Abstract:
PROBLEM TO BE SOLVED: To provide a call tracing mechanism in an SIP environment. SOLUTION: A method of performing a call trace comprises steps of: (A) receiving a second message; (B) applying a second filter reference to the second message; thereby performing a predetermined process to the second message and creating the second filter reference in consequence of previously analyzing a characteristic of a first message received before the second message and of determining to apply the predetermined process to the first message, (C) determining that the second message is suitable to the second filter reference; and (D) processing the second message by the predetermined process. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a user-friendly method for managing a communication session with a computer by using a graphical user interface. SOLUTION: In the method using the graphical user interface for managing a communication session, a communication apparatus carries out the following steps. In the step (A), a set of connected graphical elements representing a structure of the communication session is displayed via the graphical user interface. In the step (B), the communication session includes a plurality of communicating users, and user input associated with the set of the connected graphical elements is received. In the step (C), the user input has an action associated with the communication session, and the action is performed based on the received user input. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a complete social network based, urgent matter, communications solution and response system. SOLUTION: The system can monitor one or more social networks (or other sources of information) for the presence of keywords, scalar urgency ratings, the identity and/or number of the parties submitting the urgent requests, temporal factors such as day, date, time, time zone, or the like, in an effort to determine which social network posts or communications are urgent, and optionally prioritize or rank pending urgent matters. The system can also determine who should be involved with solving or addressing the urgent matter. The system can also determine the presence of the parties needed to solve the urgent matter, and can, based on the presence information, setup a real-time or near real-time communications session between the parties to address the urgent matter. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a technique for detecting and solve feature interactions during a call. SOLUTION: The technique is provided for detecting feature interactions in multi-party calls (i.e., calls involving more than two endpoints), and in calls with bridged appearances. In accordance with the embodiment, a set (group) of rules is applied to the specifications of two features in order to detect interactions (conflicts) between the plurality of features. Only when it is determined that the first feature and second feature do not interact, the first feature and second feature are both activated. When it is determined that the first feature and second feature interact, only one of the first feature and second feature is activated. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To properly configure a node that carries high-priority and low-priority data units. SOLUTION: A method includes the steps of: (A) concurrently transmitting two streams through a node inside a telecommunications network, the two streams being a first stream of protocol data units requesting a first level of priority and a second stream of protocol data units requesting a second level of priority being lower than the first level; and (B) reconfiguring the node so that the first stream has a priority of higher level than the second stream at a predetermined point, the point being the time when an increase in the frequency of protocol data units causes a drop in a measure of QoS of the second stream to be matched with a drop in a measure of QoS of the first stream. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a proxy-based transaction authorization system. SOLUTION: A vehicle in which a responsive object is present is outfitted with a proxy. The proxy is configured such that it is better able than the responsive object to receive current position-determining signals from GPS satellites or from another current position-determining source. The proxy is configured such that it is better able than the responsive object to receive inquiry signals from a querying device and to represent those responsive object's location. The vehicle is also outfitted with (i) one or more sensors that detect the responsive objects that are present at the vehicle and (ii) one or more sensors that detect state information of the vehicle. Both sets of the sensors provide information to the proxy. The responsive-object sensors are able to query each responsive object in the same way that the querying device queries those objects in the prior art. The state of the vehicle includes the vehicle's location, its destination, its weight, temperature, humidity and barometric pressure inside and/or outside the vehicle. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To perform erasure (to put tone or to make silent) processing for private information from audio information which may include the private information. SOLUTION: A data-processing system receives an audio stream (a media stream including other types of media such as image). Once receiving the data, the data-processing system then extracts the audio stream including the private information from the received media stream. Then the data-processing system analyzes the audio stream to extract private audio content. The data-processing system uses a model in which private information to be removed is described for the extraction. As a result, the data-processing system eliminates the private audio content from the resulting stream that contains the processed audio. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for efficiently switching to another server when a server, from which a client is receiving services, fails. SOLUTION: The method includes the steps that: a client registers with a server in a subset constituted of a plurality of servers (wherein servers in the subset include a plurality of servers less than all the servers constituted of a plurality of servers) (A); the client obtains services from at least one of servers in the subset (in response to a state where a first server among servers in the subset becomes unavailable for the client) (B); and the client registers with a plurality of second servers not included in servers of the subset (adding the second server to servers of the subset) (C). COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system that locks a device (secures safety) when it is stolen/lost. SOLUTION: The system that secures the safety of a device includes (a) a behavior module that authenticates an event, updates rule data, and secures the safety of a device, (b) an authentication module that determines whether a first event is authenticated for the first event, which is a safety secure event, (c) an apparatus that causes the behavior module to authenticate the first event and update the rule data when the first event is authenticated, (d) an apparatus that determines whether the authentication is valid when the first event is not authenticated, (e) an apparatus that instructs the behavior module to authenticate the first event and update the rule data when the authentication is valid, and (f) an apparatus that instructs the behavior module to secure the safety of a device when the authentication is not valid. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and apparatus for enabling a telecommunications terminal to notify its user of the arrival of a message via an acoustic or visual signal whose properties are based on one or more attributes of the message. SOLUTION: The illustrative embodiment sets the values of one or more properties of a ringtone (e.g., tempo, volume, pitch, rhythm, etc.) based on one or more attributes of an incoming message (e.g., who the sender of the message is, a priority associated with the message, a subject associated with the message, the semantic content of the message, the location from which the message was sent, etc.) Similarly, properties of text (e.g., font size, font style, color, dynamic behavior such as flashing, etc.) and of images (e.g., brightness, size, contrast, resolution, etc.) for notifying the user of an incoming message are set based on attributes of the message. COPYRIGHT: (C)2010,JPO&INPIT