381 patents
Page 14 of 20
Utility
Call Recording Authentication
19 Jan 23
Audio qualities of a call and of a call recording are identified and compared to authenticate the call recording as a true representation of the call.
Walter F. C. Anderson, Vi Dinh Chau
Filed: 28 Sep 22
Utility
Error-correction and Extraction In Request Dialogs
19 Jan 23
A system comprises a machine that is configured to act upon requests from a user and sensing means for sensing an operational-mode dialog stream from the user for the machine.
Stefan Constantin, Alexander Waibel
Filed: 14 Dec 20
Utility
Enabling Sub-meetings In Encrypted Video Conferences
12 Jan 23
One example method includes facilitating communications between a plurality of participants in a main meeting of a video conference, the communications encrypted using a first encryption key, the video conference provider lacking access to the first encryption key and a first decryption key; in response to receiving a command from a host to establish one or more sub-meetings, establishing the sub-meetings; for each sub-meeting, selecting a sub-meeting host; transmitting an indication that the selected sub-meeting host is a sub-meeting host; in response to receiving a request from a first participant to join a first sub-meeting, joining the first participant to the first sub-meeting; and facilitating sub-meeting communications between the sub-meeting host and the first participant, the sub-meeting communications encrypted using second encryption and decryption keys, the second encryption and decryption keys different than the first encryption and decryption keys, the video conference provider lacking access to the second encryption and decryption keys.
Michael MAXIM
Filed: 14 Jun 22
Utility
Merging Streams In Virtual Channel For Call Enhancement In Virtual Desktop Infrastructure
5 Jan 23
Calls run through a virtual desktop infrastructure server are enhanced by opening a media channel between a personal computing device and a media server for a call initiated using a virtual desktop infrastructure server.
Xingzhi Luo, Daoquan Ye
Filed: 30 Jul 21
Utility
Message-Based Device-Side Telephone Call To Virtual Meeting Elevation
5 Jan 23
A telephone call is elevated to a virtual meeting while maintaining the telephone call as an audio channel of the virtual meeting for an audio-only caller.
Brendan James Ittelson
Filed: 13 Sep 22
Utility
Applying Video Effects Within a Video Communication Session
5 Jan 23
Methods and systems provide for applying a video effect to a video corresponding to a participant within a video communication session.
Abhishek Balaji, Anna Deng, Chichen Fu, Pei Li, Bo Ling, Juliana Park, Qiang Li, Wenchong Lin
Filed: 31 Jul 21
Utility
Methods and Systems for Dynamic Survey and Webinar Creation
15 Dec 22
Various embodiments of an apparatus, method(s), system(s) and computer program product(s) described herein are directed to a dynamic survey engine the receives survey content and a survey mapping associated with a host user account(s) of a scheduled online webinar.
Deepthi Jayarajan, Kathleen Adams
Filed: 9 Jun 21
Utility
View Layout Configuration for Increasing Eye Contact In Video Communications
15 Dec 22
Methods, systems, and apparatus, including computer programs encoded on computer storage media relate to a method for providing an active pane within a communication platform.
Gregory Wright
Filed: 28 Jun 22
Utility
Receiving Virtual Relocation During a Network Conference
8 Dec 22
Methods and apparatus for receiving virtual relocation during a network conference.
Lin Han
Filed: 10 May 22
Utility
Application Access Signal for Videoferences
1 Dec 22
Example methods and systems provide a participant attending a videoconference with a user interface indicator that signals access to personal information.
Brendan Ittelson, Robert Mews, Yoshifumi Takebuchi
Filed: 25 May 21
Utility
Methods and Systems for Generating Archival Data from Virtual Meetings
1 Dec 22
Various embodiments of an apparatus, method(s), system(s) and computer program product(s) described herein are directed to an Archiving Engine that detects a regulated user account(s) joining a virtual meeting and instantiating a virtual meeting participant instance to capturing one or more communication channels of the virtual meeting hosted by a communication system.
Abhishek Balaji, Adi Regev
Filed: 27 May 21
Utility
Versioning Group Cache System
1 Dec 22
A versioning group cache system uses cache keys which each include, amongst other things, version information and a group key.
Chunhui Liu, Hongjian Zhao, Jian Zhou
Filed: 26 Jul 21
Utility
Systems and Methods for Securing Videoconferencing Meetings
24 Nov 22
One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host.
Karan LYONS, Simon Booth
Filed: 21 May 21
Utility
Systems and Methods for Corporate Event Distribution and Authentication
24 Nov 22
One example system for corporate event distribution and authentication includes a processor and at least one memory device.
Aleksandra Swerdlow, Ya Lee, Pankaj Prasad, Wei Li, Yoshifumi Takebuchi
Filed: 18 May 21
Utility
Systems and Methods for Hiding Private User Data In Public Signature Chains for User Authentication In Video Conferences
24 Nov 22
One example method includes receiving identification information associated with a new user device, the new user device associated with the user; accessing a signature chain associated with the user, the signature chain comprising one or more sequential records; associating user personal information with the new user device; generating a cryptographic signature based on cryptographic keys associated with the new user device; generating an obfuscated representation of the user personal information; generating a record comprising the identification information, the user personal information, the cryptographic signature, and the obfuscated representation of the user personal information; generating a cryptographic identifier based on the identification information, the cryptographic signature, the obfuscated representation of the user personal information, and a latest of the one or more sequential records; inserting the cryptographic identifier into the record; appending the record to the signature chain as a sequential record; receiving a request to join a video conference from the user device, the request identifying the new client device and the user as a participant in the video conference; and authenticating the user based on the record.
Karan LYONS
Filed: 21 May 21
Utility
Handling Joining and Leaving of Participants In Videoconferencing with End-to-end Encryption
24 Nov 22
One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants.
Simon Booth, Karan Lyons
Filed: 21 May 21
Utility
Self-select Sub-meetings In Videoconferencing
24 Nov 22
One disclosed example method includes a video conference provider establishing a main meeting of a video conference and multiple associated sub-meetings at the request of a host client device associated with a host of the meeting.
Lin Han, Nitasha Walia
Filed: 2 Aug 22
Utility
Long-term Key Management for End-to-end Encryption of Videoconferences
24 Nov 22
One example system for providing long-term key management for end-to-end encryption of videoconferencing information includes a processor and at least one memory device.
Karan Lyons, Simon Booth
Filed: 21 May 21
Utility
Signed Contact Lists for User Authentication In Video Conferences
24 Nov 22
One example method includes connecting, by a first client device associated with a user, to a video conference hosted by a video conference provider, the video conference having a plurality of participants; receiving participant information for each participant of the plurality of participants; generating, for one or more of the participants, an identity record corresponding to the respective participant, the identity record including video conference information, at least a portion of the participant information, and a cryptographic signature; appending, for each generated identity record, the respective identity record to a user contact list; and verifying at least one participant of the plurality of participants based on the user contact list.
Karan LYONS
Filed: 27 Jan 22
Utility
Intelligent Configuration of Personal Endpoint Devices
10 Nov 22
Methods, systems, and apparatus, including computer programs encoded on computer storage media provide for the intelligent configuration of personal endpoint devices for video communication.
Shane Paul Springer
Filed: 22 Jul 22