Patents by Inventor Cullen Jennings

Cullen Jennings has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080148378
    Abstract: In one embodiment, an endpoint elicits a pattern of STUN responses to identify security devices located on a call path. The endpoint then uses address information from the identified security devices to establish an efficient media flow with a remote endpoint. The endpoint can optimize the number of network devices and network paths that process the endpoint's keepalive message. Additionally, the endpoint may request custom inactivity timeouts with each of the identified security devices for reducing bandwidth consumed by keepalive traffic.
    Type: Application
    Filed: October 13, 2006
    Publication date: June 19, 2008
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Daniel G. Wing, Cullen Jennings, Jonathan D. Rosenberg
  • Patent number: 7324802
    Abstract: A method and system for managing communication in an emergency communication network is described. The emergency communication network receives a plurality of radio messages from a plurality of channels. The incoming radio messages sometimes overlap in time. Incoming radio messages can be prioritized and played back on the basis of the priority and the time of receipt. In case of overlap of the incoming radio messages in time, the radio message with the highest priority is played first, while the remaining radio messages are stored in a queue. The queue is formed again on the basis of priority. The stored radio messages are played subsequent to the completion of the radio message with the higher priority.
    Type: Grant
    Filed: January 20, 2005
    Date of Patent: January 29, 2008
    Assignee: Cisco Technology, Inc.
    Inventor: Cullen Jennings
  • Publication number: 20080011823
    Abstract: A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
    Type: Application
    Filed: September 25, 2007
    Publication date: January 17, 2008
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Labhesh Patel, Shmuel Shaffer, Cullen Jennings, Shantanu Sarkar
  • Patent number: 7310334
    Abstract: A network processing device is signaled to establish a media path with another network processing device in a packet switched network with Session Initiated Protocol (SIP), International Telecommunication Union (ITU) standard H.323, MGCP, Megaco, or some other signaling protocol. The network processing device receives a request to send information to an observer device that is not directly in the media path. The network processing device then sends information about the media path to the observer device.
    Type: Grant
    Filed: April 30, 2002
    Date of Patent: December 18, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Cary FitzGerald, Cullen Jennings
  • Patent number: 7287692
    Abstract: A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
    Type: Grant
    Filed: July 28, 2004
    Date of Patent: October 30, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Labhesh Patel, Shmuel Shaffer, Cullen Jennings, Shantanu Sarkar
  • Publication number: 20070211867
    Abstract: A system and a method are disclosed for authenticating a subsequent callback from a public safety answering point (PSAP) in response to a user agent's initial emergency call. In one embodiment, the user agent forwards a token to the PSAP during the initial call, and the PSAP returns the token during callback. The PSAP is authenticated when the forwarded and returned tokens match. In another embodiment, the user agent encrypts a token using a Public Key Infrastructure and forwards the encrypted token to the PSAP. The PSAP decrypts the token and, upon callback, includes a signed digital certificate based on the token. The user agent authenticates the PSAP when the decrypted digital certificate matches the originally sent token. In yet another embodiment, the user agent forwards a first token to the PSAP. Upon callback, the user agent forwards a second token to the PSAP. The PSAP performs a function on the pair of received tokens and forward the result to the user agent.
    Type: Application
    Filed: March 8, 2006
    Publication date: September 13, 2007
    Inventors: James Polk, Cullen Jennings
  • Publication number: 20070206765
    Abstract: A method for granting access to secure information includes receiving from a caller a call for connection with one of a plurality of agents, distributing the call to the agent of the plurality of agents, initiating an active communication session between the caller and the agent for handling the call, and granting to the agent access to the secure caller information using a plurality of access authentication information that includes an active communication session between the caller and the agent.
    Type: Application
    Filed: February 21, 2006
    Publication date: September 6, 2007
    Inventors: Shmuel Shaffer, Labhesh Patel, Cullen Jennings, Shantanu Sarkar
  • Publication number: 20070124687
    Abstract: A security policy enables security devices to forward ICE messages. The security policy may use protection tokens to prevent Denial of Service (DoS) attacks. This allows endpoints to use Interactive Connectivity Establishment (ICE) to enable multimedia communications across Network Address Translators (NATs) and other security devices.
    Type: Application
    Filed: March 6, 2006
    Publication date: May 31, 2007
    Inventors: Daniel Wing, Cullen Jennings, Jonathan Rosenberg
  • Publication number: 20070116246
    Abstract: The present invention provides a mechanism for categorizing telephone calls and for providing special information about calls that appear on call lists maintained in a telephone. The invention provides for both providing an indication and for providing an action. When an entry on a call list is highlighted (in a conventional manner), pressing one key adds a flag to the entry on the call list to indicate that follow up action is required. Pressing a second key initiates an action such as attaching a reminder so that the user will be reminded to take action later. Pressing a third key will provide a text message balloon indicating information about the call. The flags and text messages can be added by either the called party or the calling party.
    Type: Application
    Filed: October 12, 2005
    Publication date: May 24, 2007
    Inventors: Jennifer Walker, Vinod Katkam, Randall Baird, Cullen Jennings, Mukul Jain
  • Publication number: 20070088818
    Abstract: A system for sharing presence-based time-zone information includes a database, and a controller. The database includes a plurality of presence profiles, each presence profile maintaining, for an associated network user, one or more network device identifiers and, for each network device identifier, a current presence status, indicating network availability, and current time-zone information based on geographic location. The controller is able to receive presence information, determine a matching one of the presence profiles, update the current presence status and the current time-zone information in the matching one of the presence profiles, generate shifted time-zone information, generate a presence update, identify a subscriber address for receiving the presence update, and transmit the presence update to the subscriber address.
    Type: Application
    Filed: October 14, 2005
    Publication date: April 19, 2007
    Inventors: Wendy Roberts, Shamim Pirzada, Cullen Jennings
  • Publication number: 20070083918
    Abstract: A server for authenticating call-out services over a public switched telephone network (PSTN) includes a memory, a port to receive information provided by a caller over the PSTN, the information including ciphertext, and a processor operable to use the information to look-up a value in the memory and to perform a calculation that produces a result utilizing an algorithm. The processor authenticates the caller if the ciphertext matches a set of initial bytes of the result. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
    Type: Application
    Filed: October 11, 2005
    Publication date: April 12, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Christopher Pearce, Cullen Jennings
  • Publication number: 20070050463
    Abstract: Disclosed are apparatus and techniques for escalating an instant messaging (IM) session between two or more users to an audio session so that a communication device (by one or more users) that will optimize the audio session is selectively and intelligently utilized. In one embodiment, if an IP (Internet Protocol) phone is connected to the computer on which an IM session is being escalated, the IP telephone may be used instead of the computer device's own soft telephone so as to maximize audio clarity and quality. In another embodiment, a user's cell phone may be utilized for a mobile user who is using a laptop that is not coupled to an IP telephone or who is communicating from a hotel room in which a telephone call is typically more expensive than a cell phone call. Numerous embodiments for optimizing such audio sessions are described herein.
    Type: Application
    Filed: August 25, 2005
    Publication date: March 1, 2007
    Inventors: Daniel Shaffer, Labhesh Patel, Shmuel Shaffer, Cullen Jennings
  • Publication number: 20070036133
    Abstract: Techniques for using call history for voice data over a packet-switched network includes receiving call history data that indicates a redirected network identity that served as a target of a particular voice data session from a particular calling party. The redirected network identity is different from both a caller network identity that identifies the particular calling party, and a current target network identity that identifies a current target party of the particular voice data session. A call history display composition is formed that indicates at least that the redirected network identity exists. The call history display composition is presented for viewing by at least one of the particular calling party and the current target party. These technique allow a party to redirected communications to easily call or save the network address of a former target of the call.
    Type: Application
    Filed: July 21, 2005
    Publication date: February 15, 2007
    Inventors: Cullen Jennings, Louis Pratt, Denise Caballero-Mccann
  • Publication number: 20070026847
    Abstract: A technique for displaying information ancillary to an entity's location. A request for information ancillary to the location of a communication unit in a communication network is generated by the communication unit wherein the request contains a location of the communication unit as well as specifies the information ancillary to the communication unit's location that is sought. The request is forwarded to an information server in the communication network which may be a “trusted source” meaning that the communication unit considers the information server a reliable (trustworthy) source of information. The information server receives the request and identifies the requested information using the location information contained in the request. A response (notification) containing the identified information is then generated by the information server and forwarded to the communication unit.
    Type: Application
    Filed: July 31, 2006
    Publication date: February 1, 2007
    Inventors: James Polk, Cullen Jennings
  • Publication number: 20070022388
    Abstract: A user interface for a communication device is provided. The user interface comprises a presence display icon to display presence states of at least one user. Each presence state of the user indicates the availability status of the user in video, audio and text based modes of communication. An optimal number of presence states are determined by using a Karnaugh map.
    Type: Application
    Filed: July 20, 2005
    Publication date: January 25, 2007
    Applicant: Cisco Technology, Inc.
    Inventor: Cullen Jennings
  • Publication number: 20070015489
    Abstract: A system and methods enable a mobile communications device to determine the Public Safety Answering Point (PSAP) that serves the device, without disclosing the device's exact location. The device makes a query to its service provider that includes a bounded description of the device's location. The mobile device receives a first set of “edges” corresponding to a set of polygons defined on the earth's service. The mobile device then determines which of the received polygons it is included within by extending an imaginary latitudinal line through the polygon's edges and counting the number of intersections.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventor: Cullen Jennings
  • Publication number: 20060259958
    Abstract: In accordance with a particular embodiment of the present invention, a method using presence information to manage network access includes maintaining presence information for an end user. When a remote access request is received from the end user at a remote endpoint, the presence information for the end user is updated to identify the presence of the end user at one or more network endpoints associated with a private network. An access point to the private network is then automatically configured to allow any communications addressed to an IP address associated with the one or more network endpoints to pass through the access point.
    Type: Application
    Filed: May 16, 2005
    Publication date: November 16, 2006
    Inventors: Cullen Jennings, Cary FitzGerald
  • Publication number: 20060256731
    Abstract: In accordance with a particular embodiment of the present invention, a method using shared configuration information to manage network access for externally generated communications includes maintaining association information for a first end user of a private network and maintaining configuration information for a first endpoint associated with the first end user. When an externally generated communication that is addressed for delivery to a second endpoint associated with a second end user is received at an access point to the private network, the association information is used to determine an association between the first end user and the second end user.
    Type: Application
    Filed: May 16, 2005
    Publication date: November 16, 2006
    Inventors: Cullen Jennings, Cary FitzGerald
  • Publication number: 20060259567
    Abstract: Systems and methods for downloading content referenced by a pointer or link in an electronic message. The downloaded content is stored locally in a cache for viewing offline or over low bandwidth connections. In some embodiments, users can optionally specify preferences for downloading or preloading content. These options include limiting the depth of layers of content to cache, limiting the number of links to cache, limiting the amount of time to spend downloading content, limiting the load on the CPU, limiting the amount of data to download, or restricting downloads to particular content providers or content.
    Type: Application
    Filed: May 16, 2005
    Publication date: November 16, 2006
    Inventor: Cullen Jennings
  • Publication number: 20060258332
    Abstract: In accordance with a particular embodiment of the present invention, a method for providing privacy protection to network users includes receiving a subscription request from a first end user. The subscription request identifies a second end user for whom the first end user would like to become a registered presence watcher. A cost to be assessed to become the registered presence watcher of the second end user is determined, and the first user is registered as the registered presence watcher of the second end user.
    Type: Application
    Filed: May 16, 2005
    Publication date: November 16, 2006
    Inventors: Cullen Jennings, Cary FitzGerald