Scalable conference bridge

Information

  • Patent Grant
  • 10009389
  • Patent Number
    10,009,389
  • Date Filed
    Monday, March 17, 2014
    10 years ago
  • Date Issued
    Tuesday, June 26, 2018
    6 years ago
Abstract
In one embodiment, a conference bridge receives a call initiated by a first caller endpoint. The conference bridge identifies a conference to which the call requests entry and determines whether the conference bridge has available resources to process the call. The conference bridge enables the call to join the conference via a second conference bridge associated with a second caller endpoint participating in the conference according to whether the conference bridge has available resources to process the call.
Description
BACKGROUND

Technical Field


The present disclosure relates generally to methods and apparatus for processing conference calls.


Description of the Related Art


Participants of a conference call typically connect to a conference via a conference bridge. More particularly, each participant is typically connected to a different port of the conference bridge. In order to ensure that there are sufficient resources for the participants of a conference, the conference bridge typically reserves a specific number of ports for the expected number of participants. However, it is difficult to predict the number of ports that will be needed for a given conference. In addition, since a conference bridge may simultaneously support multiple conferences that may begin and end at different times, it is difficult to divide the resources of the conference bridge among the conferences. Consequently, conferences are often either under or over subscribed, resulting in either a waste of conference resources or an inability of users to join a conference due to insufficient resources.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram illustrating an example system for processing conference calls.



FIGS. 2A-2C together illustrate an example method of processing a call by a conference bridge.



FIG. 3 is a process flow diagram illustrating an example method of processing a call that has been directed to an available conference bridge.



FIG. 4 is an example diagram representing functions that may be performed by a conference bridge.



FIG. 5 is an example diagram representing functions that may be performed by a caller endpoint.





DESCRIPTION OF EXAMPLE EMBODIMENTS

In the following description, numerous specific details are set forth in order to provide a thorough understanding of the disclosed embodiments. It will be obvious, however, to one skilled in the art, that the disclosed embodiments may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order not to unnecessarily obscure the disclosed embodiments.


Overview

In accordance with one embodiment, a conference bridge receives a call initiated by a first caller endpoint. The conference bridge identifies a conference to which the call requests entry and determines whether the conference bridge has available resources to process the call. The conference bridge enables the call to join the conference via a second conference bridge associated with a second caller endpoint participating in the conference according to whether the conference bridge has available resources to process the call.


In accordance with another embodiment, a caller endpoint having a conference bridge associated therewith receives a call, the call requesting entry to a conference and being initiated by a caller endpoint. The caller endpoint having the conference bridge determines whether it is connected to the conference. If the caller endpoint having the conference bridge is connected to the conference, the conference bridge connects the caller endpoint that initiated the call to the conference.


Specific Example Embodiments

The disclosed embodiments enable an interested user to join a conference call (i.e., conference), even when a conference bridge that has received a call from the user is unable to connect the user to the conference due to insufficient resources. This is accomplished by enabling the conference bridge to transfer, forward, or otherwise direct the call to another conference bridge. In this manner, conference resources are managed without wasting conference resources.



FIG. 1 is a block diagram illustrating an example system for processing conference calls. A number of users 102, 104, 106 may attempt to join a conference via corresponding caller endpoints 108, 110, 112, respectively, which are coupled to a network 114 such as a local area network (LAN), shown here as LAN 1. Each of the caller endpoints 108, 110, 112 may be implemented via a device such as a telephone, cellular phone, or other device capable of processing, receiving, and/or transmitting voice signals in accordance with a protocol such as Voice over IP or other suitable protocol. A conference call is typically processed via a conference bridge such as conference bridge 116, which is shown here coupled to LAN 1114.


Similarly, users 118, 120, 122 may attempt to join the same conference via corresponding caller endpoints 124, 126, 128, respectively, which are coupled to a second network 130 such as LAN 2. Each of the caller endpoints 118, 120, 122 may be implemented via a device such as a telephone, cellular phone, soft phone, or other device capable of processing, receiving, and/or transmitting voice or multimedia signals in accordance with a protocol such as Voice over IP or other suitable protocol. When the users 118, 120, 122 call into the conference, conference bridge 132, shown coupled to the second network, LAN 2130, may receive the call. A third network 134, which may be a wide area network (WAN), may support communication between the network 114 and the second network 130.


In order to join a conference, a user dials a number that initiates a call to a conference bridge. The user may enter his or her name, meeting identifier, and a password. The conference bridge determines whether it has available resources (e.g., ports) to process the call. If the conference bridge has available resources (e.g., an available port), the conference bridge accepts the call such that the call joins the conference.


For example, user 102 may join the conference, followed by user 104. Upon connecting user 102 and 104 to the conference, the conference bridge 116 may have no further available resources due to other participants to the conference and/or other conferences. Although user 106 also dials in to participate in the conference, the conference bridge 116 is unable to connect another participant to the conference. As a result, the conference bridge 116 transfers, forwards, or otherwise directs the call to another conference bridge. For instance, the conference bridge 116 may identify one or more available conference bridges prior to transferring, forwarding, or otherwise directing the call to one of those conference bridges.


In this example, the conference bridge 116 may direct the call to the conference bridge 132. However, although the conference bridge 132 may have available resources (e.g., ports) to accept the call, the conference bridge 132 is in a different network. As a result, it may be impossible to connect user 106 to the conference via the conference bridge 132. Moreover, connecting user 106 to the conference via the conference bridge 132 would introduce substantial delay. As a result, it may be desirable to connect user 106 to the conference via another conference bridge that is closer to the user 106.


In accordance with one embodiment, one or more caller endpoints such as one or more of the caller endpoints 108, 110, 112 and 124, 126, 128 may include a conference bridge. Thus, the conference bridge 116 may choose one of the available conference bridges of a caller endpoint to connect user 106 to the conference, such as the conference bridge of the caller endpoint 110.


A conference bridge typically includes two components. The first component is a multipoint controller (MC) and the second component is a media processor (MP). The multipoint controller typically performs processing in the control plane, while the media processor typically performs processing in the data plane (e.g., voice or multimedia processing). The MP and the MC may reside on the same network device (e.g., server) or, alternatively, the MP and the MC may reside on different network devices coupled to the network. A conference bridge may operate in accordance with a protocol such as the H.323, Session Initiation Protocol (SIP), or other suitable standard or proprietary protocol.



FIGS. 2A-2C together illustrate an example method of processing a call by a conference bridge. As shown in FIG. 2A, when a user attempts to call into the conference via a caller endpoint, a conference bridge receives the call at 202. More particularly, the multipoint controller of the conference bridge may receive the call. When the conference bridge receives the call, the conference bridge may obtain one or more parameters during call setup using a protocol such as the Session Initiation Protocol (SIP). In addition, the conference bridge (e.g., multipoint controller) may also identify the conference to which the user and corresponding call requests entry at 204. More particularly, the conference bridge may identify the conference via a conference identifier entered by the user.


The conference bridge may also determine whether it has available resources to process the call at 206. For instance, the multipoint controller of the conference bridge may determine whether the conference bridge has one or more available ports via which the call may be connected to the conference. The conference bridge may then enable the call to join the conference according to whether the conference bridge has available resources to process the call, as will be described in further detail below. If the conference bridge has available resources to process the call, the conference bridge accepts the call such that the call joins the conference at 208 and the process ends at 210. However, if the conference bridge does not have available resources to process the call, the conference bridge (e.g., multipoint controller) identifies an available conference bridge via which the conference can be entered at 212, as will be described in further detail below with reference to FIG. 2B. The conference bridge (e.g., multipoint controller) may then assist the call in being routed to the available conference bridge at 214, thereby enabling the user to join the conference. An example method of assisting the call in being routed to the available conference bridge will be described in further detail below with reference to FIG. 2C.



FIG. 2B is a process flow diagram illustrating an example method of identifying an available conference bridge via which the conference can be entered as shown at 212 of FIG. 2A. As set forth above, a caller endpoint may have an associated (e.g., internal) conference bridge. Thus, the user may be connected to the conference via a conference bridge of another caller endpoint. However, in accordance with one embodiment, if that caller endpoint (and therefore the internal conference bridge) is not participating in the conference, the associated conference bridge cannot be used to connect to the conference. Thus, the conference bridge may identify one or more caller endpoints currently participating in the conference at 220. For instance, the conference bridge may check a database for the identity of the currently participating caller endpoints in the conference. However, all caller endpoints need not have an associated conference bridge. Thus, the conference bridge may also identify one or more of the identified caller endpoints having an associated conference bridge at 222.


The conference bridge may identify those caller endpoints having an associated conference bridge from data that has previously been configured. The data that has been configured may explicitly identify one or more caller endpoints having an associated conference bridge. Alternatively, the data that has been configured may include data such as the type and/or model of the endpoint from which the existence of an associated conference bridge may be implied.


Alternatively, the conference bridge may identify those caller endpoints having an associated conference bridge from data that has been obtained during call setup that indicates whether a caller endpoint has an associated conference bridge. More particularly, a caller endpoint may notify another device (e.g., caller endpoint or conference bridge) that it has an internal conference bridge as part of a capability exchange. Such a notification may explicitly indicate that the caller endpoint has an internal conference bridge. The notification may also include information such as the type and/or model of the endpoint from which the existence of an internal conference bridge may be implied. In this manner, the notification may indicate that the caller endpoint has conferencing resources that can be made available to the conference bridge, thereby enabling the conference bridge to extend its capacity to process calls that it receives.


Even if a caller endpoint having an associated conference bridge is currently participating in the conference, that caller endpoint may not have available resources at that time. Thus, the conference bridge may ascertain one or more of the identified endpoints having an associated conference bridge that have one or more available ports such that one or more available conference bridges are identified at 224. The conference bridge may then select one of the identified available conference bridges at 226. For instance, the conference bridge may select an available conference bridge via which to connect the user to the conference in accordance with various criteria. Thus, the conference bridge may apply various algorithms to select a conference bridge in accordance with one or more criteria.


Criteria for selecting a conference bridge may include the amount of available resources (e.g., ports). A conference bridge that has received a call may directly or indirectly determine the amount of available resources of another conference bridge. For instance, the conference bridge that has received the call may approximate the amount of resources that are available according to the type and/or model of device having the available conference bridge. More particularly, each type of device typically includes a specific amount of resources (e.g., number of ports). Thus, it may be desirable to identify the type of device in which the available conference bridge is implemented. For instance, the type of device may be identified as part of call set up when a call is received.


It may also be desirable to select a conference bridge in accordance with the quality of the connection that is likely to be established via that conference bridge. The conference bridge that has received a call may determine the quality of the connection that is likely to be established via an available conference bridge based upon voice quality, link quality, quality of service, bandwidth considerations, and/or the distance between the available conference bridge and the caller endpoint that initiated the call. The conference bridge that has received the call may determine link quality by obtaining one or more parameters when the call is received, such as parameters indicating an amount of packet loss or echo. The conference bridge that has received the call may similarly obtain the Quality of Service as a parameter when the call is received. Bandwidth considerations may include the ability to perform bandwidth reservations, the available bandwidth between the various caller endpoints, the available bandwidth between the caller endpoint that initiated the call and the conference bridge that has received the call, and/or the available bandwidth between the conference bridge that has received the call and the available conference bridge being considered. The conference bridge that has received the call may determine voice quality dynamically using a real-time voice quality algorithm such as ITU P.VTQ or P.563. The conference bridge that has received the call may ascertain the distance between the available conference bridge being considered and the caller endpoint that initiated the call by determining the number of hops between the caller endpoint and the available conference bridge. More particularly, the conference bridge that has received the call may determine the number of hops between the caller endpoint and the available conference bridge by adding the number of hops between the caller endpoint and the conference bridge that received the call to the number of hops between the conference bridge that received the call and the available conference bridge being considered. In this manner, the conference bridge may select the closest caller endpoint having an associated conference bridge.



FIG. 2C is a process flow diagram illustrating an example method of assisting a call in being routed to an available conference bridge as shown at 214 of FIG. 2A. In order to ensure that the user has been authorized to access the conference, it may be desirable to generate and/or provide a key for use by the available conference bridge in authenticating the user for entry into the conference. For instance, the conference bridge that has received the call may generate a key or obtain a key corresponding to the user and conference. The conference bridge may use a variety of key distribution protocols such as Transport Layer Security (TLS) protocol to generate and distribute the key to one or more entities, such as the caller endpoint and/or the available conference bridge. In order to protect the key, the conference bridge or entity that has generated the key may encrypt the key. Thus, the conference bridge may provide an encrypted key to the caller endpoint via which the user has attempted to dial into the conference at 230, enabling the caller endpoint to provide the key to the available conference bridge. The conference bridge may also provide a telephone number and/or an IP address of the available conference bridge to the caller endpoint at 232, enabling the caller endpoint to connect to the available conference bridge. The conference bridge may also transfer or otherwise direct the caller endpoint to the available conference bridge at 234. When the call is transferred to the available conference bridge, the conference bridge may provide the identity of the user, password, meeting identifier and/or key to the available conference bridge. Thus, the transfer may be performed automatically and seamlessly.



FIG. 3 is a process flow diagram illustrating an example method of processing a call that has been directed to an available conference bridge. As set forth above, the available conference bridge may be internal to a network device such as a caller endpoint. The network device receives the call requesting entry to a conference at 302, where the call was previously initiated by a caller endpoint. The network device may then authenticate the call at 304. More particularly, the network device may perform authentication to ensure that the caller endpoint is authorized to participate in the conference. For example, the network device may authenticate the call using a key associated with the call, as set forth above. The network device may perform authentication internally or by contacting another network device. For instance, the network device may contact another network device adapted for performing authentication. As another example, the network device may perform authentication by contacting the conference bridge via which the call was received. In this manner, the network device may authenticate the caller endpoint for use of its conferencing resources. The network device may determine whether the call has been successfully authenticated at 306. If the call has not been successfully authenticated, the call may be rejected at 308 and the process ends at 310.


Even if the call has been successfully authenticated, it is possible that the caller endpoint having the available conference bridge is no longer connected to the conference. Thus, the network device determines whether the caller endpoint having the available conference bridge is still connected to the conference at 312. In accordance with one embodiment, if the caller endpoint is no longer connected to the conference, the conference bridge of the caller endpoint cannot accept the call. Therefore, the available conference bridge of the caller endpoint may reject the call at 308, and the process ends at 310. Alternatively, the available conference bridge of the caller endpoint may transfer or otherwise direct the call to another available conference bridge in a manner similar to that set forth above with reference to FIGS. 2A-2C.


If the caller endpoint having the available conference bridge is still connected to the conference (and it has available resources to process the call), the available conference bridge connects the caller endpoint that initiated the call to the conference at 314. Thus, the audio or multimedia signals associated with each of the caller endpoints participating in the conference may be “mixed.”


As described above, upon receiving a call, a conference bridge may either process that call or transfer the call to an available conference bridge. The available conference bridge may be a conference bridge internal to a caller endpoint. An example of a conference bridge will be described with reference to FIG. 4, while an example of a caller endpoint will be described with reference to FIG. 5.



FIG. 4 is an example diagram representing functions that may be performed by a conference bridge. Conference bridge 400 may include functionalities typically performed by a standard conference bridge 402. The conference bridge 400 may also include a distributed conference bridge controller 404 adapted for performing operations described above with reference to FIGS. 2A-2C. The conference bridge 400 may also include an authentication manager 406.


The authentication manager 406 may generate and/or obtain a key, as well as encrypt the key. The authentication manager 406 may then provide the key to the caller endpoint that has initiated the call and/or the available conference bridge/caller endpoint to which the call is being directed. The conference bridge or caller endpoint to which the call has been directed may request that the authentication manager 406 authenticate the call using the key.



FIG. 5 is an example diagram representing functions that may be performed by a caller endpoint. Caller endpoint 500 may include functionalities typically performed by a telephone 502. More particularly, such functionalities may include receiving voice or multimedia signals, processing voice or multimedia signals, and transmitting voice or multimedia signals. For instance, the voice or multimedia signals may be transmitted and received via a standard transmission medium using a protocol such as Voice over IP.


In addition, the caller endpoint 500 may also include or otherwise have associated therewith a conference bridge 504 such as a standard conference bridge (or the functionality of a standard conference bridge) such as a multimedia conference bridge. In some embodiments, the conference bridge 504 includes or has associated therewith a distributed conference bridge controller 404 (not shown) capable of transferring the call to another caller endpoint should the caller endpoint 500 be unable to process the call. The caller endpoint 500 may also include an authentication manager 506.


The authentication manager 506 may authenticate a call that has been transferred to the caller endpoint 500. For instance, the authentication manager 506 may authenticate the call using a key, which may have been encrypted. Thus, the authentication manager 506 may decrypt the key. The authentication manager 506 may authenticate the call internally to the caller endpoint 500 or the authentication manager 506 may authenticate the call by contacting another network device. For instance, the authentication manager 506 may communicate with the conference bridge 400 to request that the call be authenticated.


The above-described embodiments enable a user to gain access to a conference without needing to reserve resources. This is accomplished via an intelligent conference bridge capable of identifying an alternate conference bridge via which the user can connect to the conference. Where the alternate conference bridge is a conference bridge of a caller endpoint, resources associated with conference participants are leveraged. In this manner, conferencing ability may be scaled with the number of caller endpoints participating in a conference.


Various network devices may be configured or adapted for performing the disclosed functionality. These network devices include, but are not limited to, conference bridges, caller endpoints (e.g., telephones) including conference bridges, and soft phones with multimedia conferencing capabilities. Moreover, the functionality for the disclosed processes may be implemented in software, hardware, or any combination of hardware and software.


Yet another embodiment of the invention pertains to computer program products including machine-readable media on which are provided program instructions for implementing the methods and techniques described herein, in whole or in part. Any of the methods described herein may be represented, in whole or in part, as program instructions that can be provided on such machine-readable media. In addition, the disclosed embodiments pertain to various combinations and arrangements of data generated and/or used as described herein. For example, structures having the format described herein and provided on appropriate media are part of this disclosure.


Although illustrative embodiments and applications of the disclosed embodiments are shown and described herein, many variations and modifications are possible which remain within the concept, scope, and spirit of the embodiments of the invention, and these variations would become clear to those of ordinary skill in the art after perusal of this application. For instance, a conference call may also include video signals, as well as audio signals. Thus, although various operations are described as being performed by hardware or software, these operations are merely illustrative and therefore these operations may be performed in an alternate manner. Moreover, the disclosed embodiments need not be performed using the steps described above. Accordingly, the disclosed techniques may be performed in an alternate manner, as well as be implemented using other mechanisms and data structures.


In addition, although examples of conference bridges such as multimedia conference bridges and caller endpoints are described, the above-described embodiments may be implemented in a variety of network devices. For instance, a caller endpoint may be any network device capable of processing, transmitting and/or receiving voice or multimedia signals. Accordingly, the present embodiments are to be considered as illustrative and not restrictive, and the disclosed embodiments are not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.

Claims
  • 1. A method comprising: receiving at a host server comprising a first multimedia conference bridge hosting a conference call, a call request from a second caller endpoint;determining, in response to a transfer triggering event, that the first multimedia conference bridge hosting the conference call is unable to accept the call request;identifying a first caller endpoint that has resources to accept the call request and is connected to the first multimedia conference bridge such that the first caller endpoint can connect to the conference call;forwarding, from the first multimedia conference bridge to the first caller endpoint, the call request; andin response to the call request, connecting the second caller endpoint to the conference call via a second multimedia conference bridge at the first caller endpoint based on the connection between the first caller endpoint and the conference call;wherein the first caller endpoint receives the call request while the first caller endpoint is a participant connected to the conference call.
  • 2. The method of claim 1, wherein the transfer triggering event comprises a determination of a low call quality.
  • 3. The method of claim 1, wherein the call request comprises a conference identifier, and wherein the first caller endpoint comprises one of a telephone, a smartphone, or a soft phone.
  • 4. The method of claim 1, further comprising sending device capabilities of the first caller endpoint to the first multimedia conference bridge, the device capabilities comprising conferencing capabilities.
  • 5. The method of claim 4, wherein the device capabilities comprise a model number of the first caller endpoint and at least one of conferencing resources and an associated network.
  • 6. The method of claim 1, wherein the forwarding further comprises: providing to the second caller endpoint an IP address of an available conference bridge of the first caller endpoint; anddirecting the second caller endpoint to the first caller endpoint.
  • 7. A non-transitory computer-readable storage medium having stored therein instructions which, when executed by a processor, cause the processor to perform operations comprising: receiving at a host server comprising a first multimedia conference bridge hosting a conference call, a call request from a second caller endpoint;determining, in response to a transfer triggering event, that the first multimedia conference bridge hosting the conference call is unable to accept the call request;identifying a first caller endpoint that has resources to accept the call request and is connected to the first multimedia conference bridge such that the first caller endpoint can connect to the conference call;forwarding, from the first multimedia conference bridge to the first caller endpoint, the call request; andin response to the call request, connecting the second caller endpoint to the conference call via a second multimedia conference bridge at the first caller endpoint based on the connection between the first caller endpoint and the conference call;wherein the first caller endpoint receives the call request while the first caller endpoint is a participant connected to the conference call.
  • 8. The non-transitory computer-readable storage medium of claim 7, wherein the transfer triggering event comprises a determination that the first conference bridge does not have available resources to connect the second caller endpoint to the conference call.
  • 9. The non-transitory computer-readable storage medium of claim 7, wherein the transfer triggering event comprises a determination of a low call quality.
  • 10. The non-transitory computer-readable storage medium of claim 7, wherein the transfer triggering event comprises a selection of a network for connecting the second caller endpoint to the conference call, the network being selected based on network characteristics.
  • 11. The non-transitory computer-readable storage medium of claim 7, wherein the conference call comprises a video call, the first caller endpoint having video conference bridging capabilities.
  • 12. The non-transitory computer-readable storage medium of claim 7, wherein the call request comprises a conference identifier, the non-transitory computer-readable storage medium storing additional instructions which, when executed by the processor, result in an operation further comprising sending device capabilities of the first caller endpoint to the first conference bridge, the device capabilities comprising conferencing capabilities.
  • 13. The method of claim 7, wherein the forwarding further comprises: providing to the second caller endpoint an IP address of an available conference bridge of the first caller endpoint; anddirecting the second caller endpoint to the first caller endpoint.
  • 14. A client device comprising: a processor; anda computer-readable storage medium having stored therein instructions which, when executed by the processor, cause the processor to perform operations comprising:receiving from a host server comprising a first multimedia conference bridge hosting a conference call, a call request from a second caller endpoint;determining in response to a transfer triggering event, that the first multimedia conference bridge hosting the conference call was unable to accept the call request;identifying a first caller endpoint that has resources to accept the call request and is connected to the first multimedia conference bridge such that the first caller endpoint can connect to the conference call;forwarding, from the first multimedia conference bridge to the first caller endpoint, the call request; andin response to the call request, connecting the second caller endpoint to the conference call via a second multimedia conference bridge at the first caller endpoint based on the connection between the first caller endpoint and the conference call;wherein the first caller endpoint receives the call request while the first caller endpoint is a participant connected to the conference call.
  • 15. The client device of claim 14, wherein the transfer triggering event comprises a determination that the first multimedia conference bridge does not have available resources to connect the first caller endpoint to the conference call.
  • 16. The client device of claim 14, wherein the transfer triggering event comprises a determination of a low call quality.
  • 17. The client device of claim 14, wherein the transfer triggering event comprises a selection of a network for connecting the first caller endpoint to the conference call, the network being selected based on network characteristics.
  • 18. The client device of claim 14, wherein the operations further comprise sending a notification to the first multimedia conference bridge indicating that the client device has an internal conference bridge with video conference bridging capabilities.
  • 19. The client device of claim 14, wherein the call request comprises a conference identifier, the computer-readable storage medium storing additional instructions which, when executed by the processor, result in an operation further comprising sending device capabilities to the first multimedia conference bridge, the device capabilities comprising at least one of conferencing capabilities, conferencing resources, and an associated network.
  • 20. The method of claim 14, wherein the forwarding further comprises: providing to the second caller endpoint an IP address of an available conference bridge of the first caller endpoint; anddirecting the second caller endpoint to the first caller endpoint.
RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 11/649,528, titled “SCALABLE CONFERENCE BRIDGE,” filed on Jan. 3, 2007, the content of which is incorporated by reference herein in its entirety.

US Referenced Citations (186)
Number Name Date Kind
4460807 Kerr Jul 1984 A
4890257 Anthias et al. Dec 1989 A
5694563 Belfiore et al. Dec 1997 A
5699082 Marks et al. Dec 1997 A
5745711 Kitahara et al. Apr 1998 A
5767897 Howell Jun 1998 A
5825858 Shaffer et al. Oct 1998 A
5874962 de Judicibus et al. Feb 1999 A
5995096 Kitahara et al. Nov 1999 A
6040817 Sumikawa Mar 2000 A
6075531 DeStefano Jun 2000 A
6191807 Hamada et al. Feb 2001 B1
6300951 Filetto et al. Oct 2001 B1
6392674 Hiraki et al. May 2002 B1
6554433 Holler Apr 2003 B1
6573913 Butler et al. Jun 2003 B1
6646997 Baxley et al. Nov 2003 B1
6754321 Innes et al. Jun 2004 B1
RE38609 Chen et al. Oct 2004 E
7062532 Sweat et al. Jun 2006 B1
7124164 Chemtob Oct 2006 B1
7418664 Ben-Shachar et al. Aug 2008 B2
7441198 Dempski et al. Oct 2008 B2
7478339 Pettiross et al. Jan 2009 B2
7530022 Ben-Shachar et al. May 2009 B2
7620902 Manion et al. Nov 2009 B2
7634533 Rudolph et al. Dec 2009 B2
7881450 Gentle et al. Feb 2011 B1
7920160 Tamaru et al. Apr 2011 B2
7956869 Gilra Jun 2011 B1
8290998 Stienhans et al. Oct 2012 B2
8340268 Knaz Dec 2012 B2
8358327 Duddy Jan 2013 B2
8428234 Knaz Apr 2013 B2
8434019 Nelson Apr 2013 B2
8456507 Mallappa et al. Jun 2013 B1
8462103 Moscovitch et al. Jun 2013 B1
8478848 Minert Jul 2013 B2
8630208 Kjeldaas Jan 2014 B1
8638354 Leow et al. Jan 2014 B2
8675847 Shaffer et al. Mar 2014 B2
8694587 Chaturvedi et al. Apr 2014 B2
8694593 Wren et al. Apr 2014 B1
8831505 Seshadri Sep 2014 B1
8890924 Wu Nov 2014 B2
8892646 Chaturvedi et al. Nov 2014 B2
8924862 Luo Dec 2014 B1
8930840 Riskó et al. Jan 2015 B1
9031839 Thorsen et al. May 2015 B2
9032028 Davidson et al. May 2015 B2
9143729 Anand et al. Sep 2015 B2
9197701 Petrov et al. Nov 2015 B1
9197848 Felkai et al. Nov 2015 B2
9201527 Kripalani et al. Dec 2015 B2
9204099 Brown Dec 2015 B2
9268398 Tipirneni Feb 2016 B2
9298342 Zhang et al. Mar 2016 B2
9323417 Sun et al. Apr 2016 B2
9335892 Ubillos May 2016 B2
9349119 Desai et al. May 2016 B2
9367224 Ananthakrishnan et al. Jun 2016 B2
9432512 You Aug 2016 B2
9449303 Underhill et al. Sep 2016 B2
9495664 Cole et al. Nov 2016 B2
9516022 Borzycki et al. Dec 2016 B2
9525711 Ackerman et al. Dec 2016 B2
9563480 Messerli et al. Feb 2017 B2
9609030 Sun et al. Mar 2017 B2
9667799 Olivier et al. May 2017 B2
20020076003 Zellner Jun 2002 A1
20020078153 Chung et al. Jun 2002 A1
20030028647 Grosu Feb 2003 A1
20030046421 Horvitz et al. Mar 2003 A1
20030174826 Hesse Sep 2003 A1
20030197739 Bauer Oct 2003 A1
20030227423 Arai et al. Dec 2003 A1
20040098456 Krzyzanowski et al. May 2004 A1
20040210637 Loveland Oct 2004 A1
20040267938 Shoroff et al. Dec 2004 A1
20050014490 Desai et al. Jan 2005 A1
20050055405 Kaminsky et al. Mar 2005 A1
20050055412 Kaminsky et al. Mar 2005 A1
20050085243 Boyer et al. Apr 2005 A1
20050099492 Orr May 2005 A1
20050108328 Berkeland et al. May 2005 A1
20060004911 Becker et al. Jan 2006 A1
20060026255 Malamud et al. Feb 2006 A1
20060164552 Cutler Jul 2006 A1
20060250987 White et al. Nov 2006 A1
20070005752 Chawla et al. Jan 2007 A1
20070041366 Vugenfirer et al. Feb 2007 A1
20070091831 Croy et al. Apr 2007 A1
20070100986 Bagley et al. May 2007 A1
20070116225 Zhao May 2007 A1
20070139626 Saleh et al. Jun 2007 A1
20070250567 Graham et al. Oct 2007 A1
20080068447 Mattila et al. Mar 2008 A1
20080080532 O'Sullivan et al. Apr 2008 A1
20090012963 Johnson et al. Jan 2009 A1
20090100142 Stern et al. Apr 2009 A1
20090193327 Roychoudhuri et al. Jul 2009 A1
20090254619 Kho et al. Oct 2009 A1
20090256901 Mauchly et al. Oct 2009 A1
20090292999 LaBine et al. Nov 2009 A1
20090309846 Trachtenberg et al. Dec 2009 A1
20100005142 Xiao et al. Jan 2010 A1
20100061538 Coleman et al. Mar 2010 A1
20100070640 Allen, Jr. et al. Mar 2010 A1
20100073454 Lovhaugen et al. Mar 2010 A1
20100094867 Badros et al. Apr 2010 A1
20100157978 Robbins et al. Jun 2010 A1
20100211872 Rolston et al. Aug 2010 A1
20100245535 Mauchly Sep 2010 A1
20100262925 Liu et al. Oct 2010 A1
20100303227 Gupta Dec 2010 A1
20100316207 Brunson Dec 2010 A1
20110075830 Dreher et al. Mar 2011 A1
20110131498 Chao et al. Jun 2011 A1
20110264928 Hinckley Oct 2011 A1
20110270609 Jones et al. Nov 2011 A1
20110271211 Jones et al. Nov 2011 A1
20110283226 Basson et al. Nov 2011 A1
20120013704 Sawayanagi et al. Jan 2012 A1
20120084714 Sirpal et al. Apr 2012 A1
20120190386 Anderson Jul 2012 A1
20120246229 Carr et al. Sep 2012 A1
20120246596 Ording et al. Sep 2012 A1
20120284635 Sitrick et al. Nov 2012 A1
20120296957 Stinson et al. Nov 2012 A1
20120306993 Sellers-Blais Dec 2012 A1
20130038675 Malik Feb 2013 A1
20130047093 Reuschel et al. Feb 2013 A1
20130050398 Krans et al. Feb 2013 A1
20130063542 Bhat et al. Mar 2013 A1
20130090065 Fisunenko et al. Apr 2013 A1
20130091205 Kotler et al. Apr 2013 A1
20130091440 Kotler et al. Apr 2013 A1
20130135837 Kemppinen May 2013 A1
20130141371 Hallford et al. Jun 2013 A1
20130185672 McCormick et al. Jul 2013 A1
20130198629 Tandon et al. Aug 2013 A1
20130215215 Gage et al. Aug 2013 A1
20130219278 Rosenberg Aug 2013 A1
20130222246 Booms et al. Aug 2013 A1
20130227433 Doray et al. Aug 2013 A1
20130290421 Benson et al. Oct 2013 A1
20130300637 Smits et al. Nov 2013 A1
20130329865 Ristock et al. Dec 2013 A1
20130335507 Aarrestad et al. Dec 2013 A1
20140012990 Ko Jan 2014 A1
20140028781 MacDonald Jan 2014 A1
20140040819 Duffy Feb 2014 A1
20140068452 Joseph et al. Mar 2014 A1
20140078182 Utsunomiya Mar 2014 A1
20140157338 Pearce Jun 2014 A1
20140161243 Contreras et al. Jun 2014 A1
20140237371 Klemm et al. Aug 2014 A1
20140280595 Mani et al. Sep 2014 A1
20140282213 Musa et al. Sep 2014 A1
20140317561 Robinson et al. Oct 2014 A1
20140372908 Kashi et al. Dec 2014 A1
20150004571 Ironside et al. Jan 2015 A1
20150009278 Modai et al. Jan 2015 A1
20150029301 Nakatomi et al. Jan 2015 A1
20150067552 Leorin et al. Mar 2015 A1
20150081885 Thomas et al. Mar 2015 A1
20150085060 Fish et al. Mar 2015 A1
20150089393 Zhang et al. Mar 2015 A1
20150089394 Chen et al. Mar 2015 A1
20150113050 Stahl Apr 2015 A1
20150172120 Dwarampudi et al. Jun 2015 A1
20150304366 Bader-Natal et al. Oct 2015 A1
20150319113 Gunderson et al. Nov 2015 A1
20150373063 Vashishtha et al. Dec 2015 A1
20160050079 Martin De Nicolas et al. Feb 2016 A1
20160050175 Chaudhry et al. Feb 2016 A1
20160072862 Bader-Natal et al. Mar 2016 A1
20160094593 Priya Mar 2016 A1
20160110056 Hong et al. Apr 2016 A1
20160173537 Kumar et al. Jun 2016 A1
20160182580 Nayak Jun 2016 A1
20160277461 Sun et al. Sep 2016 A1
20160309037 Rosenberg et al. Oct 2016 A1
20170006446 Harris et al. Jan 2017 A1
20170070706 Ursin et al. Mar 2017 A1
20170104961 Pan et al. Apr 2017 A1
Foreign Referenced Citations (9)
Number Date Country
101055561 Oct 2007 CN
102572370 Jul 2012 CN
102655583 Sep 2012 CN
102938834 Feb 2013 CN
103141086 Jun 2013 CN
204331453 May 2015 CN
0959585 Nov 1999 EP
WO 2012167262 Dec 2012 WO
WO 2014118736 Aug 2014 WO
Non-Patent Literature Citations (26)
Entry
International Search Report and Written Opinion dated May 5, 2008 from corresponding PCT Application No. PCT/US07/87530.
“Implementing Media Gateway Control Protocols,” A RADVision White Paper, Jan. 27, 2012, 16 pp.
Toga, J. and ElGebaly, H., “Demystifying Multimedia Conferencing Over the Internet Using the H.323 Set of Standards,” Intel Technology Journal Q2 1998, 11 pp.
“A Primer on the H.323 Series Standard,” Version 2.0, http://www.packetizer.com/voip/h323/papers/primer/ Downloaded from the Internet Dec. 20, 2006, 17 pp.
Author Unknown, “Active screen follows mouse and dual monitors,” KDE Community Forums, Apr. 13, 2010, 3 pages.
Averusa, “Interactive Video Conferencing K-12 applications,” “Interactive Video Conferencing K-12 applications” copyright 2012. http://www.averusa.com/education/downloads/hvc brochure goved.pdf (last accessed Oct. 11, 2013).
Cisco Systems, Inc., “Cisco WebEx Meetings Server System Requirements release 1.5.” 30 pages, Aug. 14, 2013.
Cisco White Paper, “Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration,” pp. 1-8, 2014.
Clarke, Brant, “Polycom Announces RealPresence Group Series,” “Polycom Announces RealPresence Group Series” dated Oct. 8, 2012 available at http://www.323.tv/news/polycom-realpresence-group-series (last accessed Oct. 11, 2013).
Clauser, Grant, et al., “Is the Google Home the voice-controlled speaker for you?,” The Wire Cutter, Nov. 22, 2016, pp. 1-15.
Cole, Camille, et al., “Videoconferencing for K-12 Classrooms,” Second Edition (excerpt), http://www.iste.org/docs/excerpts/VIDCO2-excerpt.pdf (last accessed 1011-2013), 2009.
Epson, “BrightLink Pro Projector,” BrightLink Pro Projector. http://www.epson.com/cgi-bin/Store/jsp/Landing/brightlink-pro-interactive-projectors.do?ref=van brightlink-pro—dated 2013 (last accessed Oct. 11, 2013).
InFocus, “Mondopad,” Mondopad. http://www.infocus.com/sites/default/files/InFocus-Mondopad-INF5520a-INF7- 021-Datasheet-EN.pdf (last accessed Oct. 11, 2013), 2013.
MacCormick, John, “Video Chat with Multiple Cameras,” CSCW '13, Proceedings of the 2013 conference on Computer supported cooperative work companion, pp. 195-198, ACM, New York, NY, USA, 2013.
Microsoft, “Positioning Objects on Multiple Display Monitors,” Aug. 12, 2012, 2 pages.
Mullins, Robert , “Polycom Adds Tablet Videoconferencing,” Mullins, R. “Polycom Adds Tablet Videoconferencing” available at http://www.informationweek.com/telecom/unified-communications/polycom-adds-tablet-videoconferencing/231900680 dated Oct. 12, 2011 (last accessed Oct. 11, 2013).
Nu-Star Technologies, “Interactive Whiteboard Conferencing,” Interactive Whiteboard Conferencing. http://www.nu-star.com/interactive-conf.php dated 2013 (last accessed Oct. 11, 2013).
Polycom, “Polycom RealPresence Mobile: Mobile Telepresence & Video Conferencing,” http://www.polycom.com/products-services/hd-telepresence-video-conferencing/realpresence-mobile.html#stab1 (last accessed Oct. 11, 2013), 2013.
Polycom, “Polycom Turns Video Display Screens into Virtual Whiteboards with First Integrated Whiteboard Solution for Video Collaboration,” Polycom Turns Video Display Screens into Virtual Whiteboards with First Integrated Whiteboard Solution for Video Collaboration—http://www.polycom.com/company/news/press-releases/2011/20111027 2.html—dated Oct. 27, 2011
Polycom, “Polycom UC Board, Transforming ordinary surfaces into virtual whiteboards” 2012, Polycom, Inc., San Jose, CA, http://www.uatg.com/pdf/polycom/polycom-uc-board- datasheet.pdf, (last accessed Oct. 11, 2013).
Stodle. Daniel, et al., “Gesture-Based, Touch-Free Multi-User Gaming on Wall-Sized, High-Resolution Tiled Displays,” 2008, 13 pages.
Thompson, Phil, et al., “Agent Based Ontology Driven Virtual Meeting Assistant,” Future Generation Information Technology, Springer Berlin Heidelberg, 2010, 4 pages.
TNO, “Multi-Touch Interaction Overview,” Dec. 1, 2009, 12 pages.
Ubuntu, “Force Unity to open new window on the screen where the cursor is?” Sep. 16, 2013, 1 page.
VB Forums, “Pointapi,” Aug. 8, 2001, 3 pages.
Vidyo, “VidyoPanorama,” VidyoPanorama—http://www.vidyo.com/products/vidyopanorama/ dated 2013 (last accessed Oct. 11, 2013).
Related Publications (1)
Number Date Country
20140198175 A1 Jul 2014 US
Continuations (1)
Number Date Country
Parent 11649528 Jan 2007 US
Child 14216641 US