System and Method for Extending Communications Between Participants in a Conferencing Environment

ABSTRACT

A method is provided in one example embodiment and includes receiving data associated with a local endpoint that is configured to participate in a video conference. The local endpoint can be configured to detect a signal generated by a local end user device and to relay the signal to a local manager element. The method also includes transmitting the signal over a network to a remote manager element at a remote location. In more specific embodiments, the method includes receiving an additional signal from the remote manager element, and determining a selected local endpoint to receive the additional signal from the remote manager element.

TECHNICAL FIELD

This disclosure relates in general to the field of communications and, more particularly, to extending communications between participants in a conferencing environment.

BACKGROUND

Video services have become increasingly important in today's society. In certain architectures, service providers may seek to offer sophisticated video conferencing services for their end users. The video conferencing architecture can offer an “in-person” meeting experience over a network. Video conferencing architectures can deliver real-time, face-to-face interactions between people using advanced visual, audio, and collaboration technologies. Some issues have arisen in video conferencing scenarios when one user seeks to exchange information during a video conference. Information distribution during a video conference presents a significant challenge to developers and designers, who attempt to offer a video conferencing solution that is realistic and that mimics a real-life meeting.

BRIEF DESCRIPTION OF THE DRAWINGS

To provide a more complete understanding of the present disclosure and features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying figures, wherein like reference numerals represent like parts, in which:

FIG. 1 is a simplified schematic diagram of a communication system for extending communications in a conferencing environment in accordance with one embodiment;

FIG. 2 is a simplified block diagram of a communication system for extending communications in a conferencing environment in accordance with one embodiment;

FIG. 3 is a simplified block diagram of an example configuration for manager elements in accordance with one embodiment; and

FIG. 4 is a simplified flowchart illustrating a series of example steps associated with the communication system.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS Overview

A method is provided in one example embodiment and includes receiving data associated with a local endpoint that is configured to participate in a video conference. The local endpoint can be configured to detect a signal generated by a local end user device and to relay the signal to a local manager element. The method also includes transmitting the signal over a network to a remote manager element at a remote location. In more specific embodiments, the method includes receiving an additional signal from the remote manager element, and determining a selected local endpoint to receive the additional signal from the remote manager element.

FIG. 1 is a simplified schematic diagram illustrating a communication system 10 for conducting a video conference in accordance with one example embodiment. FIG. 1 includes multiple endpoints, 12 a-f associated with various participants of the video conference. In this example, endpoints 12 a-c are located in San Jose, Calif., whereas endpoints 12 d-f are located in Chicago, Ill. Endpoint 12 a is operating a personal digital assistant (PDA), endpoint 12 b is operating a laptop, and endpoint 12 c is operating a cellular telephone in this example. Their counterparties in Chicago are operating similar devices, as is depicted and as used herein in this Specification, all such devices are referred to as ‘end user devices.’

FIG. 1 includes multiple endpoints 12 a-f being coupled to a manager element 20. Note that the numerical and letter designations assigned to the endpoints do not connote any type of hierarchy; the designations are arbitrary and have been used for purposes of teaching only. These designations should not be construed in any way to limit their capabilities, functionalities, or applications in the potential environments that may benefit from the features of communication system 10.

In this example, each endpoint 12 a-f is fitted discreetly along a desk and is proximate to its associated participant. Such endpoints could be provided in any other suitable location, as FIG. 1 only offers one of a multitude of possible implementations for the concepts presented herein. In one example implementation, the endpoints are video conferencing endpoints, which can assist in receiving and communicating video and audio data. Other types of endpoints are certainly within the broad scope of the outlined concept and some of these example endpoints are further described below. Each endpoint 12 a-f is configured to interface with a respective manager element, which helps to coordinate and to process information being transmitted by the participants. Details relating to each endpoint's possible internal components are provided below with reference to FIG. 2. Details relating to manager element 20 and its potential operations are provided below with reference to FIG. 3.

As illustrated in FIG. 1, a number of cameras 14 a-14 c and screens are provided for the conference. These screens render images to be seen by the endpoints. Note that as used herein in this Specification, the term ‘screen’ is meant to connote any element that is capable of rendering an image during a video conference. This would necessarily be inclusive of any panel, plasma element, television, monitor, display, or any other suitable element that is capable of such rendering.

Note that before turning to the example flows and infrastructure of example embodiments of the present disclosure, a brief overview of the video conferencing architecture is provided for the audience. The components of the video conferencing architecture of FIG. 1 use technologies in conjunction with specialized applications and hardware to create a solution that can leverage the network. This video conferencing architecture can use the standard IP technology deployed in corporations and can run on an integrated voice, video, and data network. The system can also support high quality, real-time voice, and video communications with branch offices using broadband connections. It can further offer capabilities for ensuring quality of service (QoS), security, reliability, and high availability for high-bandwidth applications such as video. Power and Ethernet connections for all participants can be provided. Participants can use their laptops to access data for the meeting, join a meeting place protocol or a Web session, or stay connected to other applications throughout the meeting.

Video conference technology seeks to create an in person experience for its participants. There are various modes of technological communications, which may be used in conjunction with a video conference. Typically, during a video conference participants may seek to exchange data using various communication formats. E-mail is a good example of one communication format that can be used to exchange information during a video conference. However, aside from this blunt e-mail tool, there are no platforms for distributing information during a video conference in an elegant manner.

Certain instant messaging (IM) clients can use various technologies (such as Bonjour), which can act as a discovery protocol. For example, a laptop being used by end user #1 may discover a laptop being used by end user #2. Once discovered, each laptop would populate the other user's laptop, for example, through a Buddy List. Device discovery and interoperability protocols such as universal plug and play (uPnP), Bonjour, and various Bluetooth implementations are ubiquitous, as the demand for proximity-based device interaction grows. As video conferencing scenarios (which includes on-line meeting protocols) become more prevalent, many of these communication protocols and applications (e.g., Bluetooth, infrared, etc.) falter. Most participant interaction is limited to the subnet to which the devices are connected, or limited to the local proximity of the device itself. Thus, during a video conferencing scenario (e.g., a TelePresence meeting), where participants are distributed remotely at various different sites, endpoints could not discover instant messaging clients of their counterparties (or discover other presence-enabled applications). Similarly, participants could not intuitively send documents without having to resort to conventional emailing protocols. Along the same rationale, participants could not pan or share laptop screens with other participants via a virtual network computing (VNC), or through screen sharing (inclusive of applications such as Apple's Screen Sharing software).

Example embodiments presented herein can expand the reach of these identified discovery and interoperability protocols beyond the immediate physical proximity range to which end users have grown accustomed. Communication devices in a ‘virtual proximity’ can readily interact with each other. This would be done dynamically, as judged with respect to the connection state of users at each endpoint in a conference. For example, if a participant were to disconnect from a call, the participant is no longer in the virtual proximity of the other devices.

Note that there are a number of protocols and device interactions that can be extended. For purposes of teaching, a few common interaction methods are detailed hereafter and these methods can also include strategies for carrying this proximity data between the participants in a video conference. Turning to a first example involving IP connectivity via Ethernet and wireless applications, users could plug in directly to Ethernet ports, which may be resident on (or proximate to) a video-conferencing table. Alternatively, users could connect to an access point dedicated to the respective endpoint. These access methods could also provide for any needed network connectivity to their physical location. This would extend IP-based protocols that rely on the devices being on the same subnet. In one sense, example embodiments presented herein can create a dynamic virtual local area network (VLAN) consisting of the users in the same virtual conference. An alternative (or supplementing solution) is to have an interface where participants of a conference register their devices with a centralized authority that would filter (e.g., based on MAC/IP addresses) to allow users on each endpoint to interact with each other's devices.

Turning to a different example involving non-IP based discoverability and interoperability solutions (e.g., Bluetooth, infrared, etc.), these proximity-based communication methods are common among mobile wireless devices and laptops. In countries outside the U.S., infrared transmission between cell phones is a common way of exchanging contact information, calendars, etc. Infrared and

Bluetooth repeaters could be incorporated into each endpoint to facilitate these protocols being extended, as detailed below. These devices generally operate on 1-1 communications paradigm, rather than 1-n, and therefore system 10 can optionally leverage manager element 20 to relay proximity signals between participants directly talking to each other. For example, once interaction takes place during the video conference, manager element 20 could either sustain their interaction after another participant switches in replacing them, or lock them together for signaling purposes until the interaction is complete.

Before turning to some of the operations of this architecture, a brief discussion is provided about some of the infrastructure of FIG. 1. Endpoint 12 a is a client or customer wishing to participate in a video conference in communication system 10. The term ‘endpoint’ may be inclusive of devices used to initiate a communication, such as a switch, a console, a proprietary endpoint, a telephone, a bridge, a computer, a personal digital assistant (PDA), a laptop or electronic notebook, or any other device, component, element, or object capable of initiating voice, audio, or data exchanges within communication system 10. The term ‘end user device’ may be inclusive of devices used to initiate a communication, such as an IP phone, an I-phone, a telephone, a cellular telephone, a computer, a PDA, a laptop or electronic notebook, or any other device, component, element, or object capable of initiating voice, audio, or data exchanges within communication system 10.

Endpoint 12 a may also be inclusive of a suitable interface to the human user, such as a microphone, a display, or a keyboard or other terminal equipment. Endpoint 12 a may also include any device that seeks to initiate a communication on behalf of another entity or element, such as a program, a database, or any other component, device, element, or object capable of initiating a voice or a data exchange within communication system 10. Data, as used herein in this document, refers to any type of video, numeric, voice, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another. Additional details relating to the endpoints are provided below with reference to FIG. 2.

Manager element 20 is a switch in one example implementation that executes some of the video conferencing activities, as explained herein. In other scenarios, manager element 20 could be virtually any network element, a proprietary device, or anything that is capable of facilitating an exchange or coordination of video and/or audio data. As used herein in this Specification, the term ‘manager element’ is meant to encompass switches, servers, routers, gateways, bridges, loadbalancers, or any other suitable device, network appliance, component, element, or object operable to exchange or process information in a video conferencing environment. Moreover, manager element 20 may include any suitable hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective delivery and coordination of data or information.

Manager element 20 can be equipped with appropriate software to execute the described extension operations in an example embodiment of the present disclosure. Memory elements and processors (which facilitate these outlined operations) may be included in this device or be provided externally to this device, or consolidated in any suitable fashion. The processors can readily execute code (software) for effectuating the activities described. Manager element 20 is a multipoint device that can establish a conversation or a call between one or more end users, which may be located in various other sites and locations. Manager element 20 can also coordinate and process various policies involving endpoints 12. Manager element 20 includes a switching component that determines which signals are to be routed to individual endpoints 12. Manager element 20 can also determine how individual end users are seen by others involved in the video conference. Furthermore, manager element 20 can control the timing and coordination of this activity. Manager element 20 can also include a media layer that can copy information or data, which can be subsequently retransmitted or simply forwarded along to one or more endpoints 12. Additional details related to manager element 20 are provided below with reference to FIG. 3.

The memory elements identified above can store information to be referenced by manager element 20. As used herein in this document, the term ‘memory element’ is inclusive of any suitable database or storage medium (provided in any appropriate format) that is capable of maintaining information pertinent to the coordination and/or processing operations of manager element 20. For example, the memory elements may store such information in an electronic register, diagram, record, index, list, or queue. Alternatively, the memory elements may keep such information in any suitable random access memory (RAM), read only memory (ROM), erasable programmable ROM (EPROM), electronically erasable PROM (EEPROM), application specific integrated circuit (ASIC), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs.

As identified earlier, in one example implementation, manager element 20 includes software to achieve the extension operations, as outlined herein in this document. Additionally, endpoint 12 a may include some software (e.g., reciprocating software or software that assists in the listening for signals, repeating signals, etc.) to help coordinate the extension activities explained herein. In other embodiments, this processing and/or coordination feature may be provided external to these devices (manager element 20 and endpoint 12 a) or included in some other device to achieve this intended functionality. Alternatively, both manager element 20 and the peer endpoints include this software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein.

Turning back now to the operational aspects of example embodiments, example scenarios presented herein do not require a central authority for registering various devices as the end users participate in a video conference. Instead, when a first end user dials into a video conference, one or more endpoints are configured to have certain types of communication methods supported (Bluetooth, infrared, Wi-Fi, RFID, etc.). In essence, the endpoints can take what is available in their respective area and extend that to a remote endpoint's proximate area. Note that a line of sight is not required in order to transmit various signals, as radiofrequency identification technology can certainly operate in this manner. Additionally, other technologies such as Wi-Fi would not require line of sight for data transmissions and, thus, can readily be extended to remote participants as outlined herein.

The operation of extending signals is somewhat dynamic, as it can readily allow protocols and devices to be systematically discovered and then pushed to remote endpoints: simulating a conventional in person meeting. Note that as used herein in this Specification, the term ‘signal’ is meant to connote any type of data (voice, image, video, control, script, packets, etc.) that could be sent between participants, were they to be located nearby. This would not only include participants exchanging signals when positioned next to each other, but also be inclusive of scenarios in which participants are in the same structure (e.g., a building, a street, a floor, etc.), or scenarios in which there is some type of connection (wireless or wired) that could be achieved between two participants.

The dynamic capabilities of system 10 can be more ad hoc, where preregistration type activities can be avoided. Note that such a system can also offer a cross protocol model because various signals can be packetized (for example, in a similar manner in which Ethernet often travels). For example, from the perspective of a first endpoint, the transmission could be from Bluetooth to Ethernet, and once the signal traverses the network, it could end up being converted from Ethernet to infrared. Such transformations would be dictated by the technologies being employed by end users of the video conference and are certainly within the broad teachings of the concepts presented herein.

Consider an example scenario that is illustrative. If a laptop being operated by a first end user has a Bluetooth capability, a simple file exchange could be initiated by the first end user such that it is received (via manager element 20) at the other endpoint, which may have received the file through its own laptop. Note that this would have occurred naturally, as a result of Bluetooth technology, were the two participants face-to-face during an in-person meeting scenario.

Bluetooth and infrared typically work in a broadcast paradigm, where if an end user of such technology seeks to employ either of these technologies, the signal would be broadcasted to virtually everyone in the vicinity. In this sense, the technologies are area-based and somewhat indiscriminate in terms of potential recipients to receive an outgoing signal. This exportation of point-to-point communications can be modified slightly in example embodiments presented herein. For example, the distribution of signals emanating from the endpoints is somewhat controlled. In one example, the distribution is only sent to sites that are currently being viewed by the endpoint in the video conference. In another example implementation involving TelePresence technology, an outgoing signal would only be sent to the participants that are being seen by the end user, whose device is currently attempting a signal transmission. In other examples, the transmitting end user can configure the system to only send data to selected participants. This election could be the result of a registration for the video conference, or segmented by employer (only employees from the ABC company may receive signals being transmitted by an endpoint), or segmented by some type of security clearance, or selected via any other suitable parameters, which are configurable.

In terms of advantages, communication system 10 offers a more realistic experience of a meeting between multiple participants. This is achieved by intelligently and rapidly disseminating signals between endpoints. This can better simulate the experience of a conversation that occurs in an actual conference room. By intelligently provisioning communication exchanges, the video conference more closely mirrors a real-life meeting scenario, where the interaction between devices would be autonomous and convenient. The extension activities presented herein can occur with minimal or no end-user involvement, as the system can perform this intelligent switching autonomously.

FIG. 2 is a simplified block diagram illustrating a number of example endpoints that may be used in conjunction with communication system 10. In this example, endpoints in San Jose are configured to interface with manager element 20, which is coupled to a network 40. Along similar rationales, endpoints in Chicago are configured to interface with manager element 50, which is similarly coupled to network 40. Each endpoint 12 a-f may be similarly configured or designed in order to achieve example operations outlined herein. For purposes of simplification, endpoint 12 a is described and its internal structure may be replicated in the other endpoints, as is illustrated in FIG. 2. Endpoint 12 a includes a receiving module 42 a, a transmitting module 48 a, a memory 44 a, a network interface 46 a, one or more microphones 32 a, one more cameras 34 a, one or more speakers 36 a, and one or more displays 38 a. Endpoint 12 a may be configured to communicate with manager element 20, which is configured to facilitate network communications with network 40. Any one or more of these items may be consolidated or eliminated entirely, or varied considerably and those modifications may be made based on particular communication needs.

In one example, endpoint 12 a includes receiving module 42 a and transmitting module 48 a for both receiving signals and for re-emitting signals respectively. For example, transmitting module 48 a can transmit a received signal to its respective manger element 20, but it can also operate in the reverse direction by transmitting an incoming signal (from manager element 20) to its respective end user devices (or to other proximately based end user devices). Thus, transmitting module 48 a can receive an incoming signal from manger element 20 and repeat it such that every device in a given room (or building, etc.) could receive this signal. Other examples would not involve such a broadcast, as transmitting module 48 a can selectively propagate the incoming signal to specific end user devices (or specific participants of the video conference, etc.).

In one example implementation, each of the endpoints, indiscriminately receive or transmit signals being detected, such that the decision as to where to ultimately send the received information would rest with manager elements 20 and 50. In this sense, the endpoints are simply operating as a conduit, much like the way a camera would systematically pick up or otherwise detect images in a video conferencing room and, further, propagate those images along to a next destination. In other scenarios, each endpoint includes some intelligence and/or filtering mechanism for discerning which signals are to be received and transmitted.

Additionally, in one example implementation, manager elements 20 and 50 include a control module (shown and described with reference to FIG. 3) that dictates how to forward signals onto various participants in the video conference. As outlined above, one example includes only forwarding signals to participants being seen by the endpoint seeking the transmission. Manager elements 20 and 50 can be aware of (and potentially store) information about who is being seen by the participants of the video conference. Manager elements 20 and 50 can selectively distribute signals to various participants using any suitable criteria.

In another example implementation, manager elements 20 and 50 do not discern which of the participants in the video conference should receive the incoming signals. In this sense, manager elements 20 and 50 are operating in a first mode, which is akin to a broadcast arrangement. In another example, a group can be created in order to selectively direct signals to specific individuals. In other examples, a policy could be configured that dictated which participants should receive data transmissions.

For example, endpoint 12 a can utilize its receiving module 42 a to pick up various signals such as infrared signals or Wi-Fi signals. That data can be sent to manager element 20, which is configured to make a decision as to which endpoints should receive the signal. In this example, manager element 20 has determined that endpoint 12 e is being seen by endpoint 12 a and, therefore, attempts to send the signal to its counterparty manager element 50 for dissemination to endpoint 12 e. Endpoint 12 e receives this signal and utilizes its transmitting module 48 e in order to repeat this signal at that location. The signal could then be picked up (or otherwise received) by devices being used by an end user at endpoint 12 e (e.g., a laptop, a phone, etc.). In this sense, the endpoints and manager elements are cooperating in order to mimic the environment of San Jose in Chicago. In one sense, each endpoint can operate as a digital switch in replicating the information that it receives. Note that certain types of white lists and black lists can be provided in order to determine which types of information are permitted within a particular forum.

Network 40 represents a series of points or nodes of interconnected communication paths for receiving and transmitting packets of information that propagate through communication system 10. Network 40 offers a communicative interface between sites (and/or endpoints) and may be any LAN, WLAN, MAN, WAN, or any other appropriate architecture or system that facilitates communications in a network environment. Network 40 implements a TCP/IP communication language protocol in a particular embodiment of the present disclosure; however, network 40 may alternatively implement any other suitable communication protocol for transmitting and receiving data packets within communication system 10. Note also that network 40 can accommodate any number of ancillary activities, which can accompany the video conference. For example, this network connectivity can facilitate all informational exchanges (e.g., notes, virtual white boards, PowerPoint presentations, e-mailing, word processing applications, etc.).

FIG. 3 is a simplified block diagram of manager elements 20 and 50. Each manager element 20 and 50 may include a control module 60 a, 60 b respectively. In one example embodiment, manager elements 20 and 50 can employ a packetizing protocol in order to format, or otherwise transform, signals being sent or received via the endpoints. This can include satellite communications, Wi-Fi communications, TCP/IP communications, Ethernet, or any other protocol that can exist in cooperation with the endpoints.

In other example implementations, manager elements 20 and 50 can be used to join remote networks (for example, Wi-Fi points) in order to carry out similar operations. In one sense, the network for one group of end users is being shared with another group of end users, even though the two groups are not co-located. This extension concept can also include plugging in a cable (for example, an Ethernet cable) at a local interface to recreate an in-person meeting. Some of these operations could be provided in conjunction with existing discovery protocols, such as those provided by companies such as Apple (iChat), and other protocols in which discovery of existing devices occurs. In this sense, a virtual network is configured amongst one or more participants. In other scenarios, an ad hoc configuration can be implemented such that some central authority can operate as a proxy for signals moving between participants of the meeting, or of the video conference.

Example embodiments of manager element 20 and 50 can enable discoverability and interoperability of devices [which are traditionally limited by physical proximity] to interact across dispersed virtual conferencing participants. This can further enhance the notion of “being in the same room” and, further, apply to any mobile device that uses discoverability, to any computer that leverages discoverability over IP, or to any data transmission that is proximity-based. Security can be a consideration in the sharing and discoverability protocols. The security concern could be solved in a number of ways (e.g., using an access control list (ACL), or based on users registering all allowed devices with a central manager (even if not managed by the central manager), or by a MAC address, or by the use of pin numbers when connecting, or by various other mechanisms of offering security).

In operation of another example scenario involving an implementation of manager element 20, a side-band data stream can flow between the endpoints and carry a packetized form of the communication. This stream can be routed to target endpoint(s) by manager element 20, which has knowledge of which endpoint(s) are present on an endpoint's screen(s) at a given time. A service can run on manager element 20 bound to respective ports for each supported device and can act as a proxy. When connecting to manager element 20, each endpoint can leverage the existing multiplex negotiation scheme, which allows an endpoint to communicate the streams it is capable of sending and receiving, to signal this extra ability. An extra bit in this multiplexing can be allocated to denote the ability to send and receive these side-band streams, which will allow manager element 20 to set up the extra ports to send and to receive side-band data. When manager element 20 receives data from an endpoint on the side-band stream, it will determine who is currently being shown to that endpoint, and then forward the stream to only those endpoints for reception.

Once this connection is established, it can persist, meaning that if the recipient switches out, the connection will not necessarily be torn down in example embodiments. After data transmission from the sender has terminated, a timeout can determine when the connection is torn down. Although the scheme can forward the data to potential unintended recipients, this is akin to the current implementations of technologies such as infrared or Bluetooth, where the data is available to anyone within range, intended or not. In a point-to-point scenario, the scheme is similar, where the same multiplex negotiation is used to signal the ability. In this example, when data is sent, it is forwarded almost immediately to the opposite side because there is no longer a need for a middle entity to determine who is currently being seen.

In example of a first use case involving a mobile device interaction, mobile devices can display profiles or advertisements of the people in the nearby area. In a similar vein, an end user could venture to a mall and have coupons pushed to the mobile device when walking by a storefront. Another instance could involve being at work and wanting to display what is on a mobile phone screen on to a larger display nearby. Using a simple discover/extension protocol, the small screen from the mobile device can be projected to the larger display. These uses require device discoverability and data communication on a proximity basis. Example embodiments presented herein can achieve these same interactions, but over great expanses such that one group in Chicago is transmitting signals, while a second group in San Jose is on the receiving end of the signaling.

In a second use case, a meeting could be occurring between two endpoints in Japan, where it is common to share phone contact cards via beaming them over infrared. Example embodiments of the concept presented can employ an infrared transceiver on both endpoints of a conference (along with potentially a mechanism of digitizing the signals) to replicate the signal at other endpoints (possibly on a selectively switched basis) to allow for infrared communication between endpoints.

In a third use case, if end user Bob in San Jose wishes to let end user Joe in Chicago control his laptop user interface, Bob should identify his internet protocol (IP) address, send the address to Joe, and have Joe enter the IP address to complete the connection through some type of coupling software. However, if they were on the same local network, applications such as VNC or Apple's OSX 10.5 would show the users with VNC connections on the same subnet. Using example implementations presented herein, Joe simply has to click on Bob's name and connect to his machine. This has been enabled through a discovery operation in conjunction with the extension activities outlined herein.

In one sense, these particular participants are operating in a scenario similar to a VPN configuration. For example, once both Bob and Joe have plugged their respective cables into some type of receptacle (for example, an Ethernet port), then these individuals would be able to exchange signals or data, as outlined herein. Joe's device could certainly discover Bob's laptop and vice versa.

Consider another example implementation, where two business entities are involved in a potential conference call. In this example, Joe is an employee of Kmart and Bob is an employee of Cisco Systems, Inc. Bob has a file that he would like to share with Joe, however, that file is resident within the Cisco network and, therefore, Joe is precluded from seeing it. To solve this issue, example embodiments of the present disclosure can allow Joe to latch onto the network being used by Bob. (For purposes of simplification, security mechanisms or authentication type procedures are not discussed in the context of this scenario.) If the signals being received by Bob can be transferred over to Joe, effectively Joe would latch onto Bob's network and be able to see this file. This is somewhat similar to logging into a VPN client in order to share a network and, thereby, share information. Once this connectivity is established, then all of the activities outlined herein can be accomplished. For example, Bob could set up a shared folder, or a shared screen, or an FTP file (etc.) and effectively eliminate all the firewalls, IP addresses, and the considerable overhead that would otherwise be present in such a scenario.

In a fourth use case, chat programs can use such an extension protocol. For example, Apple's iChat leverages the Bonjour discoverability protocol for many uses, such as iTunes and iChat. Shared media and conference-specific chat communications could be useful in many environments. Using the teachings outlined herein, the discoverability and extension protocols may be used to create an in-person meeting experience, even though participants are separated by a considerable distance.

In a fifth use case, unified communications could similarly use the extension model outlined herein. Such activities could further enhance presence information and device interoperability as IP Phone solutions become more intelligent and more advanced in capabilities. Presentation streams from a video conference platform (e.g., TelePresence) could be sent to IP Phones that are capable of displaying the media and so forth. If a user is in a rich media conference (WebEx, MeetingPlace, etc.), they could switch between devices from which the media is streaming, or add-in other participants who join the end user in their proximity.

Turning to an operational perspective of the present disclosure, FIG. 4 is a simplified flowchart illustrating one example flow associated with communication system 10. In this example flow, a first group of end users from San Jose, Calif. is using a video conference protocol to connect with a second group of end users in Chicago, Ill. This is depicted by step 100. The participants of this video conference can be somewhat oblivious to the data transmissions occurring during the call. The number of receivers (representing each individual technology [Wi-Fi, infrared, Bluetooth, etc.]) are configured to systematically detect possible signals to be sent over an interface and to be received by a remote party. This is depicted by step 102. As used herein in this Specification, and in regards to the activities associated with the endpoints, any act of listening, learning of, identifying, becoming aware of, receiving, etc. is included within the term ‘detect.’

In this example, one of the end users from San Jose seeks to send a picture from his cellular telephone to the remote group in Chicago. Manager element 20, which is resident in the room in San Jose, can receive (identify, acknowledge, etc.) this infrared signal being sent along by corresponding endpoints. This is depicted by step 104. Manager element 20 can translate this infrared signal into something it can packetize for subsequent transmission over the network, as shown by step 106.

At step 108, manager element 20 identifies a target group of recipients for this incoming picture (e.g., based on who the transmitting end user is currently seeing on a screen, based on a registration list, based on ACL information, based on e-mail suffixes [indicative of company affiliation], etc.). The manager element on the opposite side (in Chicago) can perform the opposite operation, where it depacketizes this signal and pushes it to the endpoints in the room in Chicago. This is depicted by step 110. The endpoints can simply act as a repeater and replicate the signal such that they can be received at the remote location by end user devices at the remote site. In this sense, the manager element and endpoints in Chicago operate as a repeater in simply emitting the received signal to various participants at the remote site. This model continues as the manager elements on both sides continue to ‘listen’ for signals such that upon detection, the manager element is empowered to make a determination as to whether the signal should be forwarded along to counterparties. This is depicted by step 112.

Note that various technologies are proximity-based such that any entity within a certain distance could receive the signal in Chicago. In a general sense, the environment in San Jose is effectively being replicated in Chicago and this replication offers a video conference environment more similar to an in-person meeting in which end user devices could readily exchange such signals.

The transport of the signals between Chicago and San Jose can be coordinated using various strategies. For example, one piece of this concept entails detecting incoming signals and sending signals to the endpoints. Manager element 20 can detect a data stream and identify for whom it is intended (for example, through some control list, or through an identification of the participants being seen by the transmitting endpoint end user, etc.). In one sense, example embodiments presented herein can extend non-IP protocols (using IP) to different scenarios and environments in which they currently do not reside. Some of these non-IP protocols include Wi-Fi, infrared, Bluetooth, and include any other format that could be used in conjunction with IP, as outlined herein.

The functions outlined herein may be implemented by logic encoded in one or more tangible media (e.g., embedded logic provided in an application specific integrated circuit [ASIC], digital signal processor [DSP] instructions, software [potentially inclusive of object code and source code] to be executed by a processor, or other similar machine, etc.). In some of these instances, a memory element can store data used for the operations described herein, and/or the memory element can store software, logic, code, or processor instructions that are executed to carry out the activities described in this Specification. In one example, a processor could transform an element or an article (e.g., data) from one state or thing to another state or thing. In another example, the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by a processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array [FPGA], an erasable programmable read only memory (EPROM), an electrically erasable programmable ROM (EEPROM)) or an ASIC that includes digital logic, software, code, electronic instructions, or any suitable combination thereof.

Note that with the example provided above, as well as numerous other examples provided herein, interaction may be described in terms of two or three elements. However, this has been done for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of flows by only referencing a limited number of network elements. It should be appreciated that communication system 10 (and its teachings) are readily scalable and can accommodate a large number of endpoints, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of communication system 10 as potentially applied to a myriad of other architectures.

It is also important to note that the steps discussed with reference to FIGS. 1-4 illustrate only some of the possible scenarios that may be executed by, or within, communication system 10. Some of these steps may be deleted or removed where appropriate, or these steps may be modified or changed considerably without departing from the scope of the present disclosure. In addition, a number of these operations have been described as being executed concurrently with, or in parallel to, one or more additional operations. However, the timing of these operations may be altered considerably. The preceding operational flows have been offered for purposes of example and discussion. Substantial flexibility is provided by communication system 10 in that any suitable arrangements, chronologies, configurations, and timing mechanisms may be provided without departing from the teachings of the present disclosure.

Although the present disclosure has been described in detail with reference to particular embodiments, it should be understood that various other changes, substitutions, and alterations may be made hereto without departing from the spirit and scope of the present disclosure. For example, although the present disclosure has been described as operating in video conferencing environments or arrangements, the present disclosure may be used in any communications environment that could benefit from such technology. Virtually any configuration that seeks to intelligently provision a set of signals could enjoy the benefits of the present disclosure. Moreover, the architecture can be implemented in any system providing proximity-based signals for one or more endpoints. In addition, although some of the previous examples have involved specific terms relating to the TelePresence platform, the idea/scheme is portable to a much broader domain: whether it is other video conferencing products, smart telephony devices, etc. Moreover, although communication system 10 has been illustrated with reference to particular elements and operations that facilitate the communication process, these elements and operations may be replaced by any suitable architecture or process that achieves the intended functionality of communication system 10.

Numerous other changes, substitutions, variations, alterations, and modifications may be ascertained to one skilled in the art and it is intended that the present disclosure encompass all such changes, substitutions, variations, alterations, and modifications as falling within the scope of the appended claims. In order to assist the United States Patent and Trademark Office (USPTO) and, additionally, any readers of any patent issued on this application in interpreting the claims appended hereto, Applicant wishes to note that the Applicant: (a) does not intend any of the appended claims to invoke paragraph six (6) of 35 U.S.C. section 112a as it exists on the date of the filing hereof unless the words “means for” or “step for” are specifically used in the particular claims; and (b) does not intend, by any statement in the specification, to limit this disclosure in any way that is not otherwise reflected in the appended claims. 

1. A method, comprising: receiving data associated with a local endpoint that is configured to participate in a video conference, the local endpoint configured to: detect a signal generated by a local end user device and relay the signal to a local manager element; and transmitting the signal over a network to a remote manager element at a remote location.
 2. The method of claim 1, further comprising: receiving an additional signal from the remote manager element; and determining a selected local endpoint to receive the additional signal from the remote manager element.
 3. The method of claim 2, wherein the determining includes using an access control list to identify the selected local endpoint to receive the additional signal from the remote manager element.
 4. The method of claim 2, wherein the determining includes using Internet protocol (IP) address information to identify the selected local endpoint to receive the additional signal from the remote manager element.
 5. The method of claim 2, wherein the determining includes using imaging data from the video conference to identify the selected local endpoint to receive the additional signal from the remote manager element.
 6. The method of claim 1, further comprising: packetizing the signal before transmitting the signal to the remote manager element.
 7. The method of claim 1, wherein the signal is generated by the local end user device using a communications protocol, the protocol being selected from a group of protocols consisting of: 1) a Wi-Fi protocol; 2) an Infrared protocol; 3) a Bluetooth protocol; and 4) a radio frequency identification (RFID) protocol.
 8. An apparatus, comprising: a local manager element configured to: receive data associated with a local endpoint operable to: participate in a video conference, detect a signal generated by a local end user device, and relay the signal to the local manager element, wherein the local manager element is further configured to: receive the signal from the local endpoint; and transmit the signal over a network to a remote manager element at a remote location.
 9. The apparatus of claim 8, further comprising: a control module configured to determine a selected local endpoint to receive an additional signal from the remote manager element, wherein the local manger element is configured to receive the additional signal from the remote manager element
 10. The apparatus of claim 9, wherein the control module is configured to use an access control list for determining the selected local endpoint to receive the additional signal from the remote manager element.
 11. The apparatus of claim 9, wherein the control module is configured to use Internet protocol (IP) address information for determining the selected local endpoint to receive the additional signal from the remote manager element.
 12. The apparatus of claim 9, wherein the control module is configured to use imaging data from the video conference for determining the selected local endpoint to receive the additional signal from the remote manager element.
 13. The apparatus of claim 8, wherein the local manager element is configured to packetize the signal before transmitting the signal to the remote manager element.
 14. Logic encoded in one or more tangible media for execution and when executed by a processor operable to: receive data associated with a local endpoint configured to participate in a video conference, the local endpoint further configured to detect a signal generated by a local end user device and to relay the signal to a local manager element; and transmit the signal over a network to a remote manager element at a remote location.
 15. The logic of claim 14, wherein the logic is further operable to: receive an additional signal from the remote manager element; and determine a selected local endpoint to receive the additional signal from the remote manager element.
 16. The logic of claim 15, wherein the determining includes using an access control list to identify the selected local endpoint to receive the additional signal from the remote manager element.
 17. A system, comprising: means for receiving data associated with a local endpoint that is configured to participate in a video conference, the local endpoint configured to detect a signal generated by a local end user device and to relay the signal to a local manager element; and means for transmitting the signal over a network to a remote manager element at a remote location.
 18. The system of claim 17, further comprising: means for receiving an additional signal from the remote manager element; and means for determining a selected local endpoint to receive the additional signal from the remote manager element.
 19. The system of claim 18, wherein the means for determining includes using an access control list to identify the selected local endpoint to receive the additional signal from the remote manager element.
 20. The system of claim 18, wherein the means for determining includes using Internet protocol (IP) address information to identify the selected local endpoint to receive the additional signal from the remote manager element. 