Patent application number | Description | Published |
20080276241 | DISTRIBUTED PRIORITY QUEUE THAT MAINTAINS ITEM LOCALITY - A method of administering a distributed priority queue structure that includes removing a highest priority item from a current root node of a tree structure to create a temporary root node, determining for each subtree connected to the temporary root node a subtree priority comprising the priority of the highest priority data item in the each subtree, determining as the highest priority subtree connected to the temporary root node the subtree connected to the temporary root node having the highest subtree priority, determining whether any of the one or more data items stored at the temporary root node has a higher priority than the highest subtree priority and directing an arrow to the subtree having the highest priority or to the temporary root itself if the priority of the data items stored at temporary root is higher than the priorities of the connected subtrees. | 11-06-2008 |
20090022303 | Reduction of Wireless Communication Costs in Enterprises - Methods and apparatus are disclosed for reducing wireless telecommunication costs for enterprises having a plurality of PBX-equipped sites, connected by either a public network (e.g., the PSTN, the Internet, etc.), a private network (e.g., leased lines, a virtual private network [VPN] over the Internet, etc.), or some combination of public and private networks. In particular, the illustrative embodiments of the present invention attempt to reduce telecommunication costs by advantageously routing calls from an off-premises wireless terminal belonging to the enterprise via one or more of the enterprise's private branch exchanges. The present invention is especially advantageous in that it can reduce telecommunication costs for calls from an off-premises wireless terminal to any type of destination: another cell phone, a wireline terminal, a private branch exchange, etc. | 01-22-2009 |
20090089289 | Methods and Apparatus for Providing Customer Treatment Information Over a Network - Methods and apparatus are disclosed for providing customer treatment information over a network. A transaction communication is established between a first enterprise and a second enterprise by receiving a request from a user associated with the first enterprise to establish the transaction communication; determining if the second enterprise is authorized to access enterprise information of the first enterprise; obtaining enterprise information from an enterprise database of the first enterprise; and providing the obtained information to the second enterprise as part of the establishment of the transaction communication if the second enterprise is authorized to access the enterprise information of the first enterprise. The enterprise information is typically related to the transaction and may comprise one or more of customer priority information and a transaction history. The second enterprise can determine if a third enterprise is authorized to access enterprise information of the first enterprise and/or the second enterprise. | 04-02-2009 |
20090135740 | Enhanced Application-Layer Multicast for Peer-to-Peer Conferencing - An application-layer multicast-based (ALM-based), peer-to-peer conferencing system is disclosed that leverages the differing capabilities of the participating peer nodes. A conference call can be set up among peer nodes of three different types. A bridging node is capable of mixing individual audio signals that are associated with a call into a composite audio signal and of providing the composite audio signal to another node. A mixing-capable node is capable of mixing the individual audio signals that are associated with a call, but not of relaying those signals to another node. A mixing-incapable node does not support the mixing of individual audio signals. The conferencing architecture of the illustrative embodiment is able to account for the differences between the three types of nodes that are to participate in a conference call, resulting in an optimal allocation of bandwidth and processing resources. | 05-28-2009 |
20100069092 | Scalable Geo-location Event Processing - Traditional, server-oriented architectures have focused on providing location-based services by using publish-subscribe, efficient message buses, and filtering mechanisms. However, given an enterprise's unique requirements, these techniques have offered mixed results when used in an enterprise context. The present invention enables an efficient way to provide location-based services to an enterprise, as well as to integrate those location-based services into the enterprise's communications platform. A platform for supporting converged, location-based communications comprises one or more application servers such as a transactional server, a Session Initiation Protocol server, and so forth. In addition, the platform advantageously comprises an event processor for managing arriving location streams that are generated by targets being monitored. Such targets include the cell phones and WiFi handsets of the enterprise users, but can also include location data from various users arriving from multiple, fixed points such as credit card readers in stores. | 03-18-2010 |
20100151885 | Location Privacy Enforcement in a Location-Based Services Platform - A method for determining the privacy settings for location-based services without some of the disadvantages of the prior art is disclosed. This is done by establishing a session between the location generator and the location recipient. The session is created by a validator that is capable of keeping track of the rules for a stream of location objects created by a location generator. The validator determines what information to send to the location recipient without having to determine the rules for each location object and each location recipient every time a new location object is received by the location server. | 06-17-2010 |
20100182938 | Feature Interaction Detection in Multi-Party Calls and Calls With Bridged Appearances - A method is disclosed for detecting feature interactions in multi-party calls (i.e., calls involving more than two endpoints), and in calls with bridged appearances. In accordance with the illustrative embodiment, a set of rules is applied to the specifications of two features in order to detect interactions between the features. The rules specify conditions for, or relationships among, the original connections for the features, the resulting connections for the features, the triggering party for the features, and the originating and terminating parties of connections. A rule is considered matched for a multi-party call when any of the original and resulting connections for the call match the conditions of the rule. Similarly, a rule is considered matched for a call with one or more bridged appearances when any of the original and resulting connections for the call, including those of bridged appearances, match the conditions of the rule. | 07-22-2010 |
20100182996 | Feature Interaction Detection During Calls With Multiple-Leg Signaling Paths - Methods are disclosed for detecting feature interactions during a call that has a signaling path comprising two or more legs. In accordance with the illustrative embodiment, feature state information is maintained for each of the legs of the call and is propagated along the signaling path. The illustrative embodiment is capable of detecting interactions between features in different legs of a call, as well as interactions between features in the same leg of a call. Moreover, the illustrative embodiment is capable of accommodating a variety of feature resolution techniques. In one illustrative embodiment specific to Voice over Internet Protocol (VoIP) telephony, a Back-to-Back User Agent (B2BUA) stores and propagates the feature state information, and performs address mapping for two specially-defined headers in addition to the usual Session Initiation Protocol (SIP) headers. | 07-22-2010 |
20100183135 | Mid-Call Detection And Resolution Of Feature Interactions - Techniques for detecting and resolving feature interactions during calls are disclosed. In particular, a finite-state machine and a corresponding method detect when a feature that is invoked during a call would interact with another previously-activated feature, and ensure that both features are not active simultaneously. Three different techniques for resolution are disclosed: in one technique, activation of the latter feature is always refused; in a second technique, the former feature is always deactivated and the latter feature is then activated; and in a third technique, one of the two features is selected to be the active feature—perhaps based on priorities assigned to the features—and the features are activated and/or deactivated accordingly. | 07-22-2010 |
20100318588 | Spatial-Temporal Event Correlation for Location-Based Services - A method for tracking the context around moving objects without some of the disadvantages of the prior art is disclosed. This is done by correlating the spatial information of what is around an object with the temporal (or time) information of an object's movements. | 12-16-2010 |
20100329140 | Interaction Detection Between Web-Enabled and Call-Related Features - A method is provided for detecting interactions between call-related and web-enabled features. In some embodiments, communication application components are configured to transmit an indication to a feature interaction detector every time a feature is invoked by the user. When the interaction detector receives an indication that a feature is being invoked, it compares the invoked feature against features that have previously been invoked (or executed) and determines whether the invoked feature interacts with any of the features that have been previously executed. | 12-30-2010 |
20110069699 | Method for Telephony Client Synchronization in Telephone Virtualization - A method is provided for the use of a signaling protocol stack by telephony applications which run on different system software images. When a telecommunications session is conducted by a first telephony application, the first telephony application typically controls the state of the telecommunications session through a signaling protocol stack executing on the same system software image as the first telephony application. When control over the telecommunications session is passed from the first telephony application to a second telephony application, the second telephony applications begins controlling the state of the telecommunications session through the same signaling protocol stack by using remote procedure calls. | 03-24-2011 |
20110070873 | Method for Telephony Client Synchronization in Telephone Virtualization - A method for synchronizing telephony applications running on different system software images is provided. When a telecommunications session is conducted by a first telephony application, the first telephony application controls the state of the telecommunications session through a signaling protocol stack executing on the same system software image as the first telephony application (or on a virtualization layer). The present invention allows the sharing of the signaling protocol stack by multiple telephony applications running on different system software images. | 03-24-2011 |
20110075825 | Method for the Selection of an Active Software Environment of a Virtualized Telecommunications Terminal - A method is presented for the automatic selection of the active software environment of a telecommunications terminal. In accordance with one embodiment of the present invention, the active software environment of a telecommunications terminal is selected on the basis of a characteristic of an incoming invitation to participate in a telecommunications session. In accordance with another embodiment of the present invention, the content of files residing in storage used by a system software instance is processed. When an incoming call is received, the present invention selects an active software environment on the basis of whether the caller is identified in any of the processed files. | 03-31-2011 |
20110075830 | Conference Material Bot Method and Apparatus - A method comprising establishing, with a telecommunications management system, a first conference call comprising a first caller at a first telecommunications terminal, a second caller at a second telecommunications terminal, and a third caller at a third telecommunications terminal. Once the first conference call is established, the telecommunications management system appraises the first caller's contribution, the second caller's contribution, and the third caller's contribution to the first conference call. The telecommunications management system receives a request to set-up a second conference call and establishes the second conference call, wherein the telecommunications management system decides whether to include the first caller, the second caller, and the third caller in the second conference call based, at least in part, on the telecommunications management system's appraisal of the first caller's contribution, the second caller's contribution, and the third caller's contribution to the first conference call. | 03-31-2011 |
20110124327 | Method for Telecommunications Device Synchronization - A method is provided in which a first telecommunications terminal receives an indication of a characteristic of a first system software that is executing on a second telecommunications terminal. The first terminal identifies a second system software that possesses the characteristic. Then, the first terminal launches an instance of the second system software. | 05-26-2011 |
20110228922 | SYSTEM AND METHOD FOR JOINING CONFERENCE CALLS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for scheduling an event to automatically join a user to a conference call. In one aspect, the method includes receiving an invitation for a user to join a conference call, extracting from the invitation a scheduled conference call time, conference call address information, conference call authentication information, and a conference call modality, and scheduling an event to join the user to the conference call via the conference call modality at the scheduled conference call time based on the conference call address information and the conference call authentication information. In another aspect, the system retrieves a scheduled event at a scheduled time, extracts the address, authentication, and modality information for the conference, and joins the user to the conference automatically at the scheduled time. | 09-22-2011 |
20110231396 | SYSTEM AND METHOD FOR PROVIDING PREDICTIVE CONTACTS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing predictive contacts. A system configured to practice the method first analyzes a communication history and a current usage context of a user. Based on the analysis, the system ranks contacts that the user is likely to communicate with from a list of contacts to yield ranked contacts. The system identifies a respective motive for ranking each contact, and presents a predictive list of contacts based at least in part on the ranked contacts, wherein each ranked contact in the predictive list of contacts includes at least part of the respective motive. The system can update the predictive list of contacts in real time as the current usage context changes. The communication history can include, for example, emails, instant messages, phone calls, video conferences, and calendar events. The motive can include a user interaction history with a particular contact. | 09-22-2011 |
20110231409 | SYSTEM AND METHOD FOR PREDICTING MEETING SUBJECTS, LOGISTICS, AND RESOURCES - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user. | 09-22-2011 |
20110231773 | SYSTEM AND METHOD FOR PROVIDING JUST-IN-TIME RESOURCES BASED ON CONTEXT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing just-in-time resources based on context. A system configured to practice the method identifies a communication event associated with a user and a current context associated with the communication event and the user, and identifies a stored context that corresponds to the current context, wherein the stored context includes at least one resource. The system then retrieves the at least one resource and presents the at least one resource to the user. In another method for storing a current context, the system identifies a current communication context, identifies resources associated with the current communication context, indexes the current communication content and resources to enable searchability, and stores, as a stored context in a database, the current communication context and the resources associated with the current communication context. | 09-22-2011 |
20110235631 | METHOD AND APPARATUS FOR AUTOMATIC VERIFICATION OF TELEPHONE NUMBER MAPPING - The present disclosure provides mechanisms for verification of mapping from one type of network address to another type of network address based on delivery of a one-time key over one type of the network and confirmation of its receipt over another type of network. A particular example of such mapping is mapping from a telephone number used in the PSTN or the like to a VoIP address such as a SIP URI. The mapping verification mechanisms can be provided without dependence on the records of past calls, manual calling, or the line information database in the PSTN system. Accordingly, a highly secure and efficient mapping verification mechanism is realized. | 09-29-2011 |
20110306343 | Method for Registering Communication Terminals with Base Station Devices by Using Virtual Appliances - A method for the registration of a communication terminal is provided. In some embodiments of the present invention, a communication terminal is registered with a base station by searching and executing a virtual appliance that contains base station software with which the communication terminal pre-subscribed. In some embodiments of the present invention, a communication terminal is registered as an endpoint device for a Session Initiation Protocol (SIP) uniform resource identifier (URI) when the communication terminal registers with the base station. | 12-15-2011 |
20120030289 | SYSTEM AND METHOD FOR MULTI-MODEL, CONTEXT-SENSITIVE, REAL-TIME COLLABORATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for communicating via a multi-model collaboration space. A system practicing the method first assigns a communication endpoint identifier to a multi-model collaboration space having at least one entity. The endpoint identifier can be a telephone, email address, IP address, or username, for example. The system receives an incoming communication addressed to the communication endpoint identifier, such as a telephone call or email, and transfers the incoming communication to at least one entity in the multi-model collaboration space. In one aspect, the multi-model collaboration space provides a shared persistent container where entities can perform collaboration activities. The entities can have unique identities. The entities can be humans and/or automated, non-human, system-owned entities. Entities can share their context-specific view of the multi-model collaboration space with other entities. Such a multi-model collaboration space can be used in an enterprise environment. | 02-02-2012 |
20120079099 | SYSTEM AND METHOD FOR A CONTEXT-BASED RICH COMMUNICATION LOG - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a context-based rich communication log. A system configured to practice the method performs a context-based analysis of a history of communication sessions over at least two communication modalities, wherein the context-based analysis considers semantic meaning, temporal relationship, and user activities. The system generates associations between the communication sessions based on the context-based analysis, and generates the context-based rich communication log based on the associations. The context-based analysis can be based on time, session participant identifications, ongoing events, and/or on-demand queries of the communication sessions. The system can then present the context-based rich communication log to a user. The context-based rich communication log can be used as part of at least one of a predictive contacts application, a topic analyzer, a conferencing application, and a personal communication assistant, for example. | 03-29-2012 |
20120163577 | METHOD AND SYSTEM FOR AUTOMATIC CONFERENCE CALL SESSION MIGRATION - Disclosed herein are methods, systems, and non-transitory computer-readable storage media for conference call session migration. The conference call session migration includes automatically configuring and establishing a target conference call session during a source conference call session; automatically converting session state and session history from a source format of the source conference call session to a target format of the target conference call session, and automatically connecting per-user clients to the target conference call session. For example, in response to a request from a session manger, the participants on the source conference call session are added to the target conference call session in order to add new media or other conferencing capabilities subject to network and server capabilities, user devices, user conferencing software, user location, user preferences, and policies. | 06-28-2012 |
20120166179 | SYSTEM AND METHOD FOR CLASSIFYING COMMUNICATIONS THAT HAVE LOW LEXICAL CONTENT AND/OR HIGH CONTEXTUAL CONTENT INTO GROUPS USING TOPICS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for identifying document topics. A system configured to practice the method receives a document from a corpus of documents, learns interpersonal relationships of users associated with the document, performs a lexical analysis of the document, and, based on the interpersonal relationships of the users and the lexical analysis, identifying a topic for the document. The approaches disclosed herein can integrate user-people relationships to identify topics for documents with low lexical or high contextual content. The system can learn this user-people relationship from context. The system uses this learned behavior to identify communication documents correctly. Another aspect is the separation of the two phases. The system overlays the learned model on the lexical topic analysis, allowing the system to capture user-defined topics and user behavior that is learned from other factors such as medium (calls, events, etc) or user preferences. | 06-28-2012 |
20120167208 | SYSTEM AND METHOD FOR VOIP HONEYPOT FOR CONVERGED VOIP SERVICES - Disclosed herein are systems, methods, and computer-readable storage media for a honeypot addressing cyber threats enabled by convergence of data and communication services in an enterprise network. Suspicious incoming VoIP calls from the Internet to the enterprise network are intercepted and directed to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls. Suspicious outgoing VoIP calls from the enterprise network to the Internet are also intercepted and directed to the VoIP honeypot. Moreover, an unsolicited VoIP call is redirected to the VoIP honeypot when the unsolicited VoIP call has been received by a user agent in the enterprise network and a human user of the user agent confirms that the unsolicited VoIP call was unsolicited. | 06-28-2012 |
20120221638 | SYSTEM AND METHOD FOR ADVANCED COMMUNICATION THREAD ANALYSIS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for forming communication threads. A system configured to practice the method receives a first log of first communications in a first modality and receives a second log of second communications in a second modality. Then, the system analyzes the first log and the second log to determine relationships between the first communications and the second communications. The system identifies, based on the relationships, sets of communications having a relationship strength above a threshold, and can form communication threads based on the sets of communications. The system can form communication threads by adding a meta-data tag to a communication unit. Example modalities include short message service (SMS), text, instant messages, phone calls, video calls, emails, events, social networking, and voicemail. The system can further rank the importance of communications threads based on user actions, to yield an importance value. | 08-30-2012 |
20120331404 | SYSTEM AND METHOD FOR MULTI-MODEL, CONTEXT-AWARE VISUALIZATION, NOTIFICATION, AGGREGATION AND FORMATION - Systems, methods, and non-transitory computer-readable storage media for context-aware visualization, notification, aggregation, and formation in a multi-model collaboration space. The system first finds contextually related content from a multi-model collaboration space, wherein the multi-model collaboration space includes disjoint collaboration tools. The system then generates a unified content view of the multi-model collaboration space, wherein the unified content view presents the contextually related content from the multi-model collaboration space. | 12-27-2012 |
20130024577 | SYSTEM AND METHOD FOR ESTABLISHING A RELATIONSHIP BASED ON A PRIOR ASSOCIATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for automatically establishing trusted relationships between users across organizational boundaries. A user makes a request to his system to create a trusted relationship with an individual of another organization. The system then analyzes the previous communication history between the user and the other individual, and, based on that analysis, sends a query to the other individual's system. The system then receives a response from the other individual's system, and if the response matches an expected response the system forms a trusted relationship between the user and the other individual. | 01-24-2013 |
20130031243 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR SELF-LEARNING INTERACTIVE COMMUNICATIONS PRIVILEGES FOR GOVERNING INTERACTIVE COMMUNICATIONS WITH ENTITIES OUTSIDE A DOMAIN - Methods, systems, and computer-readable media for self-learning interactive communications privileges for governing interactive communications with entities outside a domain are disclosed. The interactive communications privileges can be used to process interactive communications requests between entities inside and outside a domain. The requested interactive communications are allowed if the interactive communications privileges configured for the entity outside the domain allow for the requested interactive communications. The interactive communications privileges are determined in an automated, self-learning manner in response to monitoring communication interactions between the entities inside and outside the domain. In this manner, the interactive communications privileges are not required to be provisioned and maintained by an administrator. The interactive communications privileges can be determined by gathering insight about the entities outside the domain. Insight about an entity outside the domain is information that is useful in determining which interactive communications privileges to configure for an entity outside the domain. | 01-31-2013 |
20130086380 | SYSTEM AND METHOD FOR FACILITATING COMMUNICATIONS BASED ON TRUSTED RELATIONSHIPS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for facilitating communications based on a trusted relationships. A system configured to practice the method first receives a communication request from a second communication device for a specific resource, wherein the communication request is based, at least in part, on trust information generated by a previously established trusted relationship. The system confirms, via an access to a trust database and using the trust information, (1) an identity of a sender of the communication request and (2) access permissions for a requested resource. Then, if the identity and the access permissions are confirmed, the system establishes communications between the first communications device and the second communications device in response to the communication request according to the specific resource. The trust information can include a trust user ID and a trust key. | 04-04-2013 |
20130086481 | SYSTEM AND METHOD FOR ADAPTIVE COMMUNICATION USER INTERFACE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for implementing, via a communication device, a set of algorithms to learn about user's usage of the device and provide automated customization to the device's user interface to improve ease of use and productivity of the end-user. This approach does not require the user's involvement by manually customizing the user interface, such as by setting up a speed dial list or a screen layout. The system automates rendering decisions and the content that is rendered based on the usage information. For example, if a user consistently calls a number every Tuesday and Wednesday morning regardless of scheduled calendar information, the communication device can provide a dynamic widget in the user interface for easy access to that number every Tuesday and Wednesday morning. The user can dial the number easily via the widget without the dial pad or a contacts application. | 04-04-2013 |
20130097292 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR SELF-MAINTAINING INTERACTIVE COMMUNICATIONS PRIVILEGES GOVERNING INTERACTIVE COMMUNICATIONS WITH ENTITIES OUTSIDE A DOMAIN - Methods, systems, and computer-readable media for self-maintaining interactive communications privileges governing interactive communications with entities outside a domain are disclosed. The interactive communications privileges can be used to process interactive communications requests between entities inside a domain and entities outside the domain. Currently configured interactive communications privileges configured for an entity outside a domain may no longer be desired, reliable, or valid with the current capabilities of the entity outside the domain. In this regard, embodiments disclosed herein involve self-maintaining interactive communications privileges configured for entities outside a domain. Review of interactive communications privileges configured for entities outside a domain can be performed to determine if those interactive communications configurations should be maintained, in whole or part, or not maintained. In this manner, the burden and complexity of maintaining interactive communications privileges for entities outside the domain on a domain administrator or other administrator may be reduced or alleviated. | 04-18-2013 |
20130144682 | SYSTEM AND METHOD FOR ENHANCING COMMUNICATION SERVICES BASED ON USER BEHAVIOR AND RELATIVE TRENDING PATTERNS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for enhancing communication services based on relative trending. A system configured to practice the method identifies, from a set of historical communication data associated with a user, relative trending data. Based on the relative trending data, the system identifies a plurality of communication periods within the historical communication data. For a time series associated with one of the communication periods, the system identifies a relative trending pattern in the relative trending data, and performs an action based on a comparison of current communication data to the relative trending pattern for a respective communication period. The communication period can be a fixed, recurring duration of time. The relative trending data is typically associated with at least one variable, which may be, for example, a second user. The system can identify and use trend peaks, patterns, and confidence levels in this approach. | 06-06-2013 |
20130163741 | SYSTEM AND METHOD FOR ENHANCED CALL ROUTING - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for enhanced call routing. A system configured to practice the method determines the communicative intent of a caller based on the caller's identity, communication history, job title, and/or other factors. Based on this communicative intent, the system develops a list of most probable call destinations. From this list of most probable call destinations, the system selects the most-likely call destination the destination most likely to meet the needs of the caller based on the subject received. Then the system can initialize communications are then initialized between the user and the most-likely call destination. | 06-27-2013 |
20130218993 | CONTEXTUAL PRESENCE IN COLLABORATIVE SYSTEMS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for ‘broadcasting’ presence notifications either directly or through complex user-driven systems by replacing the rule-driven approach or the subscription approach with an presence arrangement that is based on context, otherwise known as contextual presence. When a user publishes his or her presence information, either one state or as a set of states, a contextual presence system notifies only those users whose interactions are either expected or do not cause interruptions to users' work. Other than publishing their current presence state or states, contextual presence does not require any configuring or managing from the user and is dynamic both in terms of the changing set of people it notifies and in relation with time. | 08-22-2013 |
20130252619 | Reduction of Wireless Communication Costs in Enterprises - Methods and apparatus are disclosed for reducing wireless telecommunication costs for enterprises having a plurality of PBX-equipped sites, connected by either a public network (e.g., the PSTN, the Internet, etc.), a private network (e.g., leased lines, a virtual private network [VPN] over the Internet, etc.), or some combination of public and private networks. In particular, the illustrative embodiments of the present invention attempt to reduce telecommunication costs by advantageously routing calls from an off-premises wireless terminal belonging to the enterprise via one or more of the enterprise's private branch exchanges. The present invention is especially advantageous in that it can reduce telecommunication costs for calls from an off-premises wireless terminal to any type of destination: another cell phone, a wireline terminal, a private branch exchange, etc. | 09-26-2013 |
20130304924 | System and Method for Predicting Meeting Subjects, Logistics, and Resources - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user. | 11-14-2013 |
20130318541 | SYSTEM AND METHOD FOR DYNAMIC INFLUENCING OF SEQUENCE VECTOR BY SEQUENCED APPLICATIONS - System and method to dynamically influence a sequence vector by a sequenced application, the method including: receiving, from an application, a profile of system resources used by the application; receiving a request to execute the application within a sequence vector of a call; receiving a resource availability status; and setting an execution status of the application if a system resource used by the application is not available. | 11-28-2013 |
20140114992 | SYSTEM AND METHOD FOR AN AWARENESS PLATFORM - Disclosed herein are systems, methods, and computer-readable storage media for an awareness platform. The system can model, at a context engine, a context for a user, wherein the context is associated with an activity involving the user. Next, the system can analyze the activity to extract a keyword. The system can then generate a context-aware presentation based on the context and data gathered based on the keyword. The system can also present the context-aware presentation to a device associated with the user. | 04-24-2014 |
20140122880 | System and Method for Facilitating Communications Based on Trusted Relationships - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for facilitating communications based on a trusted relationships. A system configured to practice the method first receives a communication request from a second communication device for a specific resource, wherein the communication request is based, at least in part, on trust information generated by a previously established trusted relationship. The system confirms, via an access to a trust database and using the trust information, (1) an identity of a sender of the communication request and (2) access permissions for a requested resource. Then, if the identity and the access permissions are confirmed, the system establishes communications between the first communications device and the second communications device in response to the communication request according to the specific resource. The trust information can include a trust user ID and a trust key. | 05-01-2014 |
20140188991 | SYSTEM AND METHOD FOR AUTHORIZING THIRD PARTY PROFILE DATA SHARING - Disclosed herein are systems, methods, and computer-readable storage media for authorizing third-party profile data sharing. The system receives a request to a request to share profile data held by a first person with a second person, wherein the profile data is of a third person. The system then generates a common context value based on an association between at least two of the first person, the second person, and the third person, wherein the common context value indicates how strongly the third person is connected to the first person and/or the second person. When the common context value is above a threshold, the system permits the first person to share the profile data of the third person with the second person. | 07-03-2014 |
20140372162 | SYSTEM AND METHOD FOR SMART CONTEXTUAL CALENDARING BASED MEETING SCHEDULING - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for contextual calendaring. Contextual calendaring can schedule meetings with varying states of blocking time slots based on users' behavior with respect to the participants, topics, and tasks or context of the meeting. For example, host H invites A for a meeting with the text “we must demo our ‘one-click video’ on Friday.” The contextual calendaring system knows that A isn't available on Friday, so can prioritize the task for A on Friday relative to the demo participants and schedule a ‘firm hold’ or can suggest an alternative person based on the topic and prior context who is available for the demo. The system can mine context information, and identify, based on the context information, a desired attendee and a priority. The system can place a soft hold on the calendar for the desired attendee based on the priority. | 12-18-2014 |
20140372909 | MEETING ROSTER AWARENESS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing meeting roster awareness for participants in a conference. An example system configured to practice this method can first identify participants in a conference, and retrieve, from a source external to the conference, information describing relationships between the participants. Then the system can compute, based on the information, a relationship graph assigning a relationship strength for at least two of the participants. The system provides an indication of the relationship strength to one of the participants, such as providing an indication of relationships of which other participants are not aware. Sources external to the conference can include a social network, a communication history, an organizational chart, a directory, or group membership, for example. | 12-18-2014 |
20150046790 | OVERLAY OF PRIVATE DATA ON WEB PAGES - A connection is made to a first web page. Content of the first web page is displayed to the first user. Information about the first web page is received from the first user. A view of the first web page is modified and presented to the first user based on the information. The information is not sent to the web server associated with the first web page. Instead, the information is stored in a location that is associated with an organization that is associated with the first user. The organization is not associated with the web server. A connection is made to the first web page based on input from a second user. The second user is also associated with the organization. Based on the second user being associated with the organization, the stored information is retrieved and presented to the second user. | 02-12-2015 |
20150058418 | PROVIDING DATA RESOURCE SERVICES WITHIN ENTERPRISE SYSTEMS FOR RESOURCE LEVEL SHARING AMONG MULTIPLE APPLICATIONS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Providing data resource services within enterprise systems for resource level sharing among multiple applications, and related methods, systems, and computer-readable media are disclosed. In one embodiment, a method for providing a data resource service within an enterprise system is provided. The method includes receiving a user data request from a web application having application logic located outside of an enterprise system to access user data stored in memory within the enterprise system. The method further includes accessing the user data stored in the memory within the enterprise system in response to the user data request from the web application. The method also includes providing access to the user data stored in the memory within the enterprise system to the web application in response to the user data request. | 02-26-2015 |
20150088784 | SYSTEM AND METHOD OF MESSAGE THREAD MANAGEMENT - Disclosed herein are systems, methods, and computer-readable storage device for managing message threads. An example system configured to practice this method can first identify a usage pattern of a user interacting with a message thread. Next, based on that usage pattern, the system can analyze messages in the message thread to identify a high-priority message. Then the system highlights the high-priority message when the system renders the message thread on a display. The messages can be email messages, text messages, instant messages, etc. The system can further associate the high-priority message with a repository, and grant a repository user, access to the high-priority message. | 03-26-2015 |