Abstract:
Methods and apparatus for expanding a field of view of an image during a video communication session. In some embodiments, a method includes transmitting a first video image having a first field of view during the video telecommunication session. The methods and apparatus further capturing a first set of background images, at least some of which are combined to form a first composite background image having a second field of view that is greater than the first field of view. Further, superimposing at least a portion of the first video image over the first composite background image to form a second video image having a same field of view as the first composite background image and transmitting the second video image during the video telecommunication session.
Abstract:
Methods and apparatus for verifying an end-user device during provisioning using caller ID (CID) are provided herein. In some embodiments, a method for verifying an end-user device during provisioning using CID may include receiving a first CID from the end-user device, associating a validation key with the first CID, sending a first signaling message to the end-user device including the validation key, receiving a second signaling message from the end-user device that includes a second CID, and performing a verification analysis of the end-user device using the second CID and the validation key.
Abstract:
A method for generating customized menus for accessing application functionality of a mobile device comprising detecting a gesture performed on a display of the mobile device and displaying a quick menu on the display containing preview information pertaining to one or more applications based on the detected gesture.
Abstract:
A method for minimizing application initialization delay comprising sending, from a privileged application executing on a mobile device, a registration message to a server, receiving, at the privileged application, a response message from the server, extracting, from the response message, application information and notifying the mobile device of the application information.
Abstract:
IP telephony communications are conducted by sending both data produced by a CODEC that represents received spoken audio input, and a textual representation of the spoken audio input. A receiving device utilizes the textual representation of the spoken audio input to help recreate the spoken audio input when a portion of the CODEC data is missing. The textual representation can be generated by a speech-to-text function. Alternatively, the textual representation can be a notation of extracted phonemes.
Abstract:
A system and method for dynamically changing contact information is presented. The system and method includes receiving a contact information change associated with a contact in a first contact list, determining that the contact is also in a second contact list and modifying the second contact list based on the contact information change.
Abstract:
A method and apparatus for user location registration comprising registering subscriber location information associated with a device with a registration service in a first network, receiving, from a second network, a broadcast location request and sending, in response to the broadcast location request, the subscriber location information to the second network.
Abstract:
A method and apparatus for configuring communication parameters of a wireless device are provided herein. In some embodiments, the method may establishing a communication connection to a wireless access point, determining one or more security characteristics of the wireless access point, selecting a security policy to apply to the wireless device based on the determined one or more security characteristics of the wireless access point, adjusting one or more communication parameters of the wireless device based on the selected security policy, and communicating with the wireless access point using the adjusted communication parameters.
Abstract:
The disclosed subject matter addresses the problem of spoofing by directly and transparently communicating with the apparent sender of the potentially spoofed incoming message or with the communications network handing the communication of the potentially spoofed incoming message. The address of the recipient device of the potentially spoofed incoming message is compared with addresses of communication sent from the apparent sender. As a result of this comparison, it may be determined whether the phone call or message was sent from the apparent source or was spoofed. The times associated with messages sent from the indicated sender and times associated with the incoming message may also be used to determine the authenticity of the apparent sender. The recipient is of the incoming message is notified of a spoofed message.
Abstract:
Systems and methods for terminating telephony communications to a mobile telephony device associated with a first native telephone number are disclosed. The method comprises: receiving, from a native mobile telephony provider network associated with the first native telephone number, a telephony communication that was originally directed to the first native telephone number but which has been forwarded to a forwarding access number, where the telephony communication includes a header comprising the first native telephone number; retrieving the native telephone number from the header; mapping the native telephone number to a mobile telephony device of a subscriber; and terminating the received telephony communication to the mobile telephony device associated with the native telephone number.