×

N-ways conference system using only participants' telephony devices without external conference server

  • US 7,496,188 B2
  • Filed: 09/20/2004
  • Issued: 02/24/2009
  • Est. Priority Date: 09/20/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method in a data processing system for providing a n-ways conferencing, comprising:

  • receiving requests at a connection topology manager for a conference service from a plurality of telephony devices, wherein at least one of a telephony device in the plurality of telephony devices has three-way mixing capability, and wherein each telephony device in the plurality of telephony devices sends its mixing capability information using a signaling protocol to the connection topology manager;

    determining, by the connection topology manager, location information of each telephony device in the conference service, wherein each telephony device is used for mixing voice signals of its closest telephony device neighbors;

    calculating, by the connection topology manager, minimum conference traffic delay for each telephony device in the conference service using network condition information obtained from probes sent between telephony devices in the conference service;

    building, by the connection topology manager, a connection topology for connecting the plurality of telephony devices in the conference service using a signaling protocol based on the mixing capability information, location information, and the minimum conference traffic delay, wherein the connection topology manager distributes a voice mixing computation in a substantially uniform manner across the plurality of telephony devices;

    receiving signals at the connection topology manager from the plurality of telephony devices indicating connections in the connection topology are functioning properly; and

    responsive to detecting a failure in a telephony device'"'"'s connections, rebuilding, by the connection topology manager, the connection topology using a shadow ring to bypass the detected failure.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×