Patent classifications
H04L41/026
METHOD, SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIUM FOR PROVIDING MULTIPLE GROUP CALLS IN ONE CHATROOM
Disclosed is a method, system, and non-transitory computer-readable record medium for providing a plurality of group calls in a single chatroom. A group call providing method including receiving, by the at least one processor, information about a plurality of group call channels generated in response to a first request from at least one member included in a chatroom, from a server, providing, by the at least one processor, a group call channel list about the plurality of group call channels through the chatroom based on the information about the plurality of group call channels, and starting, by the at least one processor, a group call through a specific group call channel, from among the plurality of group call channels, in response to receiving a second request for joining the specific group call channel through the group call channel list may be provided.
MEDIA RESOURCE RESERVATION REQUEST FAILURE HANDLING FOR VOICE OVER MOBILE WIRELESS NETWORK
A method carried out by a telephony application server (TAS) is described that facilitates handling a digital voice network media resource reservation request failure notification, issued by a call session control function, arising from a connection request from an originating mobile user equipment to a terminating mobile user equipment. The method includes the TAS receiving a connection request response message including the digital voice network connection request failure notification. The TAS detects a media resource reservation request failure error condition based on the connection request response message containing the digital voice network media resource reservation request failure notification. Thereafter, the TAS issues a configured error response message to initiate an alternative message connection between the originating mobile user equipment and a message file service, where the message file service comprises an interface facilitating receiving a message from the originating mobile user equipment to the terminating mobile user equipment.
Priority assignment based on similarity
Priority assignment embodiments are discussed. In one embodiment, a system comprises a comparison component configured to make a first comparison of a first message of a message set against a mission with regard to a similarity of the first message to the mission to produce a first message similarity result and make a second comparison of a second message of the message set against the mission with regard to a similarity of the second message to the mission to produce a second message similarity result. The system also comprises a priority component configured to assign a transfer priority order among the first message and the second message through use of the first message similarity result and the second message similarity result, where the transfer priority order is based, at least in part, on the more similar a message is to the mission the higher priority given to the message.
Message oriented middleware topology explorer
A method includes retrieving vendor specific data from one or more message oriented middleware servers of a message oriented middleware infrastructure, and inputting the vendor specific data from the one or more message oriented middleware servers into a back-end database. The vendor specific data is converted into commonly formatted data, and the commonly formatted data is inputted into a front-end database. The method also includes retrieving the commonly formatted data from the front-end database, and displaying the commonly formatted data on a user interface providing a visualization of a topology of the message oriented middleware infrastructure.
Message oriented middleware topology explorer
A method includes retrieving vendor specific data from one or more message oriented middleware servers of a message oriented middleware infrastructure, and inputting the vendor specific data from the one or more message oriented middleware servers into a back-end database. The vendor specific data is converted into commonly formatted data, and the commonly formatted data is inputted into a front-end database. The method also includes retrieving the commonly formatted data from the front-end database, and displaying the commonly formatted data on a user interface providing a visualization of a topology of the message oriented middleware infrastructure.
Mobile terminal, communication system, communicating method, and recording medium
A mobile communication terminal receives, from a first communication terminal, first terminal identification information for identifying the first communication terminal, controls a display to display type information indicating a type of the first terminal identification information as being selectable by a user, and transmits the first terminal identification information to a counterpart mobile communication terminal, in response to a user selection of the type of the first terminal identification information.
REAL-TIME NOTIFICATIONS OF CONCURRENT EMAIL THREAD REPLIES
In an embodiment of the present invention, a first message is determined. The first message is associated with two or more users. The two or more users include a sender of the first message and one or more recipients of the first message. In response to determining that a first user of the two or more users is currently generating a second message, which is a response to the first message, it is determined whether a second user of the two or more users of the first message is currently generating a third message, which is a response to the first message. In response to determining that the second user is currently generating the third message, the first user is notified that the second user is currently generating the third message, and the second user is notified that the first user is currently generating the second message.
Digital real security system, method and program
A digital real security system, method and program reliably report the occurrence of an emergency situation in real time. The digital real security system comprises an abdominal pressure signal acquisition unit (101) that acquires an abdominal pressure signal from an abdominal pressure sensor (10) for detecting a user's abdominal pressure and acquires a respiration signal from a respiration sensor (20) for detecting the user's breathing, and a storage unit (105) that stores a normal-time number of breathing times and abdominal pressure pattern of the user detected by the abdominal pressure signal acquisition unit (101), and an abnormality determination unit (112) matches a number of breathing times and abdominal pressure pattern detected by the abdominal pressure signal acquisition unit (101) to that user's normal-time number of breathing times and abdominal pressure pattern stored in the storage unit (105), and determines whether it is abnormality based on the match result.
Information transmission system
A network device includes a processor; and a memory storing computer-readable instructions therein, the computer-readable instructions, when executed by the processor, causing the network device to perform: storing a first mail address and a second mail address; generating a first email to be addressed to the first mail address and a second email to be addressed to the second mail address, the first email having a first body including a URL, the second email having a second body including the URL; detecting a specific failure occurring in the network device; transmitting the first email to the first mail address and the second email to the second mail address when the specific failure is detected.
EXPERIENCE FOR SHARING COMPUTER RESOURCES AND MODIFYING ACCESS CONTROL RULES USING MENTIONS
Various methods and systems for sharing computer resources and modifying access control rules for computer resources are described. An access control gesture may be defined using a command indicator comprising one or more identifying characters, symbols, or glyphs. For example, an access control gesture may be defined using an @-sign in combination with a modifier that indicates a particular security command to execute and/or a corresponding permission to add/modify/revoke. For example, an input string comprising a plus sign in combination with an @-sign (e.g., “+@”) may indicate a command to add a mentioned user to an access control list. An input string comprising a minus sign, hyphen, or dash in combination with an @-sign (e.g., “−@”) may indicate a command to remove a mentioned user from an access control list. As such, access control gestures can provide a simple and intuitive mechanism to grant temporary access to a designated resource.