Patents Assigned to Nortel Networks
-
Publication number: 20100165915Abstract: Baseband recovery in wireless networks, base transceiver stations, and wireless networking devices may be implemented to minimize the number of timing symbols while at the same time enabling wireless devices to use a relatively low per-symbol sampling rate, so that minimal processing is required to implement the timing recovery. In one embodiment, a relatively low number of samples is taken per expected symbol interval during the training sequence. A subset of the samples is selected and processed to determine error signals for each of the samples. The error signals are multiplied by the expected symbol and summed to form an error signal. The error signal is used to adjust the set of samples that will be used and processed in connection with subsequent symbols. The error signal is also used to interpolate between available samples to infinitesimally approach the point of maximum eye opening.Type: ApplicationFiled: December 26, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventor: Tim Kuechler
-
Publication number: 20100169796Abstract: A method and apparatus for providing a visual indication of audio context in a computer-generated virtual environment is provided. In one embodiment, visual indicators of which other Avatars are within communication distance of an Avatar may be generated and provided to the user associated with the Avatar. The visual indication may be provided for Avatars within the viewing area regardless of whether the other Avatar is visible or not. The visual indication may be provided for Avatars outside of the viewing area as well. When Avatars are engaged in a communication session, an indication of which Avatars are involved as well as which Avatar is currently speaking may be provided. Context may be user specific and established for each user of the virtual environment based on the location of that user's Avatar within the virtual environment and the relative location of other users' Avatars within the virtual environment.Type: ApplicationFiled: December 28, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: John Chris Lynk, Arn Hyndman
-
Publication number: 20100166180Abstract: The present invention comprises a device that, based upon signals transmitted by devices within a wireless network, causes masking signals to be selectively transmitted. For example, the device may not cause masking signals to be transmitted if the signal does not include confidential data, for example it is an acknowledgement message. Additionally, the strength, coding rate and modulation format of the masking signals may be varied to provide increased data security.Type: ApplicationFiled: December 30, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: David Steer, David Bevan, Simon Gale
-
Publication number: 20100164946Abstract: A method and apparatus for enhancing control of an Avatar in a three dimensional computer-generated virtual environment is provided. In one embodiment, a user can control one or more controllable aspects of an Avatar directly via interacting with a touch sensitive user input device such as a touchpad or touch sensitive screen. Interaction with the touch sensitive user input device enables more precise control and more direct control to be implemented over the action of the Avatar in the virtual environment. Multiple aspects of the Avatar may be controlled, such as the Avatar's forward motion, orientation, arm movements, and grasping of objects.Type: ApplicationFiled: December 28, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventor: Arn Hyndman
-
Publication number: 20100169486Abstract: Access to a resource in a virtual environment is controllably granted by: a) receiving, from a user of the environment, a request for access to the resource; b) allocating the request to a queue of requests for the resource; c) determining a maximum permissible rate of access of users to the resource; d) providing a mechanism which is operable to grant users of the virtual environment with access to the resource at a rate no greater than the maximum permissible rate; e) allocating requests from the queue to the mechanism at a controlled allocation rate no greater than the maximum permissible rate; f) upon allocation of the request from the user to the mechanism, the mechanism granting the user with access to the resource within the virtual environment.Type: ApplicationFiled: December 30, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: Tony McCormack, Neil O'Connor, Joseph Smyth
-
Publication number: 20100166158Abstract: Methods for analysing an interactive voice response (IVR) system are disclosed. In the methods, prompts are issued from the IVR system and user input made in response to the prompts from the IVR system is received. One method involves displaying the prompts issued by the IVR system to an operator; and receiving input data from the operator, the data defining whether any change to the IVR system is recommended and/or any recommended changes to the IVR system. Another method involves detecting the occurrence of an unexpected event by comparing the user input against a predefined set of rules, each rule being associated with one or more of the unexpected events; and taking a predefined action in response to the detection of one or more of the unexpected events.Type: ApplicationFiled: December 29, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: John Costello, Tony McCormack, John Yoakum
-
Publication number: 20100169798Abstract: Users create profiles containing their interests, professional qualifications, and/or personal information. When users encounter each other in the virtual environment, the information contained in the personal profiles is used to provide visual indications of the profile information so that other users know some modicum of information about the user associated with the Avatar. The user associated with the personal profile may control what information is provided publicly and what information is provided privately. Information in other users' profiles may be filtered to enable relevant information to be presented to the user. Filtering may be explicit and based on user-defined criteria. Filtering may be inherent as well and implemented to select visual indications based on similarities between the user's profile information and the other users' profile information.Type: ApplicationFiled: December 29, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: Arn Hyndman, Nicholas Sauriol
-
Publication number: 20100164956Abstract: Avatars focal points are monitored as the Avatars move within a virtual environment to determine, statistically, where users are looking at in the virtual environment. The Avatar's focal point may be used to control a virtual brush that may paint the virtual environment in an attention monitoring function. A statistical distribution about the focal point is used to affect the coloration, and other known information about the virtual environment may be used to affect the statistics. As attention records from multiple users are collected, they may be overlaid to obtain a very accurate picture of how users are interacting with the virtual environment and with objects in the virtual environment. The attention monitoring function may generate a thermal overlay to the virtual environment to visually show where users tend to focus within the virtual environment. Users' attention on three dimensional and graphic objects may be monitored as well.Type: ApplicationFiled: December 28, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: Arn Hyndman, Nicholas Sauriol
-
Publication number: 20100169795Abstract: Interaction with web content in a web browser can control actions in an embedded virtual environment, and events in the virtual environment can be used to update content and applications running in the web browser. In one embodiment, particular events in the virtual environment are passed to a mapping component that listens for triggers and issues commands in the web browser. A JavaScript mapping component may be used to listen for the triggers, capture parameters associated with the trigger, lookup the trigger type in a mapping table, and call a mapped JavaScript function with the trigger parameters. In the reverse direction, if a JavaScript function call is entered in the web browser, the JavaScript function invokes a function exposed by a virtual environment plugin. The plug-in invokes an event within the virtual environment so that interaction with the web content can control actions in the virtual environment.Type: ApplicationFiled: December 28, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: Arn Hyndman, Nicholas Sauriol, Christopher Andrew Hatko
-
Publication number: 20100166012Abstract: Network resources are assigned as dedicated, shared, or public network resources. The resources are then allocated to L1-VPN subscribers on demand. Splitting assignment of the resources from allocation of the resources enables resources to be assigned to more than one subscriber on the network. Temporary physical dedication of the resources to one of the subscribers may be accomplished by allocating the assigned resources on demand, so that particular subscribers are provided with dedicated resources on an as-needed basis. Dedication of the network resources allows the network resources to be configured, managed, and controlled by the customers. The network resources may be optical resources and the links may be time slots on particular fibers. Optionally, by enabling prioritization to cause displacement of link allocations, additional flexibility may be obtained in allocating links to L1-VPNs such as by allowing the use of private and shared resources by other subscribers.Type: ApplicationFiled: March 12, 2010Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: Raymond Aubin, Malcolm Betts, Stephen Shew
-
Publication number: 20100169799Abstract: A method and apparatus for enabling interaction with a large number of participants in a three dimensional computer-generated virtual environment is provided. In one embodiment, a participant in a three dimensional computer-generated virtual environment is able to simultaneously exist in multiple areas of a sliced virtual environment or in multiple instances of an instanced virtual environment. In this embodiment, the user's Avatar is replicated across the multiple regions/instances to simultaneously appear to users supported by multiple servers. Since users on multiple servers are able to see and hear the replicated Avatar, the virtual environment may be used to present information to a larger number of users than would be able to see the presenter's Avatar in the virtual environment hosted by a single virtual environment server.Type: ApplicationFiled: December 30, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventors: Arn Hyndman, Albert Reiche, Nicholas Sauriol
-
Publication number: 20100169837Abstract: Information URLs may be associated with three dimensional objects in a three dimensional virtual environment. When a URL is selected, an overlay web rendering engine renders a web page associated with the URL over the object in the three dimensional virtual environment. The web page may include rich content, interactive content, or any other type of web content supported by the user's local browser and browser plugging. The user may interact with the content in the overlay web rendering engine to obtain successive layers of content or to affect the object in the virtual environment. The web page is rendered with a transparent background so that the three dimensional content of the virtual environment continues to be visible through the web page and provides context for the overlayed content. Information URLs may be used to provide information about objects, Avatars, or the virtual environment itself.Type: ApplicationFiled: December 29, 2008Publication date: July 1, 2010Applicant: Nortel Networks LimitedInventor: Arn Hyndman
-
User Interface for Orienting New Users to a Three Dimensional Computer-Generated Virtual Environment
Publication number: 20100169797Abstract: When new users are first introduced to virtual environments, the new users may be confused and uncertain as to how to interact with the virtual environment. Several new user orientation features have been added to the virtual environment user interface to help orient new users to the three dimensional computer-generated virtual environment and to prevent the new users from making common mistakes. Example beginning user orientation features include clearly distinguishing when the user is interacting with the virtual environment and when the user is interacting with virtual environment application controls, limiting the vertical field of view of the new user's Avatar to prevent the user from becoming stuck looking straight up or straight down, providing the user with visual feedback when switching between first and third person points of view, and providing the user with clear instructions as to how to control their Avatar and how to reenter the virtual environment.Type: ApplicationFiled: December 29, 2008Publication date: July 1, 2010Applicant: Nortel Networks, LimitedInventors: John Chris Lynk, Arn Hyndman -
Patent number: 7747934Abstract: A method for selecting a low-density parity-check (LDPC) code for encoding variable sized data used in data communication systems. The method selects a LPCD code from a plurality of LDPC codes of different codeword lengths and code rates; by calculating a number of shortening Nshortened bits and a number of puncturing Npunctured bits for each of the plurality of LDPC codes, and determines a selected LDPC code from the plurality of shortened and punctured LDPC codes meeting a performance criterion.Type: GrantFiled: June 16, 2006Date of Patent: June 29, 2010Assignee: Nortel Networks LimitedInventor: Michael Livshitz
-
Patent number: 7747019Abstract: Alice generates a sequence of key bits forming an initial cryptographic key. Alice then uses the sequence of key bits and a sequence of cipher bits to control respective control parameters of a quantum encoding process applied to a sequence of quantum pulses, where the sequence of cipher bits used is known to Bob. Alice then releases the encoded pulses towards Bob over a quantum channel. Bob uses the previously agreed-upon sequence of cipher bits to control a control parameter, such as the quantum basis, of a quantum detection process applied to the pulses received from Alice, thus producing a detection outcome for each received pulse. Bob then derives a final cryptographic key from the detection outcomes. Because the cipher bits used to select the quantum bases used by both Alice and Bob are known by both parties, the method allows the final cryptographic key to be distributed with full basis alignment compared to 50% for BB84, thus allowing efficient quantum key distribution over multiple hops.Type: GrantFiled: December 12, 2005Date of Patent: June 29, 2010Assignee: Nortel Networks LimitedInventor: Randy Kuang
-
Patent number: 7746797Abstract: Provided is a method and apparatus for objectively and non-intrusively measuring voice quality on live calls without disrupting the call session or the network. A communication system includes plural communities each including a switch that controls access to a packet-based data network for call sessions. Each of the communities is coupled to the data network by respective packet-based trunks. Quality of service (QoS) monitoring devices are coupled to the respective packet-based trunks to monitor quality levels of routes between any two given communities. Each QoS monitoring device receives packets containing streaming data (which may be actual packets or test packets). From the received packets, the QoS monitoring device can derive QoS parameters, particularly for audio and speech signals on live calls without disrupting the call session.Type: GrantFiled: October 9, 2002Date of Patent: June 29, 2010Assignee: Nortel Networks LimitedInventors: Mohamed S. El-Hennawey, Ick Don Lee
-
Patent number: 7746781Abstract: An improved method is described for providing Differentiated Services (Diffserv) traffic to a node in a network that implements a security method that discards duplicate packets received at the node. The method includes the step of identifying at least two service levels to be provided to received traffic and assigning separate sequential sequence numbers and different anti-replay bitmasks to each of the service levels. The anti-replay bitmask indicates the sequence numbers of packets that have been previously received at the node that should be compared against a received packet to determine whether a duplicate packet has been received. Such an arrangement reduces the possibility that traffic having lower priority is dropped as a security measure.Type: GrantFiled: June 30, 2003Date of Patent: June 29, 2010Assignee: Nortel Networks LimitedInventor: Jing Xiang
-
Patent number: 7746892Abstract: Frames of customer traffic may be encapsulated by adding Mac-in-Mac (MiM) encapsulation fields for transportation of the frames over a portion of provider network. The MiM encapsulated traffic may be further encapsulated using VPLS by adding VPLS encapsulation fields for transportation of the frames over another portion of the provider network. The MiM encapsulations use provider network_MAC addresses which enables VPLS MAC learning to occur using provider network MAC address space. MiM tunnels are mapped to VPLS service instances which are assigned pseudowire tags for transportation over the VPLS portion of provider network. The MiM header is retained when the MiM encapsulated frames are transported over the VPLS portion of the provider network. As VPLS frames exit the core network, the VPLS encapsulation fields are removed to extract the original MiM encapsulated frames for further transportation over the MiM portion of the provider network.Type: GrantFiled: September 30, 2006Date of Patent: June 29, 2010Assignee: Nortel Networks LimitedInventors: Dinesh Mohan, Hamid Ould Brahim
-
Publication number: 20100158237Abstract: A system for monitoring a communication session in a contact center comprises a store of one or more defined speech events which may occur in a communication session for a contact being handled by an agent operating an agent station of the contact center, a speech event comprising at least one occurrence of at least one word in an audio stream of a communication session. A speech analyser is operable, during a communication session involving an agent station of the contact center, to detect the occurrence of one of the speech events. An event generator is responsive to detection of one of the speech events, for issuing an event notification during the communication session identifying the speech event to a reporting component of the contact center which has been configured to receive such event notifications.Type: ApplicationFiled: December 19, 2008Publication date: June 24, 2010Applicant: Nortel Networks LimitedInventors: Tony McCormack, John Yoakum, Neil O'Connor, Stephen Whynot
-
Publication number: 20100161960Abstract: A method and system provide a user device with secure access to an enterprise application in an enterprise network through VPN. The enterprise application is accessed from a user device such that it sends and receives data packets through the VPN client. For this, a request to send packets, originating from the user application, is intercepted by a VPN agent associated with the user application. In turn, the VPN agent associates an address of a loop-back interface with the user application. Thereafter, packets sent by the user application, are re-directed to the VPN client through the loop-back interface. Similarly, packets received by the VPN client from the enterprise network are routed through the loop-back interface to the user application.Type: ApplicationFiled: December 15, 2009Publication date: June 24, 2010Applicant: Nortel Networks LimitedInventor: Biju Sadasivan