The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 06, 2019

Filed:

Dec. 17, 2014
Applicant:

Hewlett-packard Development Company, L.p., Houston, TX (US);

Inventors:

Kent E Biggs, Tomball, TX (US);

Yolanda Rivas, Houston, TX (US);

Robert C Brooks, Houston, TX (US);

Richard E Hodges, Magnolia, TX (US);

Harold Merkel, Houston, TX (US);

James M Mann, Cypress, TX (US);

Lorri L Jefferson, Tomball, TX (US);

Derek Labron Everett, Houston, TX (US);

Thomas Bonola, Cypress, TX (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 15/16 (2006.01); H04L 12/18 (2006.01); H04L 29/08 (2006.01); H04N 7/15 (2006.01); H04L 29/06 (2006.01); H04W 12/08 (2009.01);
U.S. Cl.
CPC ...
H04L 12/1822 (2013.01); H04L 12/18 (2013.01); H04L 12/1818 (2013.01); H04L 29/08 (2013.01); H04L 63/107 (2013.01); H04N 7/15 (2013.01); H04W 12/08 (2013.01);
Abstract

Examples disclosed herein relate to a conference call host. Examples include to establishing, by a first computing system, a first secure connection to a second computing system via a wireless network in response to receiving a secure connection request from the second computing system; the first computing system and the second computing system are in physical proximity to each other. Examples include to provide an operating system session to the second computing system through the secure connection while the first computing system and the second computing system remain in physical proximity to each other; the operating system is stored on and executable by the first computing system. Examples include to provide a connection to a conferencing platform to the second computing system via the first secure connection, the conference call at least among the first computing system, the second computing system, and a remote user.


Find Patent Forward Citations

Loading…