Patent application number | Description | Published |
20080304635 | USER INTERFACE ARCHITECTURE AND PROTOCOL FOR RICH CLIENT CONTROLLED VOICEMAIL - Systems and methods that control a voice mail experience from a client side of a voice mail server system and enhance features thereof. A dynamic voice mail user interface can change based on what predetermined activity the user engages in. Moreover, a field component further enables a caller to identify characteristics of the voice mail. An XML based protocol empowers a client application to control state of the voice mail system, wherein a session Initiation Protocol (SIP) INFO request or response can carry out voicemail control command, result and event. | 12-11-2008 |
20090003542 | UNIFIED RULES FOR VOICE AND MESSAGING - The claimed subject matter provides a system and/or a method that facilitates managing an incoming data communication in connection with unified communications. A unified communications component can employ unified communications for a data communication with at least the following data communication modes: an email data communication mode, a voice data communication mode, and a voicemail data communication mode. A unified rules component can automatically redirect the data communication to a delegate for receipt based upon a universal rule, the universal rule is uniformly applicable to at least two of the email data communication mode, the voice data communication mode, or the voicemail data communication mode. | 01-01-2009 |
20090006548 | DELEGATING INSTANT MESSAGING SESSIONS - The claimed subject matter provides a system and/or a method that facilitates redirecting an instant messaging session or an instant messaging communication. An interface component can receive a portion of data related to an instant messaging session, wherein the portion of data is associated with an instant messaging communication. A delegation component can automatically route the instant messaging session to a delegate for receipt of the instant messaging communication based upon a rule. | 01-01-2009 |
20090006632 | UPDATING CONVERSATIONS AFTER REDIRECTION - The claimed subject matter provides a system and/or a method that facilitates maintaining identification data for a real-time communication. A unified communications component can enable real-time communications by employing a communication session with at least one data communication mode, wherein the communication session can include conversation identification (ID). An invitation from a source to a target can initiate at least one of the communication session or the at least one data communication mode within the communication session. An update component can generate an additional conversation ID for the communication session upon detecting the invitation is forwarded by the target. | 01-01-2009 |
20090034696 | MECHANISM OF DISTRIBUTING VOICE CALL USING EMAIL DISTRIBUTION GROUPS - The claimed subject matter provides a system and/or a method that facilitates routing an incoming data communication in connection with unified communications. A unified communications component can employ unified communications for a data communication with an email data communication mode, a voice data communication mode, an instant messaging data communication mode, and a voicemail data communication mode. A distribution component can automatically route the data communication to an entity utilizing a distribution group, the distribution group includes at least one entity with a public switched telephone network (PSTN) number and a session initiation protocol (SIP) uniform resource identifier (URI). | 02-05-2009 |
20090044264 | SPAM REDUCTION IN REAL TIME COMMUNICATIONS BY HUMAN INTERACTION PROOF - The claimed subject matter provides a system and/or a method that facilitates authenticating a data communication. An interface component can receive data related to a real time data communication between two or more clients. A verification component can employ a human interaction proof (HIP) to a client participating within the real time data communication, wherein a human identity of the client is authenticated as a function of a response to the HIP. | 02-12-2009 |
20090083742 | INTERRUPTABILITY MANAGEMENT VIA SCHEDULING APPLICATION - A system and methodology that facilitates management of user accessibility via a scheduling application is provided. A user can link or map interruptability levels to schedule entries, such as calendar entries or tasks thereby facilitating automatic communication management. Essentially, interruptability rules (and corresponding categories) can be associated to calendar entries and tasks thereby automating implementation of interruptability rules to manage communications received during calendar entries, tasks, meeting, appointments, etc. | 03-26-2009 |
20090180602 | CONTEXTUAL CALL ROUTING BY CALLING PARTY SPECIFIED INFORMATION THROUGH CALLED PARTY SPECIFIED FORM - Context-based call routing is provided in a unified communication system by enabling subscribers to define a routing document, which is published by the communication system to callers who subscribe to a presence of the called party. Through publication of the context-based routing information, callers are enabled to make selections between call destination options as defined by the caller and provide a subject for the requested call. The call is then routed by the system according to the caller selection allowing efficient facilitation of the communication between the caller and the called party or their designees. | 07-16-2009 |
20090202056 | TECHNIQUES FOR TRANSFER ERROR RECOVERY - Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed. | 08-13-2009 |
20090216839 | Electronic Business Card Exchange System and Method - To provide a user with better experience of cooperation between an electronic business card processing program and a communication program when exchanging electronic business cards. Electronic business cards are stored in a DB server, which is one of storages for a communication program, as well as an electronic business card local file. Thus, even if a PC is a company's PC, for example, the electronic business cards can be viewed by accessing the DB server from another PC or the like outside an office. Further, the electronic business card processing program operates with the communication program as back-end, however, the electronic business card processing program may not be installed on a PC in some cases. Even in such a case, the communication program alone can display received electronic business cards that are stored in the communication program local file on the screen of a display. | 08-27-2009 |
20090238358 | COMMUNICATING INFORMATION PERTAINING TO CANCELLING OF FORKED CALL REQUESTS - Multiple instances of an incoming call in a unified communication system capable of communicating through multiple networks are provided to devices and/or applications associated with the called party. Upon acceptance or a global rejection of the incoming call through one of the end devices/applications, the remainder are provided a cancellation notice for the forked call request that includes information associated with which end device took the action, what type of action was taken, whether the action was based on automatic policy implementation. | 09-24-2009 |
20090279533 | EXTENSIBLE AND SECURE TRANSMISSION OF MULTIPLE CONVERSATION CONTEXTS - The entry and transmission of notes to recipients along the conversation chain. Notes can be created based on an incoming caller. The notes can be transmitted to the conversation recipient for viewing before, during, and after the recipient accepts the conversation. This is facilitated by a communications client that operates to allow entry of the notes, and forwarding of the call recipient via a SIP framework. Moreover, notes previously taken and/or information provided manually and/or automatically by the communications system can be provided to an agent (e.g., ACD, receptionist) receiving the conversation, at any point in the conversation chain for quick identification not only of the conversation source but of previous information already collected. | 11-12-2009 |
20090296687 | BYPASSING ROUTING RULES DURING A CONVERSATION - Communication requests added to a conversation are routed directly to a user without following the pre-configured routing rules for the user during a breakthrough period. The breakthrough period may last for the duration of the conversation or for some other period of time. A conversation may be initiated using any supported type of communication. For example, if a user initially sets up an IM conversation with a remote user, then when a voice call is made to the user from the remote user, the voice call is routed directly to the user without applying the routing rules that are configured for the user. Once the breakthrough period has elapsed, the routing rules become active again and are applied to communications received from the remote user that are directed to the user. | 12-03-2009 |
20090296930 | TECHNIQUES TO PROVISION AND MANAGE A DIGITAL TELEPHONE TO AUTHENTICATE WITH A NETWORK - Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management component may also comprise a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a computing device, and decrypt the encrypted security credentials with the PIN. The digital telephone management component may further comprise a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to authenticate the digital telephone using the security credentials. Other embodiments are described and claimed. | 12-03-2009 |
20090327426 | REMOTE CALL CONTROL AND CONFERENCING USING PAIRED DEVICES - In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session. | 12-31-2009 |
20090327428 | MULTIMODAL CONVERSATION TRANSFER - In one embodiment, a user may transfer a multimodal conversation. A multimodal conversation may have a first mode communication session and a second mode communication session. A first user point of presence may execute a first transfer of the first mode communication session with a first partner point of presence from the first user point of presence to a first target point of presence. A second user point of presence may execute a second transfer of the second mode communication session with a second partner point of presence from the second user point of presence to a second target point of presence. | 12-31-2009 |
20100189260 | CONVERSATION RIGHTS MANAGEMENT - Conversation rights for multi-modal communications are managed and enforced in an enhanced communication system. Through physical and/or software components, rights are assigned to a communication session and related components upon user request. Permitted participants of the session are provided access tools such as decryption keys. Restrictions based on the assigned conversation rights are extended to preserved recordings and associated documents of the communication session. | 07-29-2010 |
20100199320 | MULTIMODAL ESCALATION TO ENDPOINTS IN ENHANCED COMMUNICATION SYSTEMS - Subscribers and endpoints of enhanced multimodal communication systems are enabled to direct call requests and escalations during an existing conversation based on capabilities of endpoints. A list of communication mode/endpoint identifiers are exchanged when a conversation is established, enabling the endpoints to direct requests to for particular communication modes to endpoints capable of facilitating the communication mode at any point during the conversation. Additional capabilities/endpoints are added to the list through updates during the conversation. | 08-05-2010 |
20100235505 | SYNDICATED PRESENCE AND ACTIVITY FEED FEDERATED VIA EXTENDED INTEROPERABLE FORMAT - Architecture for extending a presence document into additional formats and protocols. An aggregator federates the presence document into a standardized schema that can be consumed at a standardized endpoint. The standardized schema can be a web feed that is interoperably consumed by a web feed consumer, for example, an RSS/Atom schema. Access of the presence document content is controlled based on a relationship between the user and a subscriber. Categories are specified for the presence document content, and access is controlled according to the categories. The specified categories can correspond to user authentication levels. The categories can include multiple syndicated channels corresponding to multiple subscriber access levels. In this way, levels of access are defined for various categories of availability information and activity information, based on the relationship of the user to the subscriber. | 09-16-2010 |
20100246450 | EXTENSIBLE REALTIME DELEGATION FOR CALLS, CONFERENCES AND COLLABORATION - Architecture for enabling identification of a call party's representative during calls on behalf of the call party. The call representative is delegated to initiate or answer an IP call on behalf of the call party. An IP-telephony component initiates or answers the IP call by the call representative on behalf of the call party. The IP-telephony component can be an IP telephone, or any other suitable IP calling interface. An identification component presents a representation notification identifying the call representative to a connected call party. The representation notification can be displayed on a caller ID display on an IP phone, or can be displayed on a user interface of the personal computing device, for example. The calls can be point-to-point IP calls with a single participant, or can be conference calls with multiple participants, and can be performed with one or more suitable protocols. | 09-30-2010 |
20100290606 | RESYNCHRONIZATION OF CALL EVENTS AFTER TRIGGER EVENT - Client devices/applications associated with a subscriber of an enhanced communication system are enabled to generate communication records identifying individual communication sessions along with tie-breaker values such that the records can be evaluated following a trigger event and duplicate records for the same subscriber can be removed in order to provide accurate information to the subscriber when the event is over. | 11-18-2010 |
20100290611 | MULTIMODAL CONVERSATION PARK AND RETRIEVAL - Established multimodal conversations are enabled to be parked within an enhanced communication system such that a subscriber of the system can be notified through a variety of means and enabled to retrieve selected or all modalities for continuing the conversation. Different modalities may be parked together or separately. While waiting for the subscriber to retrieve the conversation, a participant may receive audio, video, presentation, or other forms of content as playback. | 11-18-2010 |
20100296640 | MULTIMODAL CALLBACK TAGGING - Users in an enhanced communication system are enabled to tag other users so that the tagging user is notified when both the tagged and tagging users meet a predefined criterion of presence states and/or available modalities to the tagging and the tagged users. The tagging user may then, optionally, initiate a multimodal session with the tagged user utilizing the set of modalities originally specified or another set. | 11-25-2010 |
20100315484 | IMPLEMENTING MULTIPLE DOMINANT SPEAKER VIDEO STREAMS WITH MANUAL OVERRIDE - In a video conference system capable of providing multiple video streams, displayed streams for participants are configured based on automatic selection by the system (such as active speaker) and manual override by the participants. The displayed views are further enhanced by implementing duplicate detection to avoid display of duplicate streams between the automatic selections and manual selections. | 12-16-2010 |
20100322402 | ADVANCED CALL ROUTING USING LINKED IDENTITIES - Architecture for enabling user identities of callers to be collected from data sources and aggregated into respective meta-identities for each caller. Alternate user identities are searched, collected and associated with the meta-identity that can be a user name. A routing rule applied to the meta-identity is then applied across the alternate identities. The user identities can include a name of the caller, a phone number of the caller, or caller information collected from an external source. The phone numbers can include a partial phone number that is normalized into a full phone number format. The user identities can be mapped to the meta-identity and stored according to a hierarchy of confidence ratings. The user identities can be tagged with corresponding data source identifiers that designate respective data sources of the user identities. Conflict resolution is provided for selecting a suitable call routing path between callers having similar meta-identities. | 12-23-2010 |
20100324963 | TAG PRESENCE ALERTS FOR GROUPS AND MEETING - Architecture for enabling a group of contacts of a communications framework to be tagged for concurrent availability and participation in a communications session. The status of the contacts is monitored to detect availability of the contacts, and to determine when the contacts are available concurrently to participate in the communications session. A notification is sent to a tagging user of the concurrent availability of the contacts, at which time a meeting can be initiated. A context can be input that serves as a reminder as to the purpose of the communications session. The context can be presented in the notification with the availability status of the contacts. The status can be monitored by subscribing to presence information of the contacts. A contact list can be maintained to identify the contacts to be tagged and includes metadata related to each contact. | 12-23-2010 |
20110188410 | Using Consultation Call to Transfer Call Across Endpoints - A method for transferring a telephone call from a client computer to a second electronic device includes establishing a connection for a telephone call between the client computer and a first electronic device, and sending a request to a server computer to transfer the telephone call from the client computer to the second electronic device, the client computer and the second electronic device having the same user, the request initiating a consultation call to the second electronic device. The method also includes receiving a response from the server computer that the second electronic device has accepted the telephone call, and replacing the client computer with the second electronic device as a party in the telephone call with the first electronic device, the continuity of the telephone call being maintained at the first electronic device during the time that the client computer is replaced with the second electronic device. | 08-04-2011 |
20110194466 | Pull Based Data Driven Consultative Transfer - A method for transferring a telephone call includes receiving a communication at a first client computer from a second client computer. The first client computer and the second client computer run communication software that supports voice over Internet Protocol. The communication includes a request to transfer the telephone call to the first client computer. After receiving the communication from the second client computer at the first client computer, determining whether to accept the telephone call. When a determination is made to accept the telephone call, an action is initiated at the first client computer that causes the telephone call to be transferred to the first client computer. The action results in replacing the second client computer with the first client computer as a party in the telephone call. | 08-11-2011 |
20110221607 | Dynamic Device Adaptation Based on Proximity to Other Devices - A communication device receives remote location data and uses the remote location data to determine whether an associated communication device is nearby. The associated communication device is nearby when the user is able to concurrently perceive actions performed by the communication device and the associated communication device. The communication performs a first action when the associated communication device is nearby and performs a second action when there are no communication devices associated with the user nearby. | 09-15-2011 |
20110225247 | Collaborative Conference Experience Improvement - An example computing device creates a resource module that acquires resource information relating to resources of the computing device and acquire quality of experience information corresponding to a quality of audio, and creates a roster module that displays a participant list including resource information relating to resources of a plurality of other computing devices connected to the teleconference and display quality of experience information corresponding to a quality of audio a user of each of the plurality of other computing devices experiences when connected to the teleconference. The device also creates a policy module configured to evaluate the resource information and quality of experience information acquired by the client resource module against rules of a teleconference policy and implement actions based on a determination that the computing device is non-compliant with one or more of the rules of the teleconference policy to control quality of audio during the teleconference. | 09-15-2011 |
20110302247 | CONTEXTUAL INFORMATION DEPENDENT MODALITY SELECTION - Modality selection in establishing multimodal conversations is performed automatically based on contextual information in enhanced communication platforms. Automata in client machines determine how a client machine chooses one or more modalities of a conversation invite based on contextual information such as computing device environment, network environment, user presence state, and comparable factors. Executed automata automatically join the user to a selected modality of a conversation or reject one. | 12-08-2011 |
20120059892 | UNIFIED RULES FOR VOICE AND MESSAGING - The claimed subject matter provides a system and/or a method that facilitates managing an incoming data communication in connection with unified communications. A unified communications component can employ unified communications for a data communication with at least the following data communication modes: an email data communication mode, a voice data communication mode, and a voicemail data communication mode. A unified rules component can automatically redirect the data communication to a delegate for receipt based upon a universal rule, the universal rule is uniformly applicable to at least two of the email data communication mode, the voice data communication mode, or the voicemail data communication mode. | 03-08-2012 |
20120170725 | Communicating Information Pertaining to Cancelling of Forked Call Requests - Multiple instances of an incoming call in a unified communication system capable of communicating through multiple networks are provided to devices and/or applications associated with the called party. Upon acceptance or a global rejection of the incoming call through one of the end devices/applications, the remainder are provided a cancellation notice for the forked call request that includes information associated with which end device took the action, what type of action was taken, whether the action was based on automatic policy implementation. | 07-05-2012 |
20120311447 | COLLECTING, AGGREGATING, AND PRESENTING ACTIVITY DATA - Activity data generated during a day or other time period on one or more computing devices is collected and aggregated. The aggregated data is then presented through an activity review user interface. The activity review user interface can be presented on a large format display device, such as a projector or television. The activity review user interface can also be navigated using natural input methods, such as gesture and voice input. | 12-06-2012 |
20120328084 | TECHNIQUES FOR TRANSFER ERROR RECOVERY - Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed. | 12-27-2012 |
20130006879 | Guiding Interactions Between Users of Social Networking Services Based on Business Relationships - A computing device collects data from one or more data sources. The data sources are separate from a social networking service. The computing device uses the data from the data sources to generate group membership suggestions for members of a given user's social network. Because the computing device suggests the group memberships, the given user may be more likely to assign members of the given user's social network to groups. When the given user shares posts on the social networking service, the given user can limit access to the posts to members of selected groups. | 01-03-2013 |
20130018969 | MISSED INSTANT MESSAGE NOTIFICATION - A method and system for capturing missed communications is provided. An enhanced real-time communication system receives a communication from an initiating participant for a receiving participant that is not available. The enhanced real-time communication system detects that the receiving participant missed the received communication from the initiating participant. Upon detecting that the receiving participant missed the communication, the enhanced real-time communication system stores the missed communication for later retrieval by the receiving participant. | 01-17-2013 |
20130046935 | SHARED COPY CACHE ACROSS NETWORKED DEVICES - A copy cache feature that can be shared across networked devices is provided. Content added to copy cache through a “copy”, a “like”, or similar command through one device may be forwarded to a server providing cloud-based services to a user and/or another device associated with the user such that the content can be inserted into the same or other files on other computing devices by the user. In addition to seamless movement of copy cache content across devices, the content may be made available in a context-based manner and/or sortable manner. | 02-21-2013 |
20130074142 | SECURING DATA USAGE IN COMPUTING DEVICES - Policies are applied to specific data rather than to an entire computing device that contains the specific data. Access to the specific data is controlled by the policies utilizing various password or other authentication credential requirements, selective data caching, data transmission, temporary data storage, and/or pre-defined conditions under which the specific data is to be erased or rendered inaccessible. Policies may be defined by an administrator and pushed to a mobile computing device, whereat the policies are enforced. | 03-21-2013 |
20130106982 | COLLABORATIVE CONFERENCE EXPERIENCE IMPROVEMENT | 05-02-2013 |
20140025712 | Global Recently Used Files List - A global recently used files list identifies files recently accessed by a user through one or more network services and files accessed by the user that are stored locally on a computing device. In order to generate the global recently used files list, a network recently used files list is retrieved that identifies files that were recently accessed through the one or more network services. Applications may update the network recently used files list each time a user accesses files by way of a network service. The network recently used files list may then be merged with a local recently used files list that identifies recently accessed locally stored files in order to generate the global recently used files list. Applications may update the local recently used files list each time files are accessed that are stored locally on a computing device. | 01-23-2014 |
20140280616 | EMAIL ASSISTANT FOR EFFICIENTLY MANAGING EMAILS - Technologies are generally described for providing an email assistant for sorting through emails received at an email application. The email assistant may prioritize emails and group high and low priority emails separately to enable a user to quickly view and manage an email inbox. The email assistant may also provide suggestions on how to sort and manage emails in the inbox of the email application. The email assistant may observe a user's pattern of interactions with types of emails, and prioritize emails and suggest actions based on the user's interactions. The email assistant may be configured to automatically sort emails and provide management suggestions based on a detected scenario such as a user's return after a period of time away, a large influx of emails, and presence detection. | 09-18-2014 |