Patent classifications
H04L51/00
Reactive avatars
Avatars are used to graphically represent users in a communications session, and the avatars are capable of being animated. An indication of an animation of one of the avatars is received. Another avatar that represents another of the users is animated in response to, and based on, the animation of the avatar in the same communications session.
DEVICES AND METHODS OF PROVIDING RESPONSE MESSAGE IN THE DEVICES
A device includes a communication unit configured to receive a call request from a calling user; and a control unit configured to control the communication unit to provide a response message including information about a current situation based on information about an application currently being executed to the calling user in response to a rejection regarding the call request.
METHOD AND APPARATUS FOR A POWER-EFFICIENT FRAMEWORK TO MAINTAIN DATA SYNCHRONIZATION OF A MOBILE PERSONAL COMPUTER TO SIMULATE A CONNECTED SCENARIO
An apparatus and method for a power-efficient framework to maintain data synchronization of a mobile personal computer (MPC) are described. In one embodiment, the method includes the detection of a data synchronization wakeup event while the MPC is operating according to a sleep state. Subsequent to wakeup event, at least one system resource is disabled to provide a minimum number of system resources required to re-establish a network connection. In one embodiment, user data from a network server is synchronized on the MPC without user intervention; the mobile platform system resumes operation according to the sleep state. In one embodiment, a wakeup alarm is programmed according to a user history profile regarding received e-mails. In a further embodiment, data synchronizing involves disabling a display, and throttling the system processor to operate at a reduced frequency. Other embodiments are described and claimed.
METHOD AND SYSTEM FOR CENTRALIZED CONTACT MANAGEMENT
Disclosed is a method and system for managing contacts for a communication system by storing contact information in a centralized storage system and permitting receiving users to access the centralized contact information storage system using a token passed with communications from a sending user. The communications system may be a trusted network with trusted sending and receiving members. Each communications system member provides contact information the member may wish to make available to other parties. The member may also create a policy defining which contact information may be made available to different classes of users. A member of the communications system generates a message to send to a receiving user. A token that identifies the sending user to the communications system is embedded into the message to be sent to the receiving user. The receiving user, after identifying the message as a message containing a token, may request contact information for the sending user from the communications system using the token identifying the sending user to the communication system. The communication system delivers a subset of the sending user's contact information to the receiving user based on the sending user's contact information and policy definitions stored in the centralized contact information storage system of the communication systems. The system and method are especially adaptable to e-mail communications, but other forms of electronic communications may also be included in an embodiment, either solely or in combination.
PERSONAL MONITORING USING A REMOTE TIMER
Method and apparatus for monitoring the status and location of personnel using a remote timer. In some embodiments, a method includes execution of a subject application (app) on a network accessible device. A countdown timer of a remote server is initiated to monitor a time interval, the remote server communicating with the network accessible device over a network. Geo positions of the network accessible device are monitored during the monitored time interval. The remote server sends a notification to a monitoring device responsive to at least one of the following events: the monitored time interval ends without the remote server receiving an authorized personal identification (PID) value; or the remote server receives an unauthorized PID value prior to the conclusion of the monitored time interval. In further embodiments, a notification is sent based on an out-of-bounds geo position of the network accessible device during the time interval.
METHOD FOR MESSENGER SERVICE AND APPARATUS THEREFOR
A method and device for providing a closed messenger service to a second authority-level user includes receiving, from a first terminal, a first identity of a first authority-level user who invited the second authority-level user, a second identity of the second authority-level user, and information identifying a workspace to which the second authority-level user is invited, transmitting an authorization request to an approver when it is determined that authorization for the second authority-level user is required on the basis of the first identity, and performing a workspace member registration procedure based on the second identity and the information identifying the workspace when receiving an authorization confirmation to the authorization request from a second terminal.
METHOD FOR MESSENGER SERVICE AND APPARATUS THEREFOR
A method and device for providing a closed messenger service to a second authority-level user includes receiving, from a first terminal, a first identity of a first authority-level user who invited the second authority-level user, a second identity of the second authority-level user, and information identifying a workspace to which the second authority-level user is invited, transmitting an authorization request to an approver when it is determined that authorization for the second authority-level user is required on the basis of the first identity, and performing a workspace member registration procedure based on the second identity and the information identifying the workspace when receiving an authorization confirmation to the authorization request from a second terminal.
Dynamic credit report obfuscation
A method for creating a customized and redacted credit report may include transmitting a user request to generate a customized credit report, receiving a copy of a stored credit report, analyzing the copy of the stored credit report, displaying one or more information fields and one or more selectable user interface elements, transmitting a credit report redaction list, and receiving a customized credit report. A user device for configuring a customized credit report may include a processor, a display in communication with the processor, and a non-transitory memory storing instructions that, when executed by the processor, cause the processor to perform processing including transmitting a user request to generate a customized credit report, displaying one or more information fields and one or more selectable user interface elements, transmitting a credit report redaction list, and receiving a shareable credit report link associated with a customized credit report.
Systems and methods for presenting metaphors
A system that incorporates teachings of the present disclosure may include, for example, a metaphor engine having a controller, and a storage medium for storing instructions to be executed by the controller. The instructions, when executed by the controller, cause the controller to receive a measure of a mood of an individual, create a metaphor according to the measure of the mood of the individual, and present the metaphor to an entity requesting to interact with the individual. The measure of the mood can be synthesized from collected information associated with a behavior of the individual, and can indicate an availability of the individual and a receptiveness of the individual to accept a request to interact with an entity. Other embodiments are disclosed.
Automated configuration support system
A configuration support system includes a support device having an automated support application, a network device, and a management device coupled to the network device and the support device. The management device creates a configuration session with the network device and, in response, displays a configuration window. The management device also creates a messaging session with the automated support application and, in response, displays a messaging window. The management device may then send, to the automated support application via the messaging session, data generated during the configuration session. The management device may also receive, from the automated support application via the messaging session, an automated support application command directed to the network device and execute, on the network device via the configuration session, the automated support application command.