's node 14A event data of events associated with the first vehicle 12A over the mobile IP network. The roadside apparatus 18 or nodes 14A to 14D may further receive or transmit real-time command data to control subsystems of a vehicle.