Patents by Inventor Eunsoo Shim
Eunsoo Shim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120079099Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a context-based rich communication log. A system configured to practice the method performs a context-based analysis of a history of communication sessions over at least two communication modalities, wherein the context-based analysis considers semantic meaning, temporal relationship, and user activities. The system generates associations between the communication sessions based on the context-based analysis, and generates the context-based rich communication log based on the associations. The context-based analysis can be based on time, session participant identifications, ongoing events, and/or on-demand queries of the communication sessions. The system can then present the context-based rich communication log to a user.Type: ApplicationFiled: December 27, 2010Publication date: March 29, 2012Applicant: Avaya Inc.Inventors: Krishna Kishore Dhara, Rajeshwari Edamadaka, Venkatesh Krishnaswamy, Eunsoo Shim, Xiaotao Wu
-
Patent number: 8130676Abstract: A method for managing communication in a peer-to-peer network in which overlay information is updated on-demand such that neighboring node information is updated at least periodically and other overlay information is updated on-demand (from standard communications). For example, in one aspect, the network includes a plurality of nodes, and the method includes sending a leaving message from a leaving node to the predecessor and successor nodes of the leaving node, the leaving message including information relating to the leaving node, updating each of the predecessor and successor nodes exclusive of any other nodes of the plurality of nodes.Type: GrantFiled: November 9, 2010Date of Patent: March 6, 2012Assignee: Panasonic CorporationInventors: Eunsoo Shim, Sathya Narayanan
-
Patent number: 8041942Abstract: A method of authentication of peers of a peer-to-peer network includes a certificate issuer tracking at most a predetermined number of node IDs for each peer on the peer-to-peer network, a requesting peer requesting from the certificate issuer a certificate for authenticating a communicating peer and each certificate issued listing at least one node ID of the predetermined number of node IDs assigned for the communicating peer.Type: GrantFiled: September 5, 2006Date of Patent: October 18, 2011Assignee: Panasonic CorporationInventors: Sathya Narayanan, Eunsoo Shim
-
Publication number: 20110235631Abstract: The present disclosure provides mechanisms for verification of mapping from one type of network address to another type of network address based on delivery of a one-time key over one type of the network and confirmation of its receipt over another type of network. A particular example of such mapping is mapping from a telephone number used in the PSTN or the like to a VoIP address such as a SIP URI. The mapping verification mechanisms can be provided without dependence on the records of past calls, manual calling, or the line information database in the PSTN system. Accordingly, a highly secure and efficient mapping verification mechanism is realized.Type: ApplicationFiled: March 24, 2010Publication date: September 29, 2011Applicant: Avaya Inc.Inventors: Venkatesh Krishnaswamy, Eunsoo Shim
-
Publication number: 20110231396Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing predictive contacts. A system configured to practice the method first analyzes a communication history and a current usage context of a user. Based on the analysis, the system ranks contacts that the user is likely to communicate with from a list of contacts to yield ranked contacts. The system identifies a respective motive for ranking each contact, and presents a predictive list of contacts based at least in part on the ranked contacts, wherein each ranked contact in the predictive list of contacts includes at least part of the respective motive. The system can update the predictive list of contacts in real time as the current usage context changes. The communication history can include, for example, emails, instant messages, phone calls, video conferences, and calendar events. The motive can include a user interaction history with a particular contact.Type: ApplicationFiled: October 1, 2010Publication date: September 22, 2011Applicant: Avaya Inc.Inventors: Krishna Kishore DHARA, Venkatesh KRISHNASWAMY, Eunsoo SHIM, Xiaotao WU
-
Publication number: 20110231409Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user.Type: ApplicationFiled: March 16, 2011Publication date: September 22, 2011Applicant: Avaya Inc.Inventors: Krishna Kishore DHARA, Venkatesh Krishnaswamy, Eunsoo Shim, XiaoTao Wu
-
Publication number: 20110231773Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing just-in-time resources based on context. A system configured to practice the method identifies a communication event associated with a user and a current context associated with the communication event and the user, and identifies a stored context that corresponds to the current context, wherein the stored context includes at least one resource. The system then retrieves the at least one resource and presents the at least one resource to the user. In another method for storing a current context, the system identifies a current communication context, identifies resources associated with the current communication context, indexes the current communication content and resources to enable searchability, and stores, as a stored context in a database, the current communication context and the resources associated with the current communication context.Type: ApplicationFiled: October 1, 2010Publication date: September 22, 2011Applicant: Avaya Inc.Inventors: Krishna Kishore DHARA, Venkatesh Krishnaswamy, Eunsoo Shim, Xiaotao Wu
-
Publication number: 20110228922Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for scheduling an event to automatically join a user to a conference call. In one aspect, the method includes receiving an invitation for a user to join a conference call, extracting from the invitation a scheduled conference call time, conference call address information, conference call authentication information, and a conference call modality, and scheduling an event to join the user to the conference call via the conference call modality at the scheduled conference call time based on the conference call address information and the conference call authentication information. In another aspect, the system retrieves a scheduled event at a scheduled time, extracts the address, authentication, and modality information for the conference, and joins the user to the conference automatically at the scheduled time.Type: ApplicationFiled: October 1, 2010Publication date: September 22, 2011Applicant: Avaya Inc.Inventors: Krishna Kishore DHARA, Venkatesh Krishnaswamy, Eunsoo Shim, Xiaotao Wu
-
Publication number: 20110060843Abstract: A method for managing communication in a peer-to-peer network in which overlay information is updated on-demand such that neighboring node information is updated at least periodically and other overlay information is updated on-demand (from standard communications). For example, in one aspect, the network includes a plurality of nodes, and the method includes sending a leaving message from a leaving node to the predecessor and successor nodes of the leaving node, the leaving message including information relating to the leaving node, updating each of the predecessor and successor nodes exclusive of any other nodes of the plurality of nodes.Type: ApplicationFiled: November 9, 2010Publication date: March 10, 2011Applicant: Panasonic CorporationInventors: Eunsoo Shim, Sathya Narayanan
-
Patent number: 7881223Abstract: A method for managing communication in a peer-to-peer network in which overlay information is updated on-demand such that neighboring node information is updated at least periodically and other overlay information is updated on-demand (from standard communications). For example, in one aspect, the network includes a plurality of nodes, and the method includes looking up at least one neighboring node, sending a joining message from a joining node to the neighboring node, the joining message including information relating to the joining node, joining the joining node to the network by updating each neighboring node exclusive of any other nodes of the plurality of nodes, sending reply messages from each neighboring node to the joining node, and updating the joining node with information from each neighboring node, exclusive of any other nodes of the plurality of nodes.Type: GrantFiled: March 31, 2006Date of Patent: February 1, 2011Assignee: Panasonic CorporationInventors: Eunsoo Shim, Sathya Narayanan
-
Publication number: 20080130630Abstract: A message system for a peer-to-peer network stores messages or message fragments at multiple peers when a called peer is off-line. The replicated messages or message fragments may be encrypted. According to a pull model, the called peer polls other peers to which it has access when it comes on-line to determine if a message is waiting. According to a push model, the peers storing the message from the calling peer notify the called peer when it comes on line. The system may employ a single level where only message data is stored or two levels where the primary level holds the address of peers that contain the message data which forms the secondary level.Type: ApplicationFiled: December 3, 2007Publication date: June 5, 2008Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO. LTD.Inventors: Eunsoo Shim, Sathya Narayanan
-
Patent number: 7376101Abstract: Security mechanisms are disclosed that protect the integrity of the candidate access node discovery procedures in a mobile communication network. In accordance with an aspect of the invention, an access node stores information on candidate access nodes in the mobile communication network and updates the information only after verifying information provided by a mobile terminal after a handoff from one access node to another access node. In accordance with another aspect of the invention, the information on candidate access nodes in the mobile communication network are associated with a particular mobile terminal and stored at the mobile terminal in a candidate access node list.Type: GrantFiled: November 26, 2003Date of Patent: May 20, 2008Assignee: NEC Laboratories America, Inc.Inventors: Eunsoo Shim, Jens-Peter Redlich, Richard D. Gitlin
-
Publication number: 20080072037Abstract: A method of authentication of peers of a peer-to-peer network includes a certificate issuer tracking at most a predetermined number of node IDs for each peer on the peer-to-peer network, a requesting peer requesting from the certificate issuer a certificate for authenticating a communicating peer and each certificate issued listing at least one node ID of the predetermined number of node IDs assigned for the communicating peer.Type: ApplicationFiled: September 5, 2006Publication date: March 20, 2008Inventors: Sathya Narayanan, Eunsoo Shim
-
Publication number: 20080046740Abstract: A method of authentication of a verifying device by a confirming device includes the confirming device receiving and storing a shared secret derived from at least a password of a user and sending a challenge. The method further includes the confirming device receiving a response to the challenge using the shared secret; determining if the response to the challenge is correct and if the response to the challenge is correct, authenticating the verifying device.Type: ApplicationFiled: July 26, 2006Publication date: February 21, 2008Inventors: Sathya Narayanan, Eunsoo Shim, Greg Daley, David A. Braun
-
Publication number: 20070230468Abstract: A method for managing communications between or among nodes of a P2P network includes establishing a node ID, an IP address and a node type for each respective node to be joined or linked to the P2P network, the node type including at least a fixed node type or a mobile node type and identifying a type of the resource associated with a corresponding node. Fixed nodes are joined to form the P2P network. One of the joined nodes is selected for linking with a mobile type node based on a correspondence between the node IDs of the selected fixed node and the mobile node to be linked. The mobile node is linked to the selected node such that messages destined for the mobile node are routed via the selected node without updating any other node other than the selected node with the IP address of the mobile node.Type: ApplicationFiled: March 31, 2006Publication date: October 4, 2007Inventors: Sathya Narayanan, Eunsoo Shim, David Braun
-
Publication number: 20070233832Abstract: A method for joining a network resource as a joining node to a peer-to-peer network includes establishing a node ID for the joining node to be joined to the peer-to-peer network, routing the join message to an assignment node that manages resources with resource IDs closest to the node ID of the joining node, determining whether or not the node ID established is identical to respective ones of the node IDs on the peer-to-peer network, and joining the joining node to the peer-to-peer network, when the node ID of the joining node is not identical to any one of the node IDs on the peer-to-peer network.Type: ApplicationFiled: March 30, 2006Publication date: October 4, 2007Inventors: Sathya Narayanan, Eunsoo Shim, David Braun
-
Publication number: 20070230482Abstract: A method for managing communication in a peer-to-peer network in which overlay information is updated on-demand such that neighboring node information is updated at least periodically and other overlay information is updated on-demand (from standard communications). For example, in one aspect, the network includes a plurality of nodes, and the method includes looking up at least one neighboring node, sending a joining message from a joining node to the neighboring node, the joining message including information relating to the joining node, joining the joining node to the network by updating each neighboring node exclusive of any other nodes of the plurality of nodes, sending reply messages from each neighboring node to the joining node, and updating the joining node with information from each neighboring node, exclusive of any other nodes of the plurality of nodes.Type: ApplicationFiled: March 31, 2006Publication date: October 4, 2007Inventors: Eunsoo Shim, Sathya Narayanan
-
Publication number: 20070195756Abstract: Terminal switching technology for seamlessly switching streaming sessions between terminals is provided. In this technology, a switching destination terminal has an establishing section establishing a streaming session with a communicating party according to a terminal switching request, a receiving section receiving data from the communicating party after a streaming session is established with the communicating party, a storing section storing received data, and an acquisition section acquiring newest data from the terminal apparatus of the switching source transmitting the terminal switching request in the event that the newest data to be outputted is not in the storing section after the terminal switching request is received and the storing section starts storing the data.Type: ApplicationFiled: February 23, 2006Publication date: August 23, 2007Applicant: Matsushita Electric Industrial Co., Ltd.Inventors: Daisaku Komiya, Eunsoo Shim, Mingqiang Xu, Sachiko Takeshita
-
Publication number: 20040166857Abstract: Security mechanisms are disclosed that protect the integrity of the candidate access node discovery procedures in a mobile communication network. In accordance with an aspect of the invention, an access node stores information on candidate access nodes in the mobile communication network and updates the information only after verifying information provided by a mobile terminal after a handoff from one access node to another access node. In accordance with another aspect of the invention, the information on candidate access nodes in the mobile communication network are associated with a particular mobile terminal and stored at the mobile terminal in a candidate access node list.Type: ApplicationFiled: November 26, 2003Publication date: August 26, 2004Applicant: NEC Laboratories America, Inc.Inventors: Eunsoo Shim, Jens-Peter Redlich, Richard D. Gitlin
-
Publication number: 20020191698Abstract: A method for encoding video data includes the steps of providing video data having a plurality of frames each of which has a plurality of blocks each of which has a predetermined number of pixels, providing a codebook having indices each representing a different pattern, performing an intra-coding process with respect to a first set of frames of the plurality of frames to select from the codebook best match indices for respective blocks of the first set of frames, performing a predictive coding process with respect to a second set of frames of the plurality of frames to obtain codes for respective blocks of the second set of frames, wherein each of the codes has an index-body determined using the best match indices for the blocks of the first set of frames and best match indices selected from the codebook for the blocks of the second set of frames, and performing a bi-directional predictive coding process with respect to a third set of frames of the plurality of frames to obtain codes for respective blocks ofType: ApplicationFiled: June 15, 2001Publication date: December 19, 2002Applicant: SolidStreaming, Inc.Inventors: Jae-Beom Lee, Carl Kijang Jung, Po-Chin Hu, Eunsoo Shim