摘要:
A dual mode user terminal for a calling party can make calls over both a conventional cellular network and a packet data network using VoIP protocols. If the called party is not available to receive a VoIP call over the packet data network, the user terminal for the calling party can request a third party user terminal available on the packet data network to relay the call between the calling party and the called party.
摘要:
A dual mode user terminal for a calling party can make calls over both a conventional cellular network and a packet data network using VoIP protocols. If the called party is not available to receive a VoIP call over the packet data network, the user terminal for the calling party can request a third party user terminal available on the packet data network to relay the call between the calling party and the called party.
摘要:
Methods and apparatus for controlling access to a secure facility are disclosed, wherein a determination of whether access is permitted is based at least in part on a digital image of one or more predetermined features of the secure facility. In an exemplary method, an image of a predetermined feature of the secure facility is captured by a user device and compared to stored security data corresponding to the secure facility. A determination of whether access to the secure facility is permitted is made, based on the results of the comparison. The predetermined feature may be a security mechanism attached to the secure facility, for example, or may be textual information, a graphical image, or a machine-readable code posted at the security facility.
摘要:
Methods and systems for supplying data objects to users of a communication system are disclosed. In an exemplary method a session is established between a first and second communication device, and a primary data object providing first information pertaining to a user of the first communication device is transferred to the second communication device upon the occurrence of a triggering event at the first communication device. A request for a secondary data object is transferred from the second communication device to a data server, the request including the first information and further including information pertaining to the user of the second communication device. A secondary data object intended for rendering at the first and second communication devices is created and transferred to the first and second communication devices.
摘要:
A technique for supplying alternative contact information when a communication attempt is unsuccessful is described. The technique comprises receiving an inquiry that includes an indication of an unsuccessful communication attempt and an identifier or address for the target of the failed communication attempt. Next, it is determined whether the identifier or address is associated with a group. If so, a response is generated, the response including one or more other identifiers or addresses associated with the group. Finally, the generated response is transferred in response to the inquiry.
摘要:
An event-triggered pairing mechanism allows pairing wireless devices having short range interfaces (e.g., Bluetooth devices) by bumping the wireless devices together. A wireless device being paired with a connecting device detects a bump event, determines time information about the bump event, and then generates a private session key based on the time information. Once the devices are paired and the private session key is generated, user content can be securely exchanged between the devices.
摘要:
The dual-mode processor and corresponding method described herein selectively switches between a single-frequency mode, such as appropriate for an EDGE network, and a multiple-frequency mode, such as appropriate for a multi-carrier EDGE network. The pulse-shaping filters used during the multiple-frequency mode have a different filter response than the single-channel filter used during the single-frequency mode. The filter response of the pulse-shaping filters used during the multiple-frequency mode reduces cross-channel interference caused by the data symbols of two or more adjacent frequency channels that have the same or similar modulation and power level.
摘要:
Methods and apparatus for managing the distribution of data objects in a communication network are disclosed. In an exemplary method, such as might be implemented at a data object server, a plurality of data objects corresponding to a first user of a first communication device are stored. State information for the first communication device is received from the first device. The occurrence of a trigger event related to communications between the first communication device and a second communication device is detected, and one of the stored data objects is selected, based on the detected trigger event and the received state information, and forwarded to the second communication device. In some embodiments, the selection of the data object is further based on an identifier corresponding to the second communication device.
摘要:
Methods and apparatuses for routing emergency calls originated from mobile wireless devices in a Voice-over-IP (VoIP) system are described herein. In one or more embodiments, emergency calls are routed in a VoIP system by receiving incoming emergency calls originated from dual-mode mobile devices connected to the VoIP system through wireless access points (WAPs), determining locations associated with the incoming emergency calls, and redirecting callers to a cellular network. In other embodiments, emergency calls are routed in a VoIP system by mapping WAP identifiers to emergency answering points (EAPs), receiving an incoming emergency call from an originating WAP, identifying an EAP relating to the originating WAP, and directing the emergency call to the identified EAP.
摘要:
Methods and apparatuses for routing emergency calls originated from mobile wireless devices in a Voice-over-IP (VoIP) system are described herein. In one or more embodiments, emergency calls are routed in a VoIP system by receiving incoming emergency calls originated from dual-mode mobile devices connected to the VoIP system through wireless access points (WAPs), determining locations associated with the incoming emergency calls, and redirecting callers to a cellular network. In other embodiments, emergency calls are routed in a VoIP system by mapping WAP identifiers to emergency answering points (EAPs), receiving an incoming emergency call from an originating WAP, identifying an EAP relating to the originating WAP, and directing the emergency call to the identified EAP.