Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

118 results about "Multimedia communication systems" patented technology

Multimedia Communication Systems is a comprehensive guide to the theory, principles, and practical techniques associated with implementing next-generation networked multimedia communications systems.

Targeted and intelligent multimedia conference establishment services

In a multimedia communications system (100), a conference establishment server coordinates the scheduling of a conference call. The server receives request for conference calls (202). The request includes a list of participants and may include an indication of the resources necessary and any rules for the conference call. The request may indicate critical resources or participants that are required for the call. Based on the request, the server determines a conference time and notifies participants of the time (204, 206, 210). Prior to conference time, participants are reminded of the time and automatically connected to the call. The server may check the status of users on the telecommunications network to determine availability. If a critical participant or resource is unavailable at conference time, the conference may be cancelled with notification to the participants.
Owner:GEMPLU

Multimedia communications system and method for providing audio on demand to subscribers

An audio-on-demand communication system provides real-time playback of audio data transferred via telephone lines or other communication links. One or more audio servers include memory banks which store compressed audio data. At the request of a user at a subscriber PC, an audio server transmits the compressed audio data over the communication link to the subscriber PC. The subscriber PC receives and decompresses the transmitted audio data in less than real-time using only the processing power of the CPU within the subscriber PC. According to one aspect of the present invention, high quality audio data compressed according to lossless compression techniques is transmitted together with normal quality audio data. According to another aspect of the present invention, metadata, or extra data, such as text, captions, still images, etc., is transmitted with audio data and is simultaneously displayed with corresponding audio data. The audio-on-demand system also provides a table of contents indicating significant divisions in the audio clip to be played and allows the user immediate access to audio data at the listed divisions. According to a further aspect of the present invention, servers and subscriber PCs are dynamically allocated based upon geographic location to provide the highest possible quality in the communication link.
Owner:INTEL CORP

Message and arrangement for provding different services in a multimedia communication system

In current multimedia communication systems using session initiation protocols such as SIP, a service change (e.g. adding a new media type to an existing multimedia conversation) entails significant delays and processor load in both clients and server. The current invention solves this by separating session signaling and media control signaling in different signaling channels (141,142) and by eliminating the need to re-establish SIP sessions for each service change. The application server (120) maintains a list of all media types supported by each multimedia client (110) involved in a multimedia conversation. Each multimedia client (110) requesting to send one or several media streams with different media types to one or several other multimedia client(s) negotiates with the application server (120) only. The inventive concept significantly reduces networks delays and speeds up the service change as perceived by the user. The invention is of interest for various multimedia conferencing applications.
Owner:TELEFON AB LM ERICSSON (PUBL)

Secure Key Management in Multimedia Communication System

Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a method for performing an authenticated key agreement protocol, in accordance with a multimedia communication system, between a first party and a second party comprises, at the first party, the following steps. Note that encryption / decryption is performed in accordance with an identity based encryption operation. At least one private key for the first party is obtained from a key service. A first message comprising an encrypted first random key component is sent from the first party to the second party, the first random key component having been computed at the first party, and the first message having been encrypted using a public key of the second party. A second message comprising an encrypted random key component pair is received at the first party from the second party, the random key component pair having been formed from the first random key component and a second random key component computed at the second party, and the second message having been encrypted at the second party using a public key of the first party. The second message is decrypted by the first party using the private key obtained by the first party from the key service to obtain the second random key component. A third message comprising the second random key component is sent from the first party to the second party, the third message having been encrypted using the public key of the second party. The first party computes a secure key based on the second random key component, the secure key being used for conducting at least one call session with the second party via a media plane of the multimedia communication system.
Owner:ALCATEL LUCENT SAS

System and method of marketing using a multi-media communication system

A system method of advertising using a multi-media application system is disclosed. The multi-media application relates to the delivery of multi-media messages using animated entities that audibly deliver messages created by a sender using text-to-speech technologies. The method provides targeted advertising based on information learned about both the sender of a multi-media message and the recipient of the multi-media message. The information may relate to an analysis of a text message created by the sender, emoticons chosen by the sender and inserted into the text of the message, the choice by the sender of an animated entity, or other parameters such as background music chosen for which template is chosen by the sender. Advertising messages may be delivered before the recipient receives the multi-media message, during the reception by the recipient of the multi-media message or following the reception of the multi-media message. A decision regarding whether to include an advertising message may be based on a text analysis or an analysis of the emoticons or other tags inserted into the text by the sender. Further, animated entities such as professionally designed face models, templates, additional emoticons, animation or sound effects may also be purchased by the sender for a limited number of multi-media messages, for limited amount of time or longer for use in creating multi-media messages. The system comprises a server to handle the reception and processing of sender multi-media messages and client software for both creating multi-media messages and receiving multi-media messages.
Owner:AT&T INTPROP I L P

Method for transmitting audio and video under environment of network with different speeds

The invention discloses a method for transmitting audio and video under an environment of a network with different speeds applied in a multimedia communication system which at least comprises a data transmitting terminal and a data receiving terminal. The data transmitting terminal at least comprises an encoder, a data buffering and a first control logic, and the data receiving terminal controls the encoder through the first control logic according to the buffer filling degree of the data buffering and selects the source code rate of a content source. The method can be used for automatically detecting the actual data transmitting speed so that the encoding code rate of the audio and video is suitable for the changing network environment and the actual data transmitting speed, therefore, a user enjoys the optimal multimedia quality under the changing network environment.
Owner:上海茂碧信息科技有限公司

Method for providing consolidated specification and handling of multimedia call prompts

Methods and apparatus for generating media-specific scripts for a plurality of multimedia communications systems are described. A method includes the step of receiving a transaction routing script. A media-specific script is generated for a plurality of communications media in accordance with the transaction routing script. An apparatus includes a transaction processor for receiving and routing communications from a plurality of communications mediums. A script generator generates a plurality of scripts specific to selected communications mediums in accordance with a media-independent portion of a pre-determined transaction routing script. In one embodiment, the pre-determined transaction routing script includes at least one prompt, at least one selectable option and a routing destination for each selectable option. In various embodiments, a media-specific script may correspond to electronic mail, touch tone telephone, or interactive voice response telephone communications medium. In one embodiment, a media-specific script defines at least one web page. In another embodiment, a media-specific script defines a plurality of hyperlinked web pages.
Owner:WILMINGTON TRUST NAT ASSOC AS ADMINISTATIVE AGENT +1

Secure key management in multimedia communication system

Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a method for performing an authenticated key agreement protocol, in accordance with a multimedia communication system, between a first party and a second party comprises, at the first party, the following steps. Note that encryption / decryption is performed in accordance with an identity based encryption operation. At least one private key for the first party is obtained from a key service. A first message comprising an encrypted first random key component is sent from the first party to the second party, the first random key component having been computed at the first party, and the first message having been encrypted using a public key of the second party. A second message comprising an encrypted random key component pair is received at the first party from the second party, the random key component pair having been formed from the first random key component and a second random key component computed at the second party, and the second message having been encrypted at the second party using a public key of the first party. The second message is decrypted by the first party using the private key obtained by the first party from the key service to obtain the second random key component. A third message comprising the second random key component is sent from the first party to the second party, the third message having been encrypted using the public key of the second party. The first party computes a secure key based on the second random key component, the secure key being used for conducting at least one call session with the second party via a media plane of the multimedia communication system.
Owner:ALCATEL LUCENT SAS

Method for generating log-likelihood ratio for QAM-OFDM modulating signal

The invention provides a method for producing log likelihood ratio of a quadrature amplitude modulation-orthogonal frequency-division multiplexing (QAM-OFDM) modulating signal. The method comprises the following steps: allowing an OFDM receiver to estimate the frequency domain channel factor of each QAM sub-carrier symbol; performing the channel compensation of each QAM sub-carrier symbol by utilizing the estimated frequency domain channel factor; normalizing the estimated frequency domain channel factor; multiplying the normalized frequency domain channel factor by a specified scaling factor that is selected from a look-up table; subjecting the compensated QAM symbol to the QAM de-mapping to obtain a basic bit measurement information; multiplying the basic bit measurement information by a scaling factor that is subjected to the normalization and the scaling treatment; and searching a pre-emphasis look-up table by utilizing the scaled soft information to obtain the final bit likelihood ratio and outputting the bit likelihood ratio. The method is universal, can obviously improve the system performance, and is applied to various modern broadband wireless multimedia communication systems. Additionally, the method is simple and free of complex calculation and is adaptive to the hardware implementation.
Owner:SAMSUNG ELECTRONICS CO LTD +1

Hierarchical Key Management for Secure Communications in Multimedia Communication System

In a communication system wherein a first computing device is configured to perform a key management function for first user equipment and a second computing device is configured to perform a key management function for second user equipment, wherein the first user equipment seeks to initiate communication with the second user equipment, wherein the first computing device and the second computing device do not have a pre-existing security association there between, and wherein a third computing device is configured to perform a key management function and has a pre-existing security association with the first computing device and a pre-existing security association with the second computing device, the third computing device performing a method comprising steps of: receiving a request from one of the first computing device and the second computing device; and in response to the request, facilitating establishment of a security association between the first computing device and the second computing device such that the first computing device and the second computing device can then facilitate establishment of a security association between the first user equipment and the second user equipment. The first computing device, the second computing device and the third computing device comprise at least a part of a key management hierarchy wherein the first computing device and the second computing device are on a lower level of the hierarchy and the third computing device is on a higher level of the hierarchy.
Owner:ALCATEL LUCENT SAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products