H04L61/2589

Routing incoming calls made to one or more unreachable numbers into a data client

A method and a call routing system (CRS) are provided for routing an incoming call made to one of multiple numbers of a user to a call receiving client application (CRCA) deployed on one or more user devices when the called number is not reachable. The CRS, in communication with the CRCA deployed on one or more user devices, sets up a user account using one or more of the user's multiple numbers. The CRS detects availability of the CRCA on one or more user devices over a data network to accept an incoming call. The CRS receives the incoming call made to one of the numbers, when the called number is not reachable. The CRS routes the incoming call to the CRCA on one or more user devices over the data network on detecting the availability of the CRCA on one or more user devices over the data network.

System and method for verifying and providing compensation for participation in real-time streaming of multimedia over a decentralized network

The present invention relates to systems and methods suitable for verifying and compensating nodes for streaming multimedia. In particular, the present invention relates to systems and methods that utilize a blockchain to verify and compensate devices for computational resources contributions when streaming multimedia over a decentralized network.

Ground combat vehicle communication system

A communication system provides multimedia communications within and between armored ground combat vehicles (GCVs). The system includes client computers within the armored GCVs providing distributed and interconnected multimedia communications among the client computers. The multimedia communication may include a one-to-one communication, a text communication to a group, an audio communication to a group, or a video communication to a group. Logic providing the distributed and interconnected multimedia communications is not located at a single client computer. The client computers display graphical user interfaces (GUIs) enabling soldiers to select parameters of the communication system with some GUIs providing presence discovery among the armored GCVs. One of the plurality of client computers acts as an origination station and other client computers may be configured as receiving communication station(s). The origination communication station may transmit digital communication data to the receiving communication station(s).

Centralized management of private networks

Described herein are systems, methods, and software to manage private networks for computing elements. In one example, a computing element may obtain credential information associated with a user and generate a public-private key pair for the computing element. The computing element may further communicate the public key from the pair with metadata to a coordination service to register the computing element at the coordination service. Once registered, the computing element may receive communication information associated with one or more other computing elements that permit the computing element to communicate with the other computing elements.

Communications apparatus, systems, and methods for preventing and/or minimizing session data clipping

The present invention is directed to communications apparatus, systems, and methods for preventing and/or minimizing session data clipping/loss when using the ICE protocol procedures on a session border controller. An exemplary method embodiment of operating a Session Border Controller (SBC) includes, receiving, at the SBC, an initial offer message from a first user equipment device directed to a second user equipment device, said initial offer message including one or more candidate addresses for the first user equipment device; and establishing a data path between the SBC and the second user equipment device in response to receiving said initial offer message prior to establishing a data session between the first user equipment device and the session border controller.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20230124148 · 2023-04-20 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20230124148 · 2023-04-20 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

System and Method for Using a Proxy to Communicate Between Secure and Unsecure Devices

The present invention relates to systems and methods suitable for establishing communication between secure and unsecure devices. In particular, the present invention relates to systems and methods that enables communication between secure and unsecure devices utilizing communication protocols that require implementation over secured connections.

MULTI-MASTER HYBRID TELEROBOTICS SYSTEM WITH FEDERATED AVATAR CONTROL

The present disclosure addresses an issue of inherent delay in a cloud-centric architecture in a scenario where multiple remote users join a teleoperation session with a robot such that any one of the users may take exclusive control of the robot and remotely maneuver it as the avatar of a current master. A Web Real-Time Communication (WebRTC) based signaling protocol with a hybrid topology for a multi-user session is provided, wherein Audio-Visual (A/V) data streaming happens over a public cloud while each master creates an on-demand peer-to-peer (P2P) channel with the robot for a desired duration of maneuvering the robot that represents the avatar of the current master. Thus, low-latency delivery of control commands results in good user experience. The provided method and system may be applied to teleoperation sessions like telemedicine sessions.

MULTI-MASTER HYBRID TELEROBOTICS SYSTEM WITH FEDERATED AVATAR CONTROL

The present disclosure addresses an issue of inherent delay in a cloud-centric architecture in a scenario where multiple remote users join a teleoperation session with a robot such that any one of the users may take exclusive control of the robot and remotely maneuver it as the avatar of a current master. A Web Real-Time Communication (WebRTC) based signaling protocol with a hybrid topology for a multi-user session is provided, wherein Audio-Visual (A/V) data streaming happens over a public cloud while each master creates an on-demand peer-to-peer (P2P) channel with the robot for a desired duration of maneuvering the robot that represents the avatar of the current master. Thus, low-latency delivery of control commands results in good user experience. The provided method and system may be applied to teleoperation sessions like telemedicine sessions.