Patent application number | Description | Published |
20080275701 | SYSTEM AND METHOD FOR RETRIEVING DATA BASED ON TOPICS OF CONVERSATION - A method includes performing computerized monitoring with a computer of at least one side of a telephone conversation, which includes spoken words, between a first person and a second person, automatically identifying at least one topic of the conversation, automatically performing a search for information related to the at least one topic, and outputting a result of the search. Also a system for performing the method. | 11-06-2008 |
20080276241 | DISTRIBUTED PRIORITY QUEUE THAT MAINTAINS ITEM LOCALITY - A method of administering a distributed priority queue structure that includes removing a highest priority item from a current root node of a tree structure to create a temporary root node, determining for each subtree connected to the temporary root node a subtree priority comprising the priority of the highest priority data item in the each subtree, determining as the highest priority subtree connected to the temporary root node the subtree connected to the temporary root node having the highest subtree priority, determining whether any of the one or more data items stored at the temporary root node has a higher priority than the highest subtree priority and directing an arrow to the subtree having the highest priority or to the temporary root itself if the priority of the data items stored at temporary root is higher than the priorities of the connected subtrees. | 11-06-2008 |
20100182938 | Feature Interaction Detection in Multi-Party Calls and Calls With Bridged Appearances - A method is disclosed for detecting feature interactions in multi-party calls (i.e., calls involving more than two endpoints), and in calls with bridged appearances. In accordance with the illustrative embodiment, a set of rules is applied to the specifications of two features in order to detect interactions between the features. The rules specify conditions for, or relationships among, the original connections for the features, the resulting connections for the features, the triggering party for the features, and the originating and terminating parties of connections. A rule is considered matched for a multi-party call when any of the original and resulting connections for the call match the conditions of the rule. Similarly, a rule is considered matched for a call with one or more bridged appearances when any of the original and resulting connections for the call, including those of bridged appearances, match the conditions of the rule. | 07-22-2010 |
20100182996 | Feature Interaction Detection During Calls With Multiple-Leg Signaling Paths - Methods are disclosed for detecting feature interactions during a call that has a signaling path comprising two or more legs. In accordance with the illustrative embodiment, feature state information is maintained for each of the legs of the call and is propagated along the signaling path. The illustrative embodiment is capable of detecting interactions between features in different legs of a call, as well as interactions between features in the same leg of a call. Moreover, the illustrative embodiment is capable of accommodating a variety of feature resolution techniques. In one illustrative embodiment specific to Voice over Internet Protocol (VoIP) telephony, a Back-to-Back User Agent (B2BUA) stores and propagates the feature state information, and performs address mapping for two specially-defined headers in addition to the usual Session Initiation Protocol (SIP) headers. | 07-22-2010 |
20100183135 | Mid-Call Detection And Resolution Of Feature Interactions - Techniques for detecting and resolving feature interactions during calls are disclosed. In particular, a finite-state machine and a corresponding method detect when a feature that is invoked during a call would interact with another previously-activated feature, and ensure that both features are not active simultaneously. Three different techniques for resolution are disclosed: in one technique, activation of the latter feature is always refused; in a second technique, the former feature is always deactivated and the latter feature is then activated; and in a third technique, one of the two features is selected to be the active feature—perhaps based on priorities assigned to the features—and the features are activated and/or deactivated accordingly. | 07-22-2010 |
20100329140 | Interaction Detection Between Web-Enabled and Call-Related Features - A method is provided for detecting interactions between call-related and web-enabled features. In some embodiments, communication application components are configured to transmit an indication to a feature interaction detector every time a feature is invoked by the user. When the interaction detector receives an indication that a feature is being invoked, it compares the invoked feature against features that have previously been invoked (or executed) and determines whether the invoked feature interacts with any of the features that have been previously executed. | 12-30-2010 |
20110228922 | SYSTEM AND METHOD FOR JOINING CONFERENCE CALLS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for scheduling an event to automatically join a user to a conference call. In one aspect, the method includes receiving an invitation for a user to join a conference call, extracting from the invitation a scheduled conference call time, conference call address information, conference call authentication information, and a conference call modality, and scheduling an event to join the user to the conference call via the conference call modality at the scheduled conference call time based on the conference call address information and the conference call authentication information. In another aspect, the system retrieves a scheduled event at a scheduled time, extracts the address, authentication, and modality information for the conference, and joins the user to the conference automatically at the scheduled time. | 09-22-2011 |
20110231396 | SYSTEM AND METHOD FOR PROVIDING PREDICTIVE CONTACTS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing predictive contacts. A system configured to practice the method first analyzes a communication history and a current usage context of a user. Based on the analysis, the system ranks contacts that the user is likely to communicate with from a list of contacts to yield ranked contacts. The system identifies a respective motive for ranking each contact, and presents a predictive list of contacts based at least in part on the ranked contacts, wherein each ranked contact in the predictive list of contacts includes at least part of the respective motive. The system can update the predictive list of contacts in real time as the current usage context changes. The communication history can include, for example, emails, instant messages, phone calls, video conferences, and calendar events. The motive can include a user interaction history with a particular contact. | 09-22-2011 |
20110231409 | SYSTEM AND METHOD FOR PREDICTING MEETING SUBJECTS, LOGISTICS, AND RESOURCES - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user. | 09-22-2011 |
20110231773 | SYSTEM AND METHOD FOR PROVIDING JUST-IN-TIME RESOURCES BASED ON CONTEXT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing just-in-time resources based on context. A system configured to practice the method identifies a communication event associated with a user and a current context associated with the communication event and the user, and identifies a stored context that corresponds to the current context, wherein the stored context includes at least one resource. The system then retrieves the at least one resource and presents the at least one resource to the user. In another method for storing a current context, the system identifies a current communication context, identifies resources associated with the current communication context, indexes the current communication content and resources to enable searchability, and stores, as a stored context in a database, the current communication context and the resources associated with the current communication context. | 09-22-2011 |
20120079099 | SYSTEM AND METHOD FOR A CONTEXT-BASED RICH COMMUNICATION LOG - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a context-based rich communication log. A system configured to practice the method performs a context-based analysis of a history of communication sessions over at least two communication modalities, wherein the context-based analysis considers semantic meaning, temporal relationship, and user activities. The system generates associations between the communication sessions based on the context-based analysis, and generates the context-based rich communication log based on the associations. The context-based analysis can be based on time, session participant identifications, ongoing events, and/or on-demand queries of the communication sessions. The system can then present the context-based rich communication log to a user. The context-based rich communication log can be used as part of at least one of a predictive contacts application, a topic analyzer, a conferencing application, and a personal communication assistant, for example. | 03-29-2012 |
20120166179 | SYSTEM AND METHOD FOR CLASSIFYING COMMUNICATIONS THAT HAVE LOW LEXICAL CONTENT AND/OR HIGH CONTEXTUAL CONTENT INTO GROUPS USING TOPICS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for identifying document topics. A system configured to practice the method receives a document from a corpus of documents, learns interpersonal relationships of users associated with the document, performs a lexical analysis of the document, and, based on the interpersonal relationships of the users and the lexical analysis, identifying a topic for the document. The approaches disclosed herein can integrate user-people relationships to identify topics for documents with low lexical or high contextual content. The system can learn this user-people relationship from context. The system uses this learned behavior to identify communication documents correctly. Another aspect is the separation of the two phases. The system overlays the learned model on the lexical topic analysis, allowing the system to capture user-defined topics and user behavior that is learned from other factors such as medium (calls, events, etc) or user preferences. | 06-28-2012 |
20130144682 | SYSTEM AND METHOD FOR ENHANCING COMMUNICATION SERVICES BASED ON USER BEHAVIOR AND RELATIVE TRENDING PATTERNS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for enhancing communication services based on relative trending. A system configured to practice the method identifies, from a set of historical communication data associated with a user, relative trending data. Based on the relative trending data, the system identifies a plurality of communication periods within the historical communication data. For a time series associated with one of the communication periods, the system identifies a relative trending pattern in the relative trending data, and performs an action based on a comparison of current communication data to the relative trending pattern for a respective communication period. The communication period can be a fixed, recurring duration of time. The relative trending data is typically associated with at least one variable, which may be, for example, a second user. The system can identify and use trend peaks, patterns, and confidence levels in this approach. | 06-06-2013 |
20130218993 | CONTEXTUAL PRESENCE IN COLLABORATIVE SYSTEMS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for ‘broadcasting’ presence notifications either directly or through complex user-driven systems by replacing the rule-driven approach or the subscription approach with an presence arrangement that is based on context, otherwise known as contextual presence. When a user publishes his or her presence information, either one state or as a set of states, a contextual presence system notifies only those users whose interactions are either expected or do not cause interruptions to users' work. Other than publishing their current presence state or states, contextual presence does not require any configuring or managing from the user and is dynamic both in terms of the changing set of people it notifies and in relation with time. | 08-22-2013 |
20130304924 | System and Method for Predicting Meeting Subjects, Logistics, and Resources - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user. | 11-14-2013 |
20140188991 | SYSTEM AND METHOD FOR AUTHORIZING THIRD PARTY PROFILE DATA SHARING - Disclosed herein are systems, methods, and computer-readable storage media for authorizing third-party profile data sharing. The system receives a request to a request to share profile data held by a first person with a second person, wherein the profile data is of a third person. The system then generates a common context value based on an association between at least two of the first person, the second person, and the third person, wherein the common context value indicates how strongly the third person is connected to the first person and/or the second person. When the common context value is above a threshold, the system permits the first person to share the profile data of the third person with the second person. | 07-03-2014 |
20150088784 | SYSTEM AND METHOD OF MESSAGE THREAD MANAGEMENT - Disclosed herein are systems, methods, and computer-readable storage device for managing message threads. An example system configured to practice this method can first identify a usage pattern of a user interacting with a message thread. Next, based on that usage pattern, the system can analyze messages in the message thread to identify a high-priority message. Then the system highlights the high-priority message when the system renders the message thread on a display. The messages can be email messages, text messages, instant messages, etc. The system can further associate the high-priority message with a repository, and grant a repository user, access to the high-priority message. | 03-26-2015 |