Patent application number | Description | Published |
20110060843 | METHOD FOR ON DEMAND DISTRIBUTED HASH TABLE UPDATE - A method for managing communication in a peer-to-peer network in which overlay information is updated on-demand such that neighboring node information is updated at least periodically and other overlay information is updated on-demand (from standard communications). For example, in one aspect, the network includes a plurality of nodes, and the method includes sending a leaving message from a leaving node to the predecessor and successor nodes of the leaving node, the leaving message including information relating to the leaving node, updating each of the predecessor and successor nodes exclusive of any other nodes of the plurality of nodes. | 03-10-2011 |
20110228922 | SYSTEM AND METHOD FOR JOINING CONFERENCE CALLS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for scheduling an event to automatically join a user to a conference call. In one aspect, the method includes receiving an invitation for a user to join a conference call, extracting from the invitation a scheduled conference call time, conference call address information, conference call authentication information, and a conference call modality, and scheduling an event to join the user to the conference call via the conference call modality at the scheduled conference call time based on the conference call address information and the conference call authentication information. In another aspect, the system retrieves a scheduled event at a scheduled time, extracts the address, authentication, and modality information for the conference, and joins the user to the conference automatically at the scheduled time. | 09-22-2011 |
20110231396 | SYSTEM AND METHOD FOR PROVIDING PREDICTIVE CONTACTS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing predictive contacts. A system configured to practice the method first analyzes a communication history and a current usage context of a user. Based on the analysis, the system ranks contacts that the user is likely to communicate with from a list of contacts to yield ranked contacts. The system identifies a respective motive for ranking each contact, and presents a predictive list of contacts based at least in part on the ranked contacts, wherein each ranked contact in the predictive list of contacts includes at least part of the respective motive. The system can update the predictive list of contacts in real time as the current usage context changes. The communication history can include, for example, emails, instant messages, phone calls, video conferences, and calendar events. The motive can include a user interaction history with a particular contact. | 09-22-2011 |
20110231409 | SYSTEM AND METHOD FOR PREDICTING MEETING SUBJECTS, LOGISTICS, AND RESOURCES - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user. | 09-22-2011 |
20110231773 | SYSTEM AND METHOD FOR PROVIDING JUST-IN-TIME RESOURCES BASED ON CONTEXT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing just-in-time resources based on context. A system configured to practice the method identifies a communication event associated with a user and a current context associated with the communication event and the user, and identifies a stored context that corresponds to the current context, wherein the stored context includes at least one resource. The system then retrieves the at least one resource and presents the at least one resource to the user. In another method for storing a current context, the system identifies a current communication context, identifies resources associated with the current communication context, indexes the current communication content and resources to enable searchability, and stores, as a stored context in a database, the current communication context and the resources associated with the current communication context. | 09-22-2011 |
20110235631 | METHOD AND APPARATUS FOR AUTOMATIC VERIFICATION OF TELEPHONE NUMBER MAPPING - The present disclosure provides mechanisms for verification of mapping from one type of network address to another type of network address based on delivery of a one-time key over one type of the network and confirmation of its receipt over another type of network. A particular example of such mapping is mapping from a telephone number used in the PSTN or the like to a VoIP address such as a SIP URI. The mapping verification mechanisms can be provided without dependence on the records of past calls, manual calling, or the line information database in the PSTN system. Accordingly, a highly secure and efficient mapping verification mechanism is realized. | 09-29-2011 |
20120079099 | SYSTEM AND METHOD FOR A CONTEXT-BASED RICH COMMUNICATION LOG - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a context-based rich communication log. A system configured to practice the method performs a context-based analysis of a history of communication sessions over at least two communication modalities, wherein the context-based analysis considers semantic meaning, temporal relationship, and user activities. The system generates associations between the communication sessions based on the context-based analysis, and generates the context-based rich communication log based on the associations. The context-based analysis can be based on time, session participant identifications, ongoing events, and/or on-demand queries of the communication sessions. The system can then present the context-based rich communication log to a user. The context-based rich communication log can be used as part of at least one of a predictive contacts application, a topic analyzer, a conferencing application, and a personal communication assistant, for example. | 03-29-2012 |
20120166179 | SYSTEM AND METHOD FOR CLASSIFYING COMMUNICATIONS THAT HAVE LOW LEXICAL CONTENT AND/OR HIGH CONTEXTUAL CONTENT INTO GROUPS USING TOPICS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for identifying document topics. A system configured to practice the method receives a document from a corpus of documents, learns interpersonal relationships of users associated with the document, performs a lexical analysis of the document, and, based on the interpersonal relationships of the users and the lexical analysis, identifying a topic for the document. The approaches disclosed herein can integrate user-people relationships to identify topics for documents with low lexical or high contextual content. The system can learn this user-people relationship from context. The system uses this learned behavior to identify communication documents correctly. Another aspect is the separation of the two phases. The system overlays the learned model on the lexical topic analysis, allowing the system to capture user-defined topics and user behavior that is learned from other factors such as medium (calls, events, etc) or user preferences. | 06-28-2012 |
20130024577 | SYSTEM AND METHOD FOR ESTABLISHING A RELATIONSHIP BASED ON A PRIOR ASSOCIATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for automatically establishing trusted relationships between users across organizational boundaries. A user makes a request to his system to create a trusted relationship with an individual of another organization. The system then analyzes the previous communication history between the user and the other individual, and, based on that analysis, sends a query to the other individual's system. The system then receives a response from the other individual's system, and if the response matches an expected response the system forms a trusted relationship between the user and the other individual. | 01-24-2013 |
20130031243 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR SELF-LEARNING INTERACTIVE COMMUNICATIONS PRIVILEGES FOR GOVERNING INTERACTIVE COMMUNICATIONS WITH ENTITIES OUTSIDE A DOMAIN - Methods, systems, and computer-readable media for self-learning interactive communications privileges for governing interactive communications with entities outside a domain are disclosed. The interactive communications privileges can be used to process interactive communications requests between entities inside and outside a domain. The requested interactive communications are allowed if the interactive communications privileges configured for the entity outside the domain allow for the requested interactive communications. The interactive communications privileges are determined in an automated, self-learning manner in response to monitoring communication interactions between the entities inside and outside the domain. In this manner, the interactive communications privileges are not required to be provisioned and maintained by an administrator. The interactive communications privileges can be determined by gathering insight about the entities outside the domain. Insight about an entity outside the domain is information that is useful in determining which interactive communications privileges to configure for an entity outside the domain. | 01-31-2013 |
20130304924 | System and Method for Predicting Meeting Subjects, Logistics, and Resources - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user. | 11-14-2013 |
20140122880 | System and Method for Facilitating Communications Based on Trusted Relationships - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for facilitating communications based on a trusted relationships. A system configured to practice the method first receives a communication request from a second communication device for a specific resource, wherein the communication request is based, at least in part, on trust information generated by a previously established trusted relationship. The system confirms, via an access to a trust database and using the trust information, (1) an identity of a sender of the communication request and (2) access permissions for a requested resource. Then, if the identity and the access permissions are confirmed, the system establishes communications between the first communications device and the second communications device in response to the communication request according to the specific resource. The trust information can include a trust user ID and a trust key. | 05-01-2014 |