Chat room access control

Information

  • Patent Grant
  • 10574609
  • Patent Number
    10,574,609
  • Date Filed
    Wednesday, June 29, 2016
    8 years ago
  • Date Issued
    Tuesday, February 25, 2020
    4 years ago
Abstract
In one embodiment, a request to join an electronic chat room is received from a requester. A selection of an access control level for the requester is received via a user interface in order to grant the requester access to the electronic chat room according to a condition for granting access. The user interface is used to assign a selected access control level to the requester, thereupon granting access to the requester. The requester's access to content available in the electronic chat room being limited based on the selected access control level. Related methods, apparatus, and systems are also described.
Description
TECHNICAL FIELD

The present disclosure generally relates to methods and systems for controlling access to chat rooms.


BACKGROUND

Many systems for locking chat rooms are known in the art. For example, a moderator may be able to lock a room. In such systems, people are unable to join a chat room unless they are expressly invited. There are also methods known for blocking existing chat rooms so that such rooms do not appear when they are searched for.





BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:



FIG. 1 is a simplified pictorial illustration of a first view of a chat room application constructed and operative in accordance with an embodiment of the present invention;



FIG. 2 is a simplified pictorial illustration of a room request dialog box in the chat room application of FIG. 1;



FIG. 3 is a simplified pictorial illustration of a second view of the chat room application of FIG. 1; and



FIG. 4 is a simplified flowchart of a method for implementing embodiments of FIG. 1.





DESCRIPTION OF EXAMPLE EMBODIMENTS
Overview

In one embodiment, a request to join an electronic chat room is received from a requester. A selection of an access control level for the requester is received via a user interface in order to grant the requester access to the electronic chat room according to a condition for granting access. The user interface is used to assign a selected access control level to the requester, thereupon granting access to the requester. The requester's access to content available in the electronic chat room being limited based on the selected access control level. Related methods, apparatus, and systems are also described.


Example Embodiments

Reference is now made to FIG. 1, which is a simplified pictorial illustration of a first view of a chat room application 100 constructed and operative in accordance with an embodiment of the present invention. FIG. 1, depicts a view of a chat application 100 of a hypothetical user, Andrew. The depiction of the exemplary application window showing the chat application 100 of FIG. 1 shows several portions in the application window:

    • a list of chat rooms 110 in chronological order, which shows several chats (i.e. conversations) which a user of the chat room application is (or has at one time) participated in, the most recently visited chat room listed first;
    • a message portion 120, which shows various messages 123a, 123b, 123c, in one particular chat, such as highlighted chat “Iceberg” 125. Andrew is a participant in the Iceberg 125 chat room, and has moderator rights in the Iceberg. There is also a section for typing new messages 127 in the message portion 120;
    • a list of participants 140 in the current chat, which also indicates the number of participants in the chat (three, in the present example). Andrew is indicated as “Me” in the list of participants 140. Andrew's moderator status is also indicated; and
    • a list of files 150 which have been added or uploaded to the chat, which also indicates the number of files already uploaded in the chat (one, in the present example).


It is appreciated that the term “conversation”, as used above, may, in some applications refer to individual “chat rooms”. The terms “conversation”, “chat room”, and “chat”, in their various grammatical forms, may be used interchangeably in the present application and claims.


The list of files 150 mentioned above indicates that, in the present chat, Iceberg 125, one file has been uploaded (i.e. added to the chat). The file 160 itself, in the present example, named “Group chat presentation.ppt” appears in both the message portion 120 of the chat application window, and in the list of files 150. It is appreciated that as more messages are added to the chat, the file 160 will gradually be pushed down, out of the visible portion of the message portion 120. The file 160 is available to the participants 140 in the chat for viewing and downloading. As is noted in the description above of the message portion 120, the file 160 was uploaded by Andrew.


Since the chat room, such as the Iceberg conversation 125 is a persistent chat room, participants in the chat room, such as the participants appearing in the list of participants 140 may not be concerned that their messages and files in a particular chat room are visible and accessible to those already in the chat room, i.e. Iceberg 125. However, should an additional or outside party be added to the chat room at a later date—whether inadvertently or deliberately—the confidentiality of those messages may become compromised.


In one embodiment, access control is exercised over admission of a new participant in the room by way of an access granting condition. By way of example, and without limiting the generality of the foregoing, access to the chat room may be granted according to any of the following conditions:















Veto
all the room participants must grant access to a



new person being invited to join the room



(before they are officially invited or added).


Majority
a majority vote of room participants is required in



order to grant access to a new person being invited to



join the room (before they are officially invited or added).


Moderator
at least one specific participant in the chat room


control
having moderator status can grant access to a new person



being invited to join the room (before they are



officially invited or added). It is appreciated



that some embodiments may require a majority of



moderators, or may provide a veto to a single moderator,



in order to approve a new participant or to deny a



(potential) participant rights to participate in the chat.









These criteria (i.e., veto, majority, moderator control) to add a new participant into the chat room may be established, in some embodiments, when the chat room is first set up. Alternatively, there might be a domain wide policy (e.g. all chat rooms established inside a given company may require “Veto” or “Moderator Control” for adding a new member.


It is appreciated that the creator of a new chat room automatically becomes a moderator. The creator of the room who is a moderator, can then assign other moderators to a chat room. There may be a mechanism enabling appointing new moderators:

    • a veto of all members or just the existing moderators may prevent a new moderator from being appointed;
    • a majority vote of all members or just the existing moderators be required in order to appointed a new moderator, or
    • a moderator may appoint a new moderator.


Reference is now made to FIG. 2, which is a simplified pictorial illustration of a room request dialog box 210 in the chat room application of FIG. 1. In FIG. 2, Andrew, a moderator, gets a room request dialog from Jack who wants to join the Iceberg 125 chat room. The room request dialog box 210 comprises a legend, such as legend 220, which indicates that “Jack Smith would like to join the Iceberg room”. Assuming, in view of the above discussion that a single moderator, such as Andrew, can add a new participant to the chat room, then Andrew may select one of option buttons 230, enabling Jack to:

    • View all files and messages which have been and will be uploaded to the chat room;
    • View only messages, but not files, which have been and will be uploaded to the chat room;
    • View only files, but not messages, which have been and will be uploaded to the chat room; or
    • Press Cancel 240, effectively denying Jack's request to join the Iceberg chat room 125.


Alternatively, the moderator, Andrew, may invite Jack to join the chat room, and in such a case, the moderator would set the privileges of the invitee (Jack in this case) prior to sending the invitation.


In the present example, Andrew does not want Jack to see the file posted to the room so selects the appropriate one of the option buttons 230, i.e. “Only view messages”.


Additionally, Andrew has the option to limit Jack's viewing rights 250, such that Jack may only see messages which were posted after a certain date, Feb. 12, 2015, in the present example. Earlier messages will not appear on Jack's chat application 300 (FIG. 3, below; analogous to Andrew's chat application 100, of FIG. 1).


When Andrew has finished granting Jack's rights, Andrew clicks OK 260 in order to close the room request dialog box 210, thereby enabling Jack's entry to the chat room.


In some embodiments, a new member of the chat room, such as the Iceberg chat room 125, may be granted access until a certain date. For example, Jack may see all content, but only until the 31st December. Additionally, various combinations of the above mentioned conditions may also exist. For example, Jack may be able to view content added to the chat room after 1 June and until 31 December.


It is appreciated that the moderators may extend the rights of a participant in the chat room. For example, a person who has been granted access until a certain date may have their rights extended by a moderator, or by a vote of the other chat room participants (as discussed above). Alternatively, a person who may only view comments or may only view files may have their rights extended to be able to view all postings in the chat room. For example, Jack's access may be extended beyond an assigned access control level which exceeds Jack's original assigned access control level.


Moderators may exercise other forms of content access control, besides the example provided in FIG. 2. Content access control may be granted, for instance, by person, as in FIG. 2. That is to say, viewing rights may be granted to each new participant in a chat room on a per person basis. The viewing rights may be granted depending on a type of content (e.g. files vs. messages). Alternatively, viewing rights may be granted, for instance, by content. For instance, some chat rooms may be open to anyone who wishes to join that chat room. However, a poster, at the time when the poster is making a post (whether a new message or a file) may limit access to the post: Andrew may not view a file; Jack may view the file, but not download it; Sarah may view a message, and so forth.


In addition to the moderator, the uploader of content may also be able to define viewing rights to the content. Accordingly, if Sarah uploads content to the room, Sarah may, at the time when the content is uploaded, define rights to the content in a fashion similar to the moderator's ability to define rights to the chat room.


In still a further embodiment, content access control may be granted on the basis of domain. Files and messages in a chat room may be open to viewing to participants in the chat room from within one domain, may be viewable but not downloadable from a second domain, and may not be viewable at all from a third domain. By way of example, if Andrew is posting from within the www.Andrew.net domain, Andrew may allow other chat room participant's inside the www.Andrew.net domain to have full access to his posts. However, Andrew may elect to deny access to chat room participants from within the www.competitor.org domain. Alternatively, Andrew may elect to make his posts viewable, but not downloadable to chat room participants from www.some_other_domain.com.


In another embodiment, one member of a chat room may not be able to see messages and or content from one or more other members of the chat room. For example, a group of employees may be prevented from seeing messages and content posted by supervisors and managers.


In still another embodiment, content access control may be granted on the basis of time. By way of example, files and messages in a room may be redacted based on date posted, e.g. a new entrant to a chat room may just be given access only to postings from last two weeks.


Reference is now made to FIG. 3, which is a simplified pictorial illustration of a second view of the chat room application of FIG. 1. FIG. 3 depicts Jack's chat room application 300, which is analogous to Andrew's chat room application 100, depicted in FIG. 1. It can now be seen, by viewing the list of participants 140 that Jack has been added as a participant—the number of participants has been incremented to four now that Jack is a participant in the Iceberg 125 chat room. Since this is Jack's chat room application 300, Jack is indicated as “me”. Andrew, the moderator, now appears as a participant in the list.


Additionally, since Jack's ability to view files which have been uploaded to the Iceberg 125 chat room was redacted (as discussed above, with reference to FIG. 2), the file 160 which appeared in FIG. 1 now is shown either as a restricted file, as, for example, in the case of the box showing a key 360, or, alternatively, the list of files 150 (FIG. 1) which showed 1 uploaded file now appears in Jack's chat application 300 as a list of files 350 showing zero uploaded files 370. In some embodiments, Jack could be allowed to request access to the file (for instance where the box showing a key 360 appears). In alternative embodiments, the file may not show at all (for instance where the list of files 350 shows zero uploaded files 370).


It is also appreciated that Jack may scroll through messages appearing in the message portion 120 and view messages appearing from 12 Feb. 2015, but not prior to that date.


In some embodiments explained above, a new participant in the chat room, such as Jack, may be granted total or limited access to future posts and total; limited or no access to previous posts.


In other embodiments, content in chat rooms may be designated as private, and for example, limited to only original participants in the chat room, or open to external or new parties.


Accordingly, in view of FIGS. 1 and 3, it can be seen that in a single chat room, different participants in the chat room may have different views of the chat room, depending on their individual privileges in the chat room.


It is appreciated that each item that get posted in the chat room, such as the Iceberg 125 chat room will be associated (“tagged”) with metadata. The metadata will include the identity of the poster, and the date and time the post was made. Thus, for example, the file Group chat presentation.ppt will be tagged as posted by Andrew Henderson at a particular date and time. Thus, when a new member is added to the chat room, such as Jack Smith, in the example of FIGS. 2 and 3, a server which stores the contents of the chat room will be able to determine, according to the rights granted to the new member, what contents of the chat room should be made available to the new member.


In some embodiments, links may be posted to the chat room, rather than content. So, a link to a networked presentation, for example, may be posted, rather than the file 160 itself (i.e. Group chat presentation.ppt). In such a case, all of the various possible embodiments described herein above would apply—i.e. the messages can be seen; or cannot be seen by a particular user; within a given domain, etc. Additionally, the rights of the user who clicks the link to view the file 160 may be restricted by the location of the file 160. For example, and without limiting the generality of the foregoing, a file which is available via a cloud based service would also be restricted according to the cloud based service rights of the user trying to access the file.


The server, accordingly, will store a table which identifies the rights for each participant. The each item in the chat room can then be tested against the participant's rights. For example, the server will only make files visible to a participant who can only view files but not posts in a particular chat room. For a participant who can only view posts but not files in a particular chat room, the server will make the posts visible.


Reference is now made to FIG. 4, which is a simplified flowchart of a method for implementing embodiments of FIG. 1. The method of FIG. 4 is believed to be self-explanatory with reference to the above discussion.


It is appreciated that software components of the present invention may, if desired, be implemented in ROM (read only memory) form. The software components may, generally, be implemented in hardware, if desired, using conventional techniques. It is further appreciated that the software components may be instantiated, for example: as a computer program product or on a tangible medium. In some cases, it may be possible to instantiate the software components as a signal interpretable by an appropriate computer, although such an instantiation may be excluded in certain embodiments of the present invention.


It is appreciated that various features of the invention which are, for clarity, described in the contexts of separate embodiments may also be provided in combination in a single embodiment. Conversely, various features of the invention which are, for brevity, described in the context of a single embodiment may also be provided separately or in any suitable subcombination.


It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the invention is defined by the appended claims and equivalents thereof.

Claims
  • 1. A method comprising: receiving a request from a requester to join an electronic chat room;receiving, via a user interface, a selection of an access control level for the requester in order to grant the requester access to the electronic chat room according to one of a plurality of conditions for granting access, the plurality of conditions including a veto condition, a majority condition, and a moderator approval condition;assigning, via the user interface, the access control level to the requester upon granting access to the requester; andlimiting the access of the requester to content available in the electronic chat room based on the selection of the access control level,wherein, the moderator approval condition requires approval of at least one moderator of all participants in the electronic chat room prior to granting access,the moderator approval condition requires a first selection of one of a plurality of options by the at least one moderator, and a second selection of a limit option by the at least one moderator,the plurality of options include view all files and messages uploaded to the electronic chat room, only view messages uploaded to the electronic chat room, and/or only view files uploaded to the electronic chat room, andthe limit option permits the at least one moderator to only show postings after a date selected by the at least one moderator.
  • 2. The method according to claim 1, wherein the veto condition requires the granting of access to be approved by all participants in the electronic chat room prior to granting access.
  • 3. The method according to claim 1, wherein the majority condition requires approval of a majority of all participants in the electronic chat room prior to granting access.
  • 4. The method according to claim 1, further comprising: limiting the access of the requester to at least one of messages or files posted in the electronic chat room prior to a certain date.
  • 5. The method according to claim 1, further comprising: limiting the access of the requester to at least one of messages or files posted in the electronic chat room after a certain date.
  • 6. The method according to claim 1, further comprising: limiting the access of the requester to at least one of messages or files posted in the electronic chat room between a first date and a second date.
  • 7. The method according to claim 1, wherein the limiting the access of the requester to the content available in the electronic chat room comprises allowing full access to one of messages or files available in the electronic chat room.
  • 8. The method according to claim 1, wherein the content available in the electronic chat room comprises messages available in the electronic chat room.
  • 9. The method according to claim 1, wherein the content available in the electronic chat room comprises files available in the electronic chat room.
  • 10. The method according to claim 1, wherein the content available in the electronic chat room is stored on a remote server.
  • 11. The method according to claim 10, wherein the content stored on the remote server is stored with associated metadata tags.
  • 12. The method according to claim 1, wherein a view of the electronic chat room available to the requester is determined, at least in part, by the access granted to the requester.
  • 13. The method according to claim 1, wherein the request to join the electronic chat room is initiated by a non-participant of the electronic chat room.
  • 14. The method according to claim 1, wherein the request to join the electronic chat room is initiated by a participant of the electronic chat room on behalf of a non-participant of the electronic chat room.
  • 15. The method according to claim 1, further comprising: extending the access of the requester beyond the access control level assigned via the user interface to a new access control level which exceeds the access control level.
  • 16. The method according to claim 1, further comprising: limiting access to new content which is added to the electronic chat room on a per participant basis.
  • 17. The method according to claim 16, wherein the limiting access to the new content is performed by a moderator.
  • 18. The method according to claim 16, wherein the limiting access to the new content is performed by a poster of the new content.
  • 19. A user interface system for controlling access to a chat room, the user interface system comprising: a computer-readable memory with software which, when executed, cause the user interface system to: display, via an interface driver, a user interface in response to a request from a requester to join an electronic chat room;enable, via a selection interface portion of the user interface, a selection of an access control level for the requester in order to grant the requester access to the electronic chat room according to one of a plurality of conditions for granting access, the plurality of conditions including a veto condition, a majority condition, and a moderator control condition; andgrant, via a display in the user interface, the requester access to content available in the electronic chat room according to the selection of the access control level, the access control level assigned in response to the selection of the access control level for the requester, the display configured to limit the requestor access to content available in the electronic chat room based on the selection of the access control level,wherein, the moderator control condition requires approval of at least one moderator of all participants in the electronic chat room prior to granting access,the moderator control condition requires a first selection of one of a plurality of options by the at least one moderator, and a second selection of a limit option by the at least one moderator,the plurality of options include view all files and messages uploaded to the electronic chat room, only view messages uploaded to the electronic chat room, and/or only view files uploaded to the electronic chat room, andthe limit option permits the at least one moderator to only show postings after a date selected by the at least one moderator.
US Referenced Citations (258)
Number Name Date Kind
4460807 Kerr et al. Jul 1984 A
4890257 Anthias et al. Dec 1989 A
5694563 Belfiore et al. Dec 1997 A
5699082 Marks et al. Dec 1997 A
5745711 Kitahara et al. Apr 1998 A
5767897 Howell Jun 1998 A
5825858 Shaffer et al. Oct 1998 A
5874962 de Judicibus et al. Feb 1999 A
5995096 Kitahara et al. Nov 1999 A
6040817 Sumikawa Mar 2000 A
6075531 DeStefano Jun 2000 A
6085166 Beckhardt et al. Jul 2000 A
6191807 Hamada et al. Feb 2001 B1
6300951 Filetto et al. Oct 2001 B1
6392674 Hiraki et al. May 2002 B1
6463473 Gubbi Oct 2002 B1
6554433 Holler Apr 2003 B1
6573913 Butler et al. Jun 2003 B1
6646997 Baxley et al. Nov 2003 B1
6665396 Khouri et al. Dec 2003 B1
6711419 Mori Mar 2004 B1
6754321 Innes et al. Jun 2004 B1
6754335 Shaffer et al. Jun 2004 B1
RE38609 Chen et al. Oct 2004 E
7058164 Chan et al. Jun 2006 B1
7058710 McCall et al. Jun 2006 B2
7062532 Sweat et al. Jun 2006 B1
7085367 Lang Aug 2006 B1
7124164 Chemtob Oct 2006 B1
7149499 Oran et al. Dec 2006 B1
7180993 Hamilton Feb 2007 B2
7209475 Shaffer et al. Apr 2007 B1
7418664 Ben-Shachar et al. Aug 2008 B2
7441198 Dempski et al. Oct 2008 B2
7478339 Pettiross et al. Jan 2009 B2
7530022 Ben-Shachar et al. May 2009 B2
7577711 McArdle Aug 2009 B2
7620902 Manion et al. Nov 2009 B2
7634533 Rudolph et al. Dec 2009 B2
7792277 Shaffer et al. Sep 2010 B2
7881450 Gentle et al. Feb 2011 B1
7920160 Tamaru et al. Apr 2011 B2
7956869 Gilra Jun 2011 B1
8059557 Sigg et al. Nov 2011 B1
8081205 Baird et al. Dec 2011 B2
8274893 Bansal et al. Sep 2012 B2
8290998 Stienhans et al. Oct 2012 B2
8340268 Knaz Dec 2012 B2
8358327 Duddy Jan 2013 B2
8423615 Hayes Apr 2013 B1
8428234 Knaz Apr 2013 B2
8434019 Nelson Apr 2013 B2
8456507 Mallappa et al. Jun 2013 B1
8462103 Moscovitch et al. Jun 2013 B1
8478848 Minert Jul 2013 B2
8630208 Kjeldaas Jan 2014 B1
8638354 Leow et al. Jan 2014 B2
8675847 Shaffer et al. Mar 2014 B2
8694587 Chaturvedi et al. Apr 2014 B2
8694593 Wren et al. Apr 2014 B1
8706539 Mohler Apr 2014 B1
8831505 Seshadri Sep 2014 B1
8751572 Behforooz et al. Oct 2014 B1
8890924 Wu Nov 2014 B2
8892646 Chaturvedi et al. Nov 2014 B2
8924862 Luo Dec 2014 B1
8930840 Riskó et al. Jan 2015 B1
9031839 Thorsen et al. May 2015 B2
9032028 Davidson et al. May 2015 B2
9118612 Fish et al. Aug 2015 B2
9131017 Kurupacheril et al. Sep 2015 B2
9137376 Basart et al. Sep 2015 B1
9143729 Anand et al. Sep 2015 B2
9197701 Petrov et al. Nov 2015 B1
9197848 Felkai et al. Nov 2015 B2
9201527 Kripalani et al. Dec 2015 B2
9204099 Brown Dec 2015 B2
9219735 Hoard et al. Dec 2015 B2
9246855 Maehiro Jan 2016 B2
9268398 Tipirneni Feb 2016 B2
9298342 Zhang et al. Mar 2016 B2
9323417 Sun et al. Apr 2016 B2
9335892 Ubillos May 2016 B2
9349119 Desai et al. May 2016 B2
9367224 Ananthakrishnan et al. Jun 2016 B2
9369673 Ma et al. Jun 2016 B2
9407621 Vakil et al. Aug 2016 B2
9432512 You Aug 2016 B2
9449303 Underhill et al. Sep 2016 B2
9495664 Cole et al. Nov 2016 B2
9516022 Borzycki et al. Dec 2016 B2
9525711 Ackerman et al. Dec 2016 B2
9553799 Tarricone et al. Jan 2017 B2
9563480 Messerli et al. Feb 2017 B2
9609030 Sun et al. Mar 2017 B2
9614756 Joshi Apr 2017 B2
9667799 Olivier et al. May 2017 B2
9762709 Snyder et al. Sep 2017 B1
20020018051 Singh Feb 2002 A1
20020076003 Zellner et al. Jun 2002 A1
20020078153 Chung et al. Jun 2002 A1
20020188522 McCall et al. Dec 2002 A1
20030028647 Grosu Feb 2003 A1
20030046421 Horvitz et al. Mar 2003 A1
20030154250 Miyashita Aug 2003 A1
20030174826 Hesse Sep 2003 A1
20030197739 Bauer Oct 2003 A1
20030227423 Arai et al. Dec 2003 A1
20040039909 Cheng Feb 2004 A1
20040054885 Bartram et al. Mar 2004 A1
20040098456 Krzyzanowski et al. May 2004 A1
20040210637 Loveland Oct 2004 A1
20040267938 Shoroff et al. Dec 2004 A1
20050014490 Desai et al. Jan 2005 A1
20050055405 Kaminsky et al. Mar 2005 A1
20050055412 Kaminsky et al. Mar 2005 A1
20050085243 Boyer et al. Apr 2005 A1
20050099492 Orr May 2005 A1
20050108328 Berkeland et al. May 2005 A1
20050215229 Cheng Sep 2005 A1
20050262542 DeWeese Nov 2005 A1
20060004911 Becker et al. Jan 2006 A1
20060026255 Malamud et al. Feb 2006 A1
20060164552 Cutler Jul 2006 A1
20060224430 Butt Oct 2006 A1
20060250987 White et al. Nov 2006 A1
20070005752 Chawla et al. Jan 2007 A1
20070021973 Stremler Jan 2007 A1
20070041366 Vugenfirer et al. Feb 2007 A1
20070067387 Jain Mar 2007 A1
20070091831 Croy et al. Apr 2007 A1
20070100986 Bagley et al. May 2007 A1
20070116225 Zhao et al. May 2007 A1
20070139626 Saleh et al. Jun 2007 A1
20070198637 Deboy et al. Aug 2007 A1
20070250567 Graham et al. Oct 2007 A1
20080059986 Kalinowski Mar 2008 A1
20080068447 Mattila et al. Mar 2008 A1
20080080532 O'Sullivan et al. Apr 2008 A1
20080209452 Ebert et al. Aug 2008 A1
20090012963 Johnson et al. Jan 2009 A1
20090100142 Stern et al. Apr 2009 A1
20090193327 Roychoudhuri et al. Jul 2009 A1
20090234667 Thayne Sep 2009 A1
20090254619 Kho et al. Oct 2009 A1
20090256901 Mauchly et al. Oct 2009 A1
20090292999 LaBine et al. Nov 2009 A1
20090309846 Trachtenberg et al. Dec 2009 A1
20100005142 Xiao et al. Jan 2010 A1
20100061538 Coleman et al. Mar 2010 A1
20100070640 Allen, Jr. et al. Mar 2010 A1
20100073454 Lovhaugen et al. Mar 2010 A1
20100094867 Badros et al. Apr 2010 A1
20100121959 Lin et al. May 2010 A1
20100157978 Robbins et al. Jun 2010 A1
20100211872 Rolston et al. Aug 2010 A1
20100245535 Mauchly Sep 2010 A1
20100262925 Liu et al. Oct 2010 A1
20100303227 Gupta Dec 2010 A1
20100316207 Brunson Dec 2010 A1
20100318399 Li et al. Dec 2010 A1
20110075830 Dreher et al. Mar 2011 A1
20110087745 O'Sullivan Apr 2011 A1
20110131498 Chao et al. Jun 2011 A1
20110219084 Borra Sep 2011 A1
20110264928 Hinckley Oct 2011 A1
20110270609 Jones et al. Nov 2011 A1
20110271211 Jones et al. Nov 2011 A1
20110283226 Basson et al. Nov 2011 A1
20110314139 Song et al. Dec 2011 A1
20120013704 Sawayanagi et al. Jan 2012 A1
20120084714 Sirpal et al. Apr 2012 A1
20120179502 Farooq et al. Jul 2012 A1
20120190386 Anderson Jul 2012 A1
20120246229 Carr et al. Sep 2012 A1
20120246596 Ording et al. Sep 2012 A1
20120284635 Sitrick et al. Nov 2012 A1
20120296957 Stinson et al. Nov 2012 A1
20120306757 Keist et al. Dec 2012 A1
20120306993 Sellers-Blais Dec 2012 A1
20130038675 Malik Feb 2013 A1
20130047093 Reuschel et al. Feb 2013 A1
20130050398 Krans et al. Feb 2013 A1
20130061054 Niccolai Mar 2013 A1
20130063542 Bhat et al. Mar 2013 A1
20130090065 Fisunenko et al. Apr 2013 A1
20130091205 Kotler et al. Apr 2013 A1
20130091440 Kotler et al. Apr 2013 A1
20130135837 Kemppinen May 2013 A1
20130141371 Hallford et al. Jun 2013 A1
20130148789 Hillier et al. Jun 2013 A1
20130185672 McCormick et al. Jul 2013 A1
20130198629 Tandon et al. Aug 2013 A1
20130215215 Gage et al. Aug 2013 A1
20130219278 Rosenberg Aug 2013 A1
20130222246 Booms et al. Aug 2013 A1
20130225080 Doss et al. Aug 2013 A1
20130227433 Doray et al. Aug 2013 A1
20130290421 Benson et al. Oct 2013 A1
20130297704 Alberth, Jr. et al. Nov 2013 A1
20130300637 Smits et al. Nov 2013 A1
20130329865 Ristock et al. Dec 2013 A1
20130335507 Aarrestad et al. Dec 2013 A1
20140012990 Ko Jan 2014 A1
20140028781 MacDonald Jan 2014 A1
20140040404 Pujare Feb 2014 A1
20140040819 Duffy Feb 2014 A1
20140068452 Joseph et al. Mar 2014 A1
20140078182 Utsunomiya Mar 2014 A1
20140108486 Borzycki et al. Apr 2014 A1
20140157338 Pearce Jun 2014 A1
20140161243 Contreras et al. Jun 2014 A1
20140198175 Shaffer et al. Jul 2014 A1
20140237371 Klemm et al. Aug 2014 A1
20140253671 Bentley Sep 2014 A1
20140280595 Mani et al. Sep 2014 A1
20140282213 Musa et al. Sep 2014 A1
20140317561 Robinson et al. Oct 2014 A1
20140351327 Huang et al. Nov 2014 A1
20140372908 Kashi et al. Dec 2014 A1
20150004571 Ironside et al. Jan 2015 A1
20150009278 Modai et al. Jan 2015 A1
20150029301 Nakatomi et al. Jan 2015 A1
20150067552 Leorin et al. Mar 2015 A1
20150074189 Cox et al. Mar 2015 A1
20150081885 Thomas et al. Mar 2015 A1
20150085060 Fish et al. Mar 2015 A1
20150089393 Zhang et al. Mar 2015 A1
20150089394 Chen et al. Mar 2015 A1
20150113050 Stahl Apr 2015 A1
20150172120 Dwarampudi et al. Jun 2015 A1
20150304120 Xiao et al. Oct 2015 A1
20150304366 Bader-Natal et al. Oct 2015 A1
20150319113 Gunderson et al. Nov 2015 A1
20150373063 Vashishtha et al. Dec 2015 A1
20160043986 Ronkainen Feb 2016 A1
20160050079 Martin De Nicolas et al. Feb 2016 A1
20160050160 Li et al. Feb 2016 A1
20160050175 Chaudhry et al. Feb 2016 A1
20160070758 Thomson Mar 2016 A1
20160072862 Bader-Natal et al. Mar 2016 A1
20160094593 Priya Mar 2016 A1
20160105345 Kim et al. Apr 2016 A1
20160110056 Hong et al. Apr 2016 A1
20160173537 Kumar et al. Jun 2016 A1
20160182580 Nayak Jun 2016 A1
20160269411 Malachi Sep 2016 A1
20160277461 Sun et al. Sep 2016 A1
20160283909 Adiga Sep 2016 A1
20160307165 Grodum et al. Oct 2016 A1
20160309037 Rosenberg et al. Oct 2016 A1
20170006162 Bargetzi et al. Jan 2017 A1
20170006446 Harris et al. Jan 2017 A1
20170070706 Ursin et al. Mar 2017 A1
20170093874 Uthe Mar 2017 A1
20170104961 Pan et al. Apr 2017 A1
20170171260 Jerrard-Dunne Jun 2017 A1
20170324850 Snyder et al. Nov 2017 A1
Foreign Referenced Citations (11)
Number Date Country
101055561 Oct 2007 CN
102572370 Jul 2012 CN
102655583 Sep 2012 CN
102938834 Feb 2013 CN
103141086 Jun 2013 CN
204331453 May 2015 CN
959585 Nov 1999 EP
002081338 Dec 2013 EP
2341686 Aug 2016 EP
WO 2012167262 Dec 2012 WO
WO 2014118736 Aug 2014 WO
Non-Patent Literature Citations (28)
Entry
Author Unknown, “A Primer on the H.323 Series Standard,” Version 2.0, available at http://www.packetizer.com/voip/h323/papers/primer/, retrieved on Dec. 20, 2006, 17 pages.
Author Unknown, ““I can see the future” 10 predictions concerning cell-phones,” Surveillance Camera Players, http://www.notbored.org/cell-phones.html Jun. 21, 2003, 2 pages.
Author Unknown, “Active screen follows mouse and dual monitors,” KDE Community Forums, Apr. 13, 2010, 3 pages.
Author Unknown, “Implementing Media Gateway Control Protocols” A RADVision White Paper, Jan. 27, 2002, 16 pages.
Author Unknown, “Manage Meeting Rooms in Real Time,” Jan. 23, 2017, door-tablet.com, 7 pages.
Averusa, “Interactive Video Conferencing K-12 applications,” “Interactive Video Conferencing K-12 applications” copyright 2012. http://www.averusa.com/education/downloads/hvc brochure goved.pdf (last accessed Oct. 11, 2013).
Cisco Systems, Inc., “Cisco WebEx Meetings Server System Requirements release 1.5.” 30 pages, Aug. 14, 2013.
Cisco White Paper, “Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration,” pp. 1-8, 2014.
Clarke, Brant, “Polyoom Announces RealPresenoe Group Series,” “Polycom Announces RealPresenoe Group Series” dated Oct. 8, 2012 available at http://www.323.tv/news/polyoom-realpresence-group-series (last accessed Oct. 11, 2013).
Clauser, Grant, et al., “Is the Google Home the voice-controlled speaker for you?,” The Wire Cutter, Nov. 22, 2016, pp. 1-15.
Cole, Camille, et al., “Videoconferencing for K-12 Classrooms,” Second Edition (excerpt), http://www.iste.org/docs/excerpts/VIDCO2-excerpt.pdf (last accessed Oct. 11, 2013), 2009.
Epson, “BrightLink Pro Projector,” BrightLink Pro Projector. http://www.epson.com/cgi-bin/Store/jsp/Landing/brightlink-pro-interactive-projectors.do?ref=van brightlink-pro—dated 2013 (last accessed Oct. 11, 2013).
Infocus, “Mondopad,” Mondopad. http://www.infocus.com/sites/default/files/InFocus-Mondopad-INF5520a-INF7021-Datasheet-EN.pdf (last accessed Oct. 11, 2013), 2013.
MacCormick, John, “Video Chat with Multiple Cameras,” CSCW '13, Proceedings of the 2013 conference on Computer supported cooperative work companion, pp. 195-198, ACM, New York, NY, USA, 2013.
Microsoft, “Positioning Objects on Multiple Display Monitors,” Aug. 12, 2012, 2 pages.
Mullins, Robert, “Polycom Adds Tablet Videoconferencing,” Mullins, R. “Polycom Adds Tablet Videoconferencing” available at http://www.informationweek.com/telecom/unified-communications/polycom-adds-tablet-videoconferencing/231900680 dated Oct. 12, 2011 (last accessed Oct. 11, 2013).
Nu-Star Technologies, “Interactive Whiteboard Conferencing,” Interactive Whiteboard Conferencing. http://www.nu-star.com/interactive-conf.php dated 2013 (last accessed Oct. 11, 2013).
Polycom, “Polycom RealPresence Mobile: Mobile Telepresence & Video Conferencing,” http://www.polycom.com/products-services/hd-telepresence-video-conferencing/realpresence-mobile.html#stab1 (last accessed Oct. 11, 2013), 2013.
Polycom, “Polycom Turns Video Display Screens into Virtual Whiteboards with First Integrated Whiteboard Solution for Video Collaboration,” Polycom Turns Video Display Screens into Virtual Whiteboards with First Integrated Whiteboard Solution for Video Collaboration—http://www.polycom.com/company/news/press-releases/2011/20111027 2.html—dated Oct. 27, 2011.
Polycom, “Polycom UC Board, Transforming ordinary surfaces into virtual Whiteboards” 2012, Polycom, Inc., San Jose, CA, http://www.uatg.com/pdf/polycom/polycom-uc-board-_datasheet.pdf, (last accessed Oct. 11, 2013).
Stevenson, Nancy, “Webex Web Meetings for Dummies” 2005, Wiley Publishing Inc., Indianapolis, Indiana, USA, 339 pages.
Stodle. Daniel, et al., “Gesture-Based, Touch-Free Multi-User Gaming on Wall-Sized, High-Resolution Tiled Displays,” 2008, 13 pages.
Thompson, Phil, et al., “Agent Based Ontology Driven Virtual Meeting Assistant,” Future Generation Information Technology, Springer Berlin Heidelberg, 2010, 4 pages.
Tno, “Multi-Touch Interaction Overview,” Dec. 1, 2009, 12 pages.
Toga, James, et al., “Demystifying Multimedia Conferencing Over the Internet Using the H.323 Set of Standards,” Intel Technology Journal Q2, 1998, 11 pages.
Ubuntu, “Force Unity to open new window on the screen where the cursor is?” Sep. 16, 2013, 1 page.
VB Forums, “Pointapi,” Aug. 8, 2001, 3 pages.
Vidyo, “VidyoPanorama,” VidyoPanorama-http://www.vidvo.com/products/vidyopanorama/ dated 2013 (last accessed Oct. 11, 2013).
Related Publications (1)
Number Date Country
20180006982 A1 Jan 2018 US