Abstract:
A processor-implemented method of operation for managing a push-to-talk (PTT) session involving a plurality of participants includes applying a first floor control algorithm at a PTT server. The first floor control algorithm being selected from a plurality of algorithms that arbitrate among talk requests received from the participants. The method further includes changing, during the PTT session, from the first floor control algorithm to a second floor control algorithm at the PPT server. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
Abstract:
In one embodiment, a method for enhanced extension mobility includes accessing user input indicating either a desire of a user to logon at an endpoint in a private mode according to which the endpoint supports only an extension of the user or a desire of the user to logon at the endpoint in a shared mode according to which the endpoint concurrently supports an extension of the user and one or more other extensions of one or more other users. The method includes configuring the endpoint to support only an extension of the user if the user input indicates a desire of the user to logon at the endpoint in a private mode according to which the endpoint supports only an extension of the user. The method includes configuring the endpoint to concurrently support an extension of the user and one or more other extensions of one or more other users if the user input indicates a desire of the user to logon at the endpoint in a shared mode according to which the endpoint concurrently supports an extension of the user and one or more other extensions of one or more other users.
Abstract:
Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or "sleep" when a user leaves one or more of the devices. Users may be automatically identified and associated. The "presence" of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.