US20040230689A1 - Multi-access mode electronic personal assistant - Google Patents

Multi-access mode electronic personal assistant Download PDF

Info

Publication number
US20040230689A1
US20040230689A1 US10/875,914 US87591404A US2004230689A1 US 20040230689 A1 US20040230689 A1 US 20040230689A1 US 87591404 A US87591404 A US 87591404A US 2004230689 A1 US2004230689 A1 US 2004230689A1
Authority
US
United States
Prior art keywords
application
voice
terminal
message
user interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/875,914
Inventor
Shawn Loveland
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US10/875,914 priority Critical patent/US20040230689A1/en
Publication of US20040230689A1 publication Critical patent/US20040230689A1/en
Priority to US12/144,626 priority patent/US8406399B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1023Media gateways
    • H04L65/1026Media gateways at the edge
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9577Optimising the visualization of content, e.g. distillation of HTML documents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1033Signalling gateways
    • H04L65/1036Signalling gateways at the edge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • the present invention generally relates to the area of networks for providing telephony and data resources and more particularly to methods and mechanisms for providing access to networked resources via either voice or electronic data communications.
  • a local area network handles data communications
  • a private branch exchange (PBX) system handles voice communications.
  • the local area network provides access by users to file and computer applications/servers thereby enabling a user to carry out computer applications on a computer from a remote location.
  • the PBX system enables users to retrieve and respond to voice messages left for the users on the PBX voice mail system.
  • the PBX also enables a remote user to call multiple persons served by the PBX with a single call.
  • the businesses also include two separate and distinct sets of physical communications lines to their places of business.
  • a first set of lines provide communication links between a public switched telephone network (PSTN) and a private branch exchange (PBX) system including phones and other telephony.
  • PSTN public switched telephone network
  • PBX private branch exchange
  • a set of PSTN lines terminate at a business site at a PBX connected to a business' internal phone lines.
  • a second set of lines provide links between external data networks and internal local area networks (LANs) for the businesses. Examples of such lines are T 1 , E 1 , ISDN, PRI, and BRI.
  • Convergence presents the opportunity for the creation of applications including communication interfaces that not only support computer-generated commands, but also voice commands from a remote user. It also presents the opportunity to enhance the variety and flexibility of uses for PBX systems.
  • Voice interfaces present the opportunity for users to connect to a network from virtually any location.
  • security mechanisms for restricted access systems accessed via telephone typically rely upon users to enter a number on a touch-tone phone to limit access.
  • this method is highly susceptible to eavesdropping.
  • the users are often required to enter a long sequence of numbers that can easily be forgotten.
  • a voice-controlled computer system will require speech recognition functionality. Speech recognition programs and associated “training” databases (used to train the software to recognize voice commands from a user) do not guarantee that another user's speech will not invoke protected operations on the computer system. Thus, if the computer system is to be secure, then additional speaker recognition/authentication procedures must be included in the system.
  • One solution to the well known “electronically-recorded” password scheme is to request the user to utter the password multiple times.
  • the multiple utterances in addition to being compared to the digitally stored vocal password at the computer system site, are compared to one another to ensure that the utterances are sufficiently different from one another to ensure that a recording of the password is not being replayed multiple times by an imposter seeking to gain remote access to protected computer resources.
  • the imposter can circumvent this safeguard by making multiple recordings of the password spoken multiple times by an authorized user.
  • copies of a single original spoken password can be altered and then stored to create variations from the original.
  • a converged wide-area network interface to a computer system
  • Voice-based computer access is one such effort to exploit converged technology.
  • a user may access computer resources via voice commands rather than issuing commands by means of a remote computer (e.g., a laptop computer).
  • the user may access a number of applications integrated into the converged local network including databases, file servers, Interactive Voice Response (IVR) servers, call centers, voice mail, PBX hubs/endnodes, and conference bridges.
  • IVR Interactive Voice Response
  • conference bridges are generally implemented today in two ways. One way is to purchase a Conference Bridge with certain capacity. It is then used as a fixed resource like a physical conference room. If a conference bridge has 24 ports it can support one 24-user conference call. It could also support three eight-port conference calls.
  • Extending the size of a conference via external conference bridging is a challenge to coordinators of a conference.
  • a second conference phone number has to be forwarded to each of the participants who is to be bridged into the conference via the external bridge.
  • the external conference bridge calls in to the internal conference bridge.
  • callers could call a number that is received by the PBX handling the conference which in turn forwards the call to an external conference bridge.
  • each forwarded call uses two trunks in the PBX system.
  • a bureau is a service that supplies an external conference bridge (and number to call into the bridge).
  • the bureau typically charges a customer based upon the number of users and the duration of the use of the bridge (e.g., per user-minute).
  • External bridges allow for more dynamic meetings however the cost for utilizing external bridges on a regular basis is substantial.
  • an electronic personal assistant incorporates generalizing/abstracting communications channels, data and resources provided through a converged computer/telephony system interface such that the data and resources are readily accessed by a variety of interface formats including a voice interface or data interface.
  • a set of applications provide dual interfaces for rendering services and data based upon the manner in which a user accesses the data.
  • An electronic personal assistant in accordance with an embodiment of the invention provides voice/data access to web pages, email, file shares, etc.
  • the electronic personal assistant enables a user to transmit voice commands to a voice-based resource server to provide information accessible to the resource server.
  • a user is authenticated by receiving vocal responses by a user to one or more requests variably selected and issued by a speaker recognition-based authentication facility—thereby ensuring that every time a user logs into the network there is a unique challenge response to gain access to the network resources.
  • a spoken response is compared to one or more stored voice samples previously provided by the user during an enrollment procedure. If the spoken response is sufficiently close to the one or more stored voice samples, then the user is authenticated as a domain user or logged onto the local system.
  • the voice-based authentication facility enables a user to log in to a computer without the aid of a keyboard, smart card or such. This would work in a kiosk environment. Thereafter, an application proxy is created. The application proxy acts on behalf of the authenticated authorized user.
  • a set of remotely accessed voice applications are provided.
  • One such application comprises a personal interactive multimedia response (IMR).
  • IMR personal interactive multimedia response
  • Each user configures a personal IMR system.
  • the user is provided access to the IMR through a personal computer interface, web interface, instant message, e-mail, as well as a voice user interface over a telephone connection.
  • a configurable distributed conference bridge is another potential application incorporated within the converged network architecture model of the present invention.
  • the distributed conference bridge enables local conference resources to be utilized and incorporates external service bureau conference bridge resources when needed to supplement the internal conference bridge resources of a system. This may or may not require any user intervention to create the bridged conference bridge.
  • the dynamically configurable extensible conference bridge application supports standard voice conference calls, multimedia conference calls, and blended conference calls. As a consequence a customer need not provision in-house conference bridge resources, switch resources, or trunks for a worst case scenario and the conference bridge may be used on a more ad hock basis since it can dynamically grow to meet the demands of the conference.
  • the conference bridge application in addition to manual call set-up with regard to the overflow connections to the external bridge, supports automatic redirecting head end conference phone numbers utilizing remote call forward, QSIG, PINT, and/or in-band signaling.
  • FIG. 1 is a block diagram schematically depicting an exemplary computer system for incorporating the terminal abstraction architecture and carrying out the electronic personal assistant and voice print operations in accordance with a preferred embodiment of the present invention
  • FIG. 2 is a schematic drawing depicting an exemplary network environment, including a converged network supporting both voice and data communications over a same network interface, into which the present invention may be incorporated;
  • FIG. 3 is a schematic drawing of an exemplary interface between a public and a private network for implementing an embodiment of the present invention
  • FIG. 4 is a diagram identifying a set of voice-based applications supported on a private network in accordance with an embodiment of the present invention
  • FIG. 5 is a block diagram depicting the components of a personal interactive multimedia application
  • FIG. 6 is a flowchart summarizing the steps of a personal IMR application
  • FIG. 7 is a schematic diagram depicting components within a converged computer system for facilitating voice-based authentication of a user
  • FIG. 8 summarizes the steps performed by an interface server/controller in accordance with a voice print application to determine whether to grant access to network resources to which access is selectively provided to authenticated authorized users;
  • FIG. 9 is a schematic depiction of a distributed conference bridge.
  • FIG. 10 is a flowchart summarizing the steps performed to create a distributed conference bridge.
  • the system includes a general purpose computer in the form of a conventional computer 20 , including a processing unit 21 , a system memory 22 , and a system bus 23 that couples various system components including the system memory to the processing unit 21 .
  • the system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the system memory may include read only memory (ROM) 24 and random access memory (RAM) 25 .
  • a basic input/output system (BIOS) 26 containing the basic routines that help to transfer information between elements within the computer 20 , such as during start-up, may be stored in the ROM 24 .
  • the computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk 60 , a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29 , and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
  • the hard disk drive 27 , magnetic disk drive 28 , and optical disk drive 30 may be connected to the system bus 23 by a hard disk drive interface 32 , a magnetic disk drive interface 33 , and an optical disk drive interface 34 , respectively.
  • the drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, programs and other data for the computer 20 .
  • exemplary environment described herein employs a hard disk 60 , a removable magnetic disk 29 , and a removable optical disk 31 , it will be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories, read only memories, and the like may also be used in the exemplary operating environment.
  • a number of programs may be stored on the hard disk 60 , magnetic disk 29 , optical disk 31 , ROM 24 or RAM 25 , including an operating system 35 , one or more applications programs 36 , other programs 37 , and program data 38 .
  • a user may enter commands and information into the computer 20 through input devices such as a keyboard 40 , which is typically connected to the computer 20 via a keyboard controller 62 , and a pointing device, such as a mouse 42 .
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
  • Input devices as well as peripheral devices may be connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, a parallel port, game port, universal serial bus (USB), 1394 bus, or other interfaces.
  • a monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48 .
  • computers typically include other devices not shown, such as speakers and printers.
  • the computer 20 operates in a networked environment using logical connections to one or more devices within a network 63 , including by way of example personal computers, servers, routers, network PCs, a peer device or other common network node. These devices typically include many or all of the elements described above relative to the computer 20 .
  • the logical connections depicted in FIGS. 1 and 2 include one or more network links 51 , for which there are many possible implementations, including local area network (LAN) links and wide area network (WAN) links. Such networking links are commonplace in offices, enterprise-wide computer networks, intranets and the Internet. It will be appreciated that the network connections shown are exemplary and other means of establishing a data path between the computers may be used.
  • the computer 20 When used in a LAN, the computer 20 may be connected to the network 63 through a network interface or adapter 53 .
  • the computer 20 When used in a WAN, the computer 20 typically includes a modem 54 or other means for establishing communications over the network link 51 , as shown by the dashed line in FIG. 1.
  • the network link 51 may also be created over public networks, using technologies such as dial-up networking, the Internet, Digital Subscriber Line (DSL), Asynchronous Transfer Mode (ATM), Virtual Private Network (VPN) or any other conventional communication method.
  • the modem 54 may be connected to the system bus 23 via the serial port interface 46 , and may be external or internal. In a networked environment, programs depicted relative to the computer 20 , or portions thereof, may be stored on other devices within the network 63 .
  • FIG. 2 a schematic diagram depicts components of an exemplary communications network environment for incorporating an architecture wherein multiple types of user interfaces, including voice and graphical, are supported for individual applications and other computer resources residing on a networked system. Support for multiple types of user interfaces is provided by a terminal abstraction interposed between remote terminals having various user interfaces and individual applications and other computer resources on the networked system.
  • the terminal abstraction comprising a set of modules corresponding to user interface types, enables similar functionality to be provided by applications and resources to an extensible set of end-devices having differing user interfaces connected via a wide area network (WAN) 110 including by way of example any one or more of a set of linking networks such as a public switched telephone network (PSTN), integrated services data network (ISDN), T 1 , etc.
  • PSTN public switched telephone network
  • ISDN integrated services data network
  • T 1 a set of linking networks
  • the converged computing/communications environment depicted in FIG. 2 includes a local network 112 .
  • PSTN voice, IP voice, e-mail, instant messaging, video, fax, IP Fax, and data calls are blended together and passed through one routing/rules engine within a network interface/server 114 .
  • a converged communications link 116 connects the network interface/server 114 to the WAN 110 .
  • the converged communications link 116 supports both voice and data communications between the local network 112 and the WAN 110 . While only a single link 116 is shown in FIG. 2 for the network interface/server 114 , the network interface/server 114 also includes standard telephony interfaces which the network interface/server 114 utilizes to communicate over the PSTN via ordinary phone trunk lines.
  • the WAN 110 in turn provides wide area links to a variety of connected end-devices including, by way of example, a local area network 120 , a public telephone 122 , a facsimile machine, an Internet telephone 124 , and a personal computer 126 .
  • the network interface/server 114 passes packets of information for voice phone conversations, voice mail, email, internet phone, video phone, fax, remote data access, remote service access, etc.
  • data and voice calls are directed to a terminal abstraction that communicates with the application according to an end-device independent format. Communications between the terminal abstraction and the application are not distinguished by the mode of access by an end-device to the application.
  • a link 128 connects the network interface/server 114 to an Ethernet link 128 of a local computer network including a set of computing devices 130 .
  • the computing devices 130 comprise, for example, personal computers, servers, client terminals and workstations.
  • FIG. 2 explicitly shows two such servers, i.e., an email server 132 and a database server 134 .
  • the network interface/server 114 is also coupled to a voice mail system 135 and includes a link to the Internet 136 . While not shown in FIG. 1, those skilled in the art will appreciate that the network interface/server 114 is physically coupled to links 116 and 128 via network interfaces including hardware and software adapted to transmit and receive data in accordance with the communications protocol for the associated links 116 and 128 .
  • the network interface/server 114 acts as a PBX hub and supports connections to a set of telephony equipment including telephones 137 , facsimile machines, etc. via a variety of link types including, ordinary telephone lines, Ethernet, ATM, or even a wireless communication link.
  • the network architecture of the local network 112 is merely exemplary. While the PBX functionality is built into the network server/interface 114 in the present example, a separate PBX hub may be located external to the network server/interface 114 .
  • the actual hardware configuration of a network or system embodying the present invention will be based upon choices of system hardware providers and the customers that utilize systems embodying the present invention.
  • a terminal abstraction a software entity, is interposed between an application and an end-terminal device that is communicating with the application.
  • the local area network 120 connected to the WAN 110 via link 138 includes network components similar to those of the first private network 112 .
  • Link 138 is connected to a computer network data interface/server 142 .
  • the link 138 between the WAN 110 and the computer network data interface/server 142 supports only data calls (i.e., voice telephone calls are not supported).
  • the network interface/server 142 may comprise multiple physical lines including multiple phone trunk lines to communicate over the PSTN.
  • An Ethernet link 140 connects the computer network data interface/server 142 to computing equipment 144 .
  • Computer network data interface/server 142 is connected via link 146 to telephony equipment 148 (including a PBX hub and telephones). Since the link 138 does not support voice calls, a trunk line 150 connects the PBX of the telephony equipment 148 to the public switched transmission network of the WAN 110 .
  • the PBX hub of the telephony equipment 148 includes functionality enabling applications within the local area network 120 to interface with voice-based end devices via link 146 .
  • the links 116 and 138 are circuit switched. In other words, any particular connection supported by the links 116 and 138 is assigned a channel or channels (or a range of bandwidth) from a set of available channels (or bandwidth ranges). However, in alternative embodiments of the present invention, connections via links 118 and 138 are identified within transmitted packets rather than assigning a particular channel. Thus the local networks 112 and 120 may incorporate either circuit or packet switching.
  • FIG. 2 depicts an exemplary network configuration; however, those skilled in the art will readily appreciate from the disclosure herein that a multitude of network configurations incorporating the present invention are possible.
  • convergence of data and voice communications expands the possibilities for potential networks that are not confined by the type of end devices (e.g., phone, computer, fax machine, instant messaging) connected to the network or even a same link on a network—such as both voice and data nodes on a single Ethernet link.
  • Text to speech (TTS) and speech to text (STT) converters play an important role in systems incorporating both voice and electronic (e.g., networked computer) modes of user access to applications incorporating the terminal abstraction architecture.
  • User interaction, via audible commands and responses, with a variety of applications (e.g., databases) is rendered by TTS and STT converters within or coupled to the network interface/server 114 .
  • the TTS converter enables applications executing within the local area network 112 to transmit human understandable speech signals to a phone receiver used by a remote user thereby enabling the applications to communicate information to the remote users via audible sounds.
  • the STT converter employing speech recognition technology, enables a user to issue vocal commands and provide information by speaking commands into the receiver of a phone or through a voice command interface of a multimedia personal computer or a host-based server supporting various numbers of users simultaneously.
  • the TTS and STT converters enable a user to communicate with the resources of the local area network 112 even if the user does not have a computer to receive and interpret a digitally encoded message. Alternatively, the user may submit commands via touch tone signals.
  • a network interface need not be converged to support both vocal and electronic data commands from a remote user.
  • a network interface is non-converged and a user accesses resources within a data network via voice and/or touch-tone commands by means of the TTS converter and the STT converter.
  • a number of individually identified network entities depicted in FIG. 2 can be incorporated into a single hardware component.
  • a private branch exchange, database, and special purpose servers e.g., email, voicemail, etc.
  • the processor could handle the aggregate processing load without degrading the expected level of performance of the network interface/server 114 .
  • system hardware and software can be owned and managed in a variety of manners.
  • the entire system can be customer owned and managed, customer owned and managed by third parties, owned and managed by a third party offering IP Centrex services, or an ISP offering the service(s) in conjunction with an IP Centrex company.
  • FIG. 3 schematically depicts functional components of an exemplary computer network data interface/server (i.e., communications server), such as network interface/server 114 embodying the present invention.
  • the network interface/server 114 is physically coupled to links 116 and 128 via network interfaces 160 and 162 .
  • the hardware and software in network interfaces 160 and 162 conform to the protocols of corresponding links 116 and 128 .
  • the network interfaces 160 and 162 comprise multiple replicas of individual network cards to support multiple lines, such as telephone system trunk lines connecting the network interface/server 114 to the PSTN.
  • Other interfaces that have not been depicted in FIG. 2, support the connection of phone lines for the local phones 137 to the PBX system within the network interface/server 114 .
  • Each of the network interfaces 160 and 162 is communicatively coupled, via software and/or hardware links 172 and 174 respectively, to a multipurpose driver 170 supporting both data and telephony connections.
  • Data calls are calls that do not communicate via audible speech commands. Voice calls involve spoken commands and information.
  • Data calls include, by way of example, Internet multimedia, video, Fax, IP telephony, e-mail, web forms, and web events.
  • the multipurpose driver 170 utilizes unique identification information to distinguish between voice calls and data calls and route the calls accordingly to higher level programs and processes.
  • Voice call connection requests are routed by the multipurpose driver 170 to a telephony device object 180 .
  • the telephony device object 180 passes the requests to call control application program interfaces (APIs) 182 .
  • the call control APIs 182 pass the requests to higher level processes in the user level of the network interface/server 114 to perform application-specific operations. More particularly,.the requests submitted via a voice call connection are passed by the call control APIs 182 to a voice call applications server 186 .
  • the voice call applications server 186 determines the nature of the request and invokes a particular application from a set of applications 188 registered with the voice applications server 186 .
  • one or more of the set of applications 188 support multiple modes of access via various terminal types.
  • the support of multiple terminal types is facilitated by a terminal abstraction comprising interface models defining a variety of user interfaces for a variety of distinct modes of accessing corresponding applications.
  • the applications are able to present their functionality (e.g., a schedule planner, email, a database, etc.) to connected users via a number of distinct modes of access.
  • the different modes of access result from the use of unconventional end-terminal types (i.e., other than personal computers) to communicate with the applications and request the resources provided by the applications.
  • Such unconventional end-terminal types include, by way of example, a cellular phone (including potentially a graphical or text interface), a palm-sized computer, computer appliance, and an ordinary telephone.
  • a typical user interface cannot be supported by the end-terminal due to computational power limitations as well as, in some instances the absence of any visual display.
  • Terminal abstraction modules are discussed in greater detail herein below with reference to FIG. 5, a schematic depiction of a particular example of an application (an interactive multimedia response system) that incorporates the terminal abstraction architecture for supporting multiple modes of access.
  • the terminal abstraction conceptually an interface layer between functional components of an application and user terminals, can be either tightly integrated with a particular application or be provided as a generic/universal entity with a defined interface to which applications make calls during the course of execution of the applications.
  • the terminal abstractions are a part of specific applications.
  • the terminal abstraction is at least partially carried out by system-level functions having standard interface definitions thereby significantly reducing the size and complexity of the applications that utilize them and thus reducing the programming effort involved in developing applications supporting multiple modes of access.
  • the applications 188 pass requests to the voice applications server 186 .
  • the voice applications server 186 reformulates the request if necessary and passes the reformed request in the form of a system request to an NT Interface 184 .
  • the NT Interface 184 passes commands to the call control APIs 182 which pass the requests, in the form of system commands, to the WINDOWS NT operating system (or a suitable alternative operating system). Examples of system commands used to support the voice applications include lineAddProvider, lineClose, lineDrop, lineGetID, and lineMakeCall. Those skilled in the art will readily appreciate that a number of other general system commands can used to support execution of the voice applications 188 in view of the disclosure herein.
  • Both data calls and voice calls are initially routed to a network device proxy 190 .
  • the network device proxy 190 routes the call to the call control APIs 182 including for example TAPI.
  • the call control APIs 182 including for example TAPI.
  • RAS remote access service
  • control of the remainder of the call session is directed to application-specific processes.
  • the call is directed to the telephony device driver 180 that, in turn, directs the call to a particular application in the manner described previously above.
  • the call is directed from the network device proxy 190 to a wide area network/network device interface 196 .
  • the WAN/network device interface 196 calls a transport layer driver 198 and thereafter executes the call by direct calls to the RAS manager 194 via path 199 .
  • the RAS manager 194 in turn accesses the applications 188 .
  • FIG. 4 a set of voice applications are identified from the applications 188 generally identified in FIG. 3.
  • the applications identified in FIG. 4, and others identified herein below, are provided collectively in the form of an electronic personal assistant that combines access to computer and telephony resources into a single extensible data and resource access system.
  • one or more of the applications provide at least a graphical user interface facilitating user access via personal computers and a voice user interface for access to the resources of the electronic personal assistant via ordinary telephones. It is noted that the list of applications identified in FIG. 4 and recited herein is not exhaustive, and thus those skilled in the art will readily appreciate that additional applications may be added to, and even ones of the recited applications removed from, the electronic personal assistant without departing from the present invention.
  • a voice print application 200 enables an authorized user to call into the network interface/server 114 (or in general a communications server) from any phone or other terminal device having a suitable voice signal transducer, including for example a personal computer having a microphone input, and be authenticated by properly responding to a set of authentication queries by the voice print application 200 .
  • the voice print application 200 utilizes a variable challenge/response scheme to confound imposters seeking to gain access using a recorded version of an authentic user's vocal response to a static query.
  • the challenge/response scheme embodied within the voice print application 200 described herein below in conjunction with FIGS. 7 and 8, comprises variably issuing one or more queries, from a set containing multiple potential challenges, to an authorized user to obtain a voice sample for authentication of the user during logon.
  • voice print application 200 is not limited to remote calls.
  • the voice print application 200 is intended for use at any terminal including a suitable voice transducer. Therefore, the voice print application 200 may also be used, by way of example to logon to a standalone computer or a local area network to gain access to restricted resources contained therein.
  • Users are preferably able to access the electronic personal assistant from a variety of end-terminal devices having different voice transducers, including ordinary telephones, cellular phones, wireless transmitters, and personal computer microphones.
  • the potential to access the electronic personal assistant from a variety of terminals and connections of varying quality presents the need to ensure that a user's vocal logon attempt is not rejected merely because a different voice transducer or bad connection created differences between a training sequence and a query response.
  • sufficiently robust voice match procedures known to those skilled in the art of voice-based user identity verification, are carried out during the comparison operation to reliably generate a positive match result when a proper user accesses the electronic personal assistant. Fail-safe authentication procedures for authentication provide fallback mechanisms for instances where a user's voice is improperly rejected due to changes in the user's voice because of a cold or a poor phone connection.
  • a personal IMR application 202 enables an authorized user to configure a customized interactive multimedia response system that is unique to the user's phone (or any other end-terminal suitable for receiving calls)
  • a “call” generally encompasses an event involving one entity (e.g., person) initiating contact with another entity (e.g., person) without regard to a particular mode of communication. Examples of various call types include: voice calls, e-mail, or instant messages executed using a variety of computers/appliances.
  • a single voice response system definition (a set of response rules) is applied to an ACD (automated call distributor) or to the company's head number to route voice telephone calls to specific numbers or a queue.
  • a database within the network interface/server 114 supports a distinct IMR configuration for each phone or other callable end-terminal in a PBX system (including converged networks).
  • Other callable end-terminals include by way of example IP phones and applications within networked computers.
  • the personal IMR application 202 receives communications, including phone calls and electronic messages (e.g., email), in a variety of formats and routes the communications to a variety of destinations according to a set of rules defined for the particular recipient of the communications.
  • a rules engine attempts to establish communication between the two users via the best method available. For example Person A calls Person B. Person B has set the find me status to out of the office. Person B's out-of-the-office device is a two-way pager capable of receiving pages, e-mail, and instant messages.
  • the IMR system attempts to determine the capabilities of Person A's terminal either through querying the device directly or asking the user interactively through an interactive voice response menu. For example if Person A's terminal (a phone) is a phone capable of sending instant messages, the IMR will establish an instant messaging (IM) session between the two users. If Person A's terminal is not capable of sending e-mail or an instant message, the IMR will allow Person A to send a numeric page to Person B.
  • IM instant messaging
  • the personal IMR application 202 incorporates access to databases tied to other applications.
  • One configurable feature is a “find me” function that determines a likely present location(s) of the call recipient by accessing information stored in a personal database file such as a personal planner or appointment calendar. Rather than route the call to ordinary voice mail (thus initiating a phone tag sequence), the call is redirected, if designated to do so by the recipient, to the likely present location or locations, simultaneously or serially, at which the call recipient can be reached (e.g., a cell phone number). The form of the forwarded call is not confined to a voice phone call. As will be demonstrated by an example below, the personal IMR application 202 also forwards calls to the recipient in the form of text messages.
  • the personal IMR application 202 is programmed to route a received instant message to a cell phone or a beeper that accepts text messages, two way pages, or instant messages.
  • the personal IMR determines, by referring to a user status variable and/or a set of configured rules for the recipient, that the intended recipient is likely on a particular cell phone that accepts text messages.
  • the IMR application issues a response to the sender of the instant message informing the sender that the recipient is out of the office.
  • the response further invites the sender to transmit a message to the recipient's cell phone with the following format: “cell phone: message”.
  • the personal IMR system also notifies the sender of any particular restrictions on messages to the cell phone.
  • the IMR application 202 may inform the sender that messages to the recipient's cell phone are limited to 125 characters, and that the recipient's receiving device cannot send replies.
  • the personal IMR stores a subsequently received text message in a personal message storage space for the recipient. After retrieving the message, the recipient may issue a response in the format of “Message: message”. In other words, a Message type designation followed by the message text.
  • the personal IMR application 202 provides a number of advantages over known interactive voice response systems. The potential modes of access to the IMR application 120 are expanded because the personal IMR application 202 supports both voice and electronic data access.
  • the breadth of potential responses is expanded to include electronic data message responses such as instant messaging and email in addition to the traditional voice mail and call forwarding capabilities of known PBXs.
  • the personal IMR application 202 accesses databases to determine the status of the recipient and select a proper response based upon applying the status information to a configured set of rules.
  • the personal IMR application 202 is defined for individual recipients, thereby enabling customized response schemes to be defined for each recipient.
  • a user browsing on a web page could cause a “call” to be placed in the sales queue by a personal IMR of the call recipient. When a sales agent becomes available they will place a “call” to the user.
  • the call may be in the form of email, instant message, a phone call, an Internet Protocol phone call, etc.
  • the structure of the personal IMR application 202 is discussed further herein below in conjunction with FIGS. 5 and 6.
  • a distributed conference bridge application 204 performs automatic set-up of a phone conference that may include either of both internal and external conference bridge hardware.
  • the participants in the phone conference are connected according to a conference call connection arrangement defined by a user.
  • a configuration editor interface the user specifies a threshold value, including zero, for the number of conference participants to be connected into the phone conference via an internal conference bridge (typically integrated into a PBX system).
  • a configuration editor component of the distributed conference bridge application 204 may incorporate the terminal abstraction architecture described herein above. Such a configuration editor supports user specification of distributed conference bridge parameter values via graphical and voice user interfaces.
  • the distributed conference bridge application 204 controls the set-up of the conference call connections. Under the direction of the distributed conference bridge application 204 , conference participants are connected to the internal conference bridge until the number of connections corresponds to the threshold value for internal conference bridge connections. Thereafter, the distributed conference bridge application 204 signals the central office controlling a first head end telephone number for the customer's conference bridge to redirect callers to a second head end telephone number corresponding to the external conference bridge.
  • the signal to redirect calls to the external conference bridge is provided in the form of PINT,QSIG, or in-band remote call forwarding, all of which are well known signals to those skilled in the art.
  • An advantage of the above described re-direction capability is the simplicity with which the distributed conference bridge, including both an internal (PBX integrated) conference bridge and an external conference bridge, is assembled. Only a single conference call need be identified to the participants. In the case where participants call in, all participants use a same call-in number. With regard to the participants that are connected to the external conference bridge after the internal bridge reaches its designated capacity, the participants are unaware that their call was redirected. There is no change in participants' procedure or a reduction of features from users that are connected to internal conference bridge.
  • One embodiment of a distributed conference bridge includes a conference call involving calls over ordinary phone lines such as for example PBX and PSTN lines.
  • the conference bridge connection operations and mechanisms described above are not limited to such networks. Rather they are also applicable to conference calls over virtually any public or private network.
  • incorporating the terminal abstraction architecture to the call connections enables the creation of a hybrid conference call arrangement including, for example callers connected through private phone networks, a PSTN and/or the Internet.
  • An instant messaging application 206 treats an instant message the same as a phone call.
  • the external interface and operation of instant messaging remains the same as known instant messaging services.
  • a user via the network interface/server 114 registers with an instant message server (e.g., MICROSOFT NETWORK).
  • an instant message server e.g., MICROSOFT NETWORK.
  • all messages are transformed into message abstractions that are treated equally, to the extent possible, regardless of the end-terminal that issued the message.
  • email, voicemail, instant messages, etc. can be accessed by a recipient by phone or computer interface.
  • the type of end-terminal is irrelevant to the instant messaging application 206 .
  • the terminal abstraction renders a generic message, and the rules engine applies a criterion for handling the generic message.
  • the call type is taken into account when routing. For example an instant message would never be routed to a telephone headset unless the text message has been converted to audible speech or the telephone was equipped with a text data display.
  • the instant message can be forwarded to voice mail, an instant message enabled destination phone, etc.
  • Instant messaging forwarding could use the IMR to forward the message or have it's own forwarding mechanism.
  • a Call Announcement application 208 provides both audible (PC chime or utilizing TTS speaks the callers name) and/or visual call announcements through a call recipient's personal computer.
  • the Call Announcement application 208 also enables the call recipient to issue commands to control acceptance or rerouting of a received call via graphical and/or voice user interface commands.
  • the Call Announcement application 208 receives caller identification information associated with an incoming call. Thereafter, the call announcement application 208 references a rules database to determine any particular customized announcement features to apply to the call.
  • An example of a customized announcement feature is immediate forwarding of calls to voice mail.
  • Another example, in an environment adopting the terminal abstraction architecture is converting a voice mail message to text and storing the message in email. The call announcement application 208 thereafter carries out the call announcement.
  • the set of applications 188 is extensible both horizontally (new independent applications) and vertically (leveraging existing voice/phone accessed applications). Thus, any number of additional voice applications may be added to the set of voice applications 188 .
  • a workgroup monitoring application enables authorized users to monitor the status of a workgroup member's phone line to determine the line status and other call information, including a caller identity and degree of importance of the call. Access to monitor a particular line is controlled through security. For example a secretary could monitor the phone of another employee for whom the secretary provides assistance. The secretary's workgroup monitoring application would likely not be allowed to monitor the phone of another employee for whom she provides no assistance.
  • the workgroup monitoring application includes voice access mode access to enable a workgroup member to monitor a line from out of the office at a public phone and issue a message (e.g., via urgent email dictated and sent via vocal commands from a phone) to a particular recipient to get off the phone to free the line for another important call.
  • voice activated dialing Intelligent Dial Tone
  • An Internet/intranet integration application responds to verbal commands while performing a voice-based task such as replaying email, accessing information from a central database, files on a network share, sending a document to a fax recipient, by launching a browser and retrieving and reading back (email or fax) information accessed via the voice commands.
  • Enhanced Contact Controls are yet another application that may exploit the terminal abstraction architecture presented herein.
  • Enhanced Contact Control enables scheduled tasks to be automatically activated, and a user is prompted to initiate a call via voice commands rendered directly to a phone integrated within the computer. The call can alternatively be initiated by a sequence of clicks and drag/drop acts by a user at the computer.
  • the Enhanced Contact Control application may also incorporate priority rules etc. when executing scheduled tasks.
  • VUI Personal Information Manager applications enable a user to access contact information from a remote location by vocal commands to databases maintained within the control of the network interface/server 114 and to take appropriate actions including dialing a client's telephone number that was retrieved by the PIM.
  • This application integrates a number of previously discussed features and applications supported by the electronic personal assistant including the voice print application 200 , TTS, STT, and the voice activated dialing application.
  • FIG. 5 an exemplary application program architecture is provided to illustrate the general functional parts of the terminal abstraction architecture facilitating multiple modes of access by users to applications and their associated resources through a communications server such as the network interface/server 114 .
  • the personal IMR application 202 provides user configured responses to callers that utilize a variety of access modes to contact a particular recipient.
  • a set of access modes 300 includes a public switched telephone network (PSTN) telephone 302 , an Internet Protocol (IP) telephone 304 , a videoconference phone 306 , a web form 308 via a personal computer and an instant message 310 via a personal computer.
  • PSTN public switched telephone network
  • IP Internet Protocol
  • the set of different access modes depicted in FIG. 5 is exemplary and thus there is no intention to limit the scope of the terminal abstraction to handling sessions involving the specifically identified access modes. Rather the set of modes is preferably extensible. Additional modes of access are incorporated into the terminal abstraction software of the application (or operating system) software.
  • the IMR application 202 comprises two functional components, a terminal abstraction component 320 and a rules engine component 330 .
  • the terminal abstraction component communicates, on behalf of the IMR application 202 , with the end terminals. Differences between modes of access are handled primarily by the terminal abstraction component 320 .
  • the terminal abstraction tailors functionality provided by the IMR application 202 (including the interface specification) to a specific mode of access. For example, the terminal abstraction component 320 tailors interaction with the PSTN telephone 302 and IP telephone 304 to voice user interface. In contrast, the terminal abstraction component 320 tailors interaction with the Web form 308 and Instant Message 310 modes of access to a text or graphical user interface.
  • the method of communication between the terminal abstraction component 320 and functional components of the IMR application 202 is the same without regard to the mode of access.
  • the functional components of the IMR application 202 are not directly exposed to, and need not consider, the particular one of the set of modes of access 300 to a call recipient.
  • the terminal abstraction component 320 tailors a generalized call response, formulated by a rules engine 330 , to a particular mode of access used to call the recipient.
  • the rules engine component 330 comprises a framework for applying a set of response rules applicable to all types of calls regardless of the mode of access to a particular recipient.
  • the rules engine component of the IMR application 208 applies a defined criterion to a set of status and data values pertaining to a particular call recipient.
  • the rules engine formulates a response.
  • the generalized response is then provided to the terminal abstraction. Because the terminal abstraction component 320 of the personal IMR application 202 handles communication and interface differences between various modes of access, the rules engine component 330 need not consider the mode of access utilized by a caller when formulating a response. This does not preclude, a user from specifying a particular type of response based upon the mode of access by a caller and the rules engine applying that rule to formulate a response.
  • a portion of the parameters potentially accessed by the rules engine component 330 are designated via user configuration interfaces.
  • a set of user defined options 340 specify a user customizable set of response options that are applied by the rules engine component 330 to formulate a call response.
  • a user state 342 specifies the status of a call recipient. For example the recipient may be in/out of the office, on the phone, in a meeting, etc.
  • Both the user defined options 340 and user state 342 are set via configuration applications 344 and 346 .
  • the configuration applications 344 and 346 need not be applets that are integrated into the personal IMR application. Rather, the configuration applications 344 and 346 may be a web browser, a text editor, a voice-based user configuration interface, etc. Multiple modes of access are supported enabling configuration from a number of different end-terminal types.
  • the rules engine component 330 consults automatically set values to formulate a response.
  • a terminal state 348 may be accessed.
  • the terminal state 348 may include whether a computer terminal is on, being used, is on standby/screen saver mode.
  • the terminal state 348 may include whether the phone is off-hook or the do not disturb feature has been activated in order to formulate a response.
  • the rules engine component 330 also consults parameter values that are independently set by other applications, but are accessible to the rules engine component 330 .
  • the rules engine component may consult a calendar 350 maintained by the call recipient to determine a probable location of the call recipient.
  • Other potential databases may also be accessed to render information used by the rules engine component 330 to formulate a response.
  • FIG. 6 showing the steps performed in response to a received call to a recipient with an activated personal IMR application 202 .
  • a call is received by the personal IMR for a particular caller.
  • the call (which may be a regular call, an email message, a web form, a fax, an instant message, etc.) is answered, then control passes to step 404 and the call proceeds as normal. That is, response mechanisms of the personal IMR are not invoked. Control then passes to the End 406 which corresponds to the end of a call.
  • step 408 the IMR application 202 determines the identity of the caller and whether response rules exist for the caller and the current mode of access used by the caller to reach the recipient. If a set of rules have been established for the identified caller and the identified mode of access, then control passes to step 410 wherein the rules engine component 330 processes the call in accordance with a configured response options (specified for both the caller and the recipient) and the present status and data values for the call recipient.
  • the media or manner in which the response is provided is not limited to voice response. Rather the response may take the form of a call queue wherein the caller placed behind other callers who are on hold.
  • the response may be activation of a find me application which seeks to track down the intended call recipient by referencing a calendar or day planner database, or by forwarding the call to a number specified by the recipient.
  • the response may request the caller to leave a message—which could be placed in a voice mailbox, email box or an instant message for the recipient.
  • the responses are not limited to the above identified response types, rather the responses are intended to be an extensible set that are added in accordance with new modes of access and channels by which a recipient can request further actions by the caller when the recipient is unavailable or unable to take a call. Control then passes from step 410 to the End 406 .
  • step 412 If during step 408 a set of rules cannot be identified for the particular caller, then control passes to step 412 .
  • the capabilities of the caller's terminal are determined. Step 412 involves gaining sufficient information about the caller's mode of access to select a proper interface and options to be implemented by the terminal abstraction component 320 of the personal IMR application 202 .
  • the user interface of the menu is tailored by the personal IMR application 202 to the caller's mode of access and carried out by the terminal abstraction component 320 according to the caller's mode of access.
  • the caller may select from the menu an option to play a voice menu for a voice access terminal. Another selection is to allow the caller to send an instant message to the terminal of the call recipient—based for example on the determination by the personal IMR application 202 that the recipient's terminal is on. The caller is presented the opportunity to send an email message to the email box associated with the call recipient. Yet another exemplary response is sending a browser menu in the event that the caller terminal is an Internet Protocol terminal.
  • the set of multimedia options presented to a caller by the personal IMR application 202 is by no means limited to the above examples.
  • the potential selections in the menu of options selectable by the caller include playing or sending menus to presenting options to callers according to the mode of access used by the caller to contact the call recipient.
  • the personal IMR application 202 receives a response from the caller based upon the set of options provided to the caller during step 414 . Control then passes to step 410 , described previously above, wherein the caller selection is processed by the rules engine component 330 based upon the configured response and the status and data parameters for the call recipient. Control then passes to the End 406 . It should be understood that the above described sequence of steps performed by a personal IMR application are illustrative, and that those skilled in the art will recognize that the personal IMR application can be performed in a multitude of ways.
  • FIGS. 7 and 8 depicting and summarizing the voice print application 200 .
  • a public switched telephone network 510 (or other suitable network) connects users having access to any phone such as phone 512 to a network communications server 516 .
  • a user may alternatively call into the network communications server 516 via a premise telephone 514 that is directly connected to the network communications server 516 as shown in FIG. 7 (in the event that a PBX hub is built into the network communications server 516 ).
  • a PBX hub is interposed between the premise telephone 514 and the network communications server 516 .
  • the type of end terminal need not be limited to the above described phones. Rather, the “phone” may comprise, by way of example, a microphone equipped personal computer 518 or an Internet Protocol phone 520 connected to the network communications server 516 via a LAN link 522 .
  • the communications server 516 includes a number of applications such as the aforementioned applications 188 .
  • LAN link 522 also supports connections to other applications servers 524 .
  • the network communications server 516 executes a voice print application 526 including a voice print authentication database 530 .
  • the voice print authentication database 530 includes multiple entries corresponding to each of the authorized users of the system.
  • An identification field 532 within each user entry comprises a unique user identification. The unique user identification is used to reference a proper voice print challenge and pre-stored expected response from the user.
  • a voice print key field 534 stores multiple challenge/response pairs for each user. During a user voice logon, one or more of the challenge/response pairs are variably selected (e.g., randomly/pseudo-randomly from a set) to facilitate authenticating the user.
  • a user identification/password field 536 includes the alphanumeric sequences for logging a user onto the system (e.g., a network domain, a specific application, etc.). The information within the user identification/password field 536 is sensitive in nature and must be secure both within the database 530 and when transmitted to a domain controller 540 during logon.
  • the voice print authentication database 530 includes a file of queries enabling the computer network data interface/server 216 to transmit challenge queries to an identified user in order to prompt a response.
  • the questions themselves can be stored as text.
  • the text of a query is retrieved and converted to speech by a TTS converter.
  • the query is not to be confused with the expected response(s) that are stored as a digital file representing a vocal recording of the speaker during a learning phase.
  • the queries are such that a variable response is required.
  • the query itself need not be variable.
  • the question may request the user to repeat a present date and time furnished by the voice print application.
  • the questions themselves are indeed variable between logon attempts.
  • the contents of the identification field 532 and the identification/password field 536 are used to log an authenticated user onto the system via a standard Windows challenge response mechanism utilizing the domain controller 540 .
  • FIG. 8 an exemplary set of steps are depicted for invoking and executing a user logon procedure that compares a user's vocal query response to one or more stored voice samples corresponding to an expected response to authenticate an authorized user.
  • the comparison and successful match of a response to a pre-stored sample is a precondition to granting access to the data and other resources available to the user via the communications server 516 .
  • control passes to step 602 wherein the communications server 516 routes the request to the voice applications 188 , and more particularly the voice print application 200 .
  • the voice print application 200 invokes operations within the communications server 516 to issue a prompt (preferably audible, but may be text in the case of text interfaces available on personal computers and some phones today) to the user to submit a user identification.
  • a prompt preferably audible, but may be text in the case of text interfaces available on personal computers and some phones today
  • the communications server 516 receives the user's identification.
  • the user identification may be in the form of a sequence of touch tones or alternatively spoken words.
  • the response is converted to an alphanumeric sequence that is then used to access an entry corresponding to the user within the voice print authentication database 530 . Assuming a corresponding entry is located within the database 530 , control passes to step 608 .
  • the voice print application 200 variably selects a challenge query from the corresponding voice print key field 534 .
  • the form of the query may be a request to repeat a word, phrase, or sequence of numbers.
  • the voice print application 200 selects a request out of a pool of potential requests and couples the query with a request for the speaker to speak today's date (e.g. “Please say Seattle and today's date”).
  • a request for the speaker to speak today's date (e.g. “Please say Seattle and today's date”).
  • it is reasonably assured that the combination of words and phrases in the response will be unique every time an authorized user logs onto the system.
  • An important factor in the variable logon request scheme is that there is a low likelihood that a particular request will be repeated by the voice print application 200 .
  • the voice print application provides assurance that expected user responses will be unique and reduces the system's vulnerability to imposter attacks.
  • the query may comprise one or more questions from a set of personal questions answered by the user during a secure registration process.
  • the query is transmitted to the user by the communications server 516 .
  • the communications server 516 receives the identified user's audible response, and the response is forwarded to the voice print application 200 .
  • the voice print application 200 compares the user's response to a pre-stored reference response (or set of responses). At step 612 , if the user's response comes within an acceptable range of similarity to the pre-stored reference response, then the identified user is considered authentic by the voice print application 200 and control passes to step 614 .
  • the voice print application 200 creates a virtual user desktop for the authenticated user and logs into the domain with the cached user credentials that are stored in the voice print application 200 .
  • a MICROSOFT TERMINAL SERVER could be used for the virtual desktop and operate on behalf of the user.
  • the voice print application 200 retrieves the contents of the network identification/password field 536 from the voice print authentication database 530 and a logon proxy submits a logon request via a password notification message to the connected domain controller 540 . Thereafter, the voice print application 200 creates an application proxy that holds the credentials for the authenticated user. In a network environment, the application proxy would have all the credentials of the user as if the user had logged in locally via a personal computer or remotely over a remote access server (RAS).
  • RAS remote access server
  • the application proxy created during step 614 carries out requests received from the authenticated user.
  • the user requests may be either vocal or electronically generated (e.g., touch tone).
  • Examples of network resources that may be directly accessed by the application proxy include: email requests that are accessed and read back to the authenticated user; a personal IMR editor (e.g., change a forwarding number); Internet sites that are accessed, for example, via an Web telephony engine; and a database that is selectively accessed according to the authenticated user's credentials assigned during the logon step 614 .
  • the application proxy created by the voice print application 200 may interact with other applications that in turn access computer resources.
  • the application proxy could also utilize Microsoft's accessibility features and allow a user to fully interact with the terminal server virtual desktop and applications similar to how a sight-impaired user interacts with a PC monitor.
  • the session is terminated and control passes to the End.
  • step 612 If at step 612 , the voice print application 200 determines that the user's audible response is not sufficiently similar to the pre-stored reference response (or responses), then control passes to step 618 wherein the voice print application rejects the user logon request and control passes to the End.
  • the user may be allowed multiple tries to logon, in such a case an event log will tally an unsuccessful logon attempt by a user during step 618 and return to step 308 (or a variation thereof where the user is merely asked to repeat a previous response).
  • the voice print application will repeat the query/response cycle until the number of successive failures reaches a limit and then control passes to the End.
  • Those skilled in the art will appreciate that there are numerous ways to gauge whether a match of a response and a pre-stored sample has occurred, and various the challenge/response/match cycle may be repeated multiple times to ensure that a user is authentic—even in instances where a match has occurred. Therefore, there is no intention to limit the present invention to the illustrative challenge/response/match sequence depicted in FIG. 8.
  • FIG. 9 provides an exemplary conference call arrangement wherein part of a distributed conference bridge arrangement comprising 10 trunk lines is handled by an internal conference bridge 700 within the network interface/server 114 .
  • the PBX system within the network interface/server 114 handles more than the ten trunk lines needed for the conference.
  • the internal conference bridge 700 can only connect six callers for a conference involving ten different lines. Therefore, the remaining participants are connected to an external conference bridge 702 .
  • a conference connection 710 between the internal conference bridge 700 and the external conference bridge 702 merges the two conference bridges into a single, distributed conference bridge.
  • the conference call includes callers attached via the PSTN as well as locally connected phones within the PBX such as phone 704 .
  • FIG. 9 The dotted connection lines in FIG. 9 illustratively depict that even though the actual connection of a portion of the participants to the conference occurs through the external bridge 702 , this connection is transparent to the participants. All conference participants follow procedures for connecting to the internal conference bridge 700 . The system handles re-direction of calls to the connected external bridge 702 .
  • the example in FIG. 9 includes only telephone end points. However, it is noted that the method and apparatus for building and controlling a distributed conference bridge, described below with reference to FIG. 10 is applicable to Internet Protocol terminals (e.g., in a Net Meeting application), video conferences, and wireless end-terminals—even hybrid conference call arrangements.
  • step 800 the network interface/server 114 is configured. Assignment of lines to the internal conference bridge during configuration is accomplished via a graphical or voice user interface presented to the arranger of the conference call via a logged on computer or other end-terminal or rules logic assigned to the conference bridge application.
  • the set up interface is tailored by a terminal abstraction module of the distributed conference bridge application-based upon the type of terminal used to perform the configuration. During the configuration a threshold is specified.
  • the threshold corresponds to the maximum number of lines (including a value of zero) that can be connected into the internal conference bridge 700 when the conference call is set up. Configuration also includes designating the total number of callers expected to participate in the call. An external conference bridge service is notified of the need for external conference bridge resources.
  • the phone conference includes both an internal conference bridge associated with the PBX system of the user and an external conference bridge provided by an outside phone services vendor.
  • the network interface/server 114 connects callers into the internal conference bridge 700 until the threshold has been reached.
  • the network interface/server 114 determines whether the threshold has been reached. If the threshold has not been reached, then a next caller is connected to the internal conference bridge 700 .
  • the connection between the internal bridge 700 and the external bridge 702 is established through QSIG, PINT, in band signaling, or data exchange across the Internet between two conference bridge servers. Control then passes to step 806 .
  • the network interface/server 114 under the control of the distributed conference bridge application 204 , automatically signals the central office controlling the head end telephone number for the customer's conference bridge using the PINT, QSIG, or in-band Remote Call Forwarding to redirect callers to a head end telephone number corresponding to the bridged conference bridge.
  • the remaining callers are connected to the external conference bridge 702 without their calls ever reaching the PBX supporting the internal conference bridge 700 .
  • the distributed conference bridge application prevents calls by the externally connected participants from tying up trunk lines to a PBX system supporting the internal portion of the phone conference. Participants in the conference are unaware that their call was redirected. There is no change in end user's procedure to connect to the external conference bridge 702 or reduction of features from users that connected to the customer's conference bridge. The conference call continues to completion.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A system is disclosed for enabling communication between server resources and a wide spectrum of end-terminals to enable users access to the resources of both converged and non-converged networks via voice and/or electronically generated commands. An electronic personal assistant (ePA) incorporates generalizing/abstracting communications channels, data and resources provided through a converged computer/telephony system interface such that the data and resources are readily accessed by a variety of interface formats including a voice interface or data interface. A set of applications provide dual interfaces for rendering services and data based upon the manner in which a user accesses the data. An electronic personal assistant in accordance with an embodiment of the invention provides voice/data access to web pages, email, file shares, etc.
The electronic personal assistant enables a user to transmit voice commands to a voice-based resource server to provide information accessible to the resource server. In accordance with an aspect of an embodiment of the invention, a user is authenticated by receiving vocal responses by a user to one or more requests variably selected and issued by a speaker recognition-based authentication facility. Thereafter, an application proxy is created. The application proxy acts on behalf of the authenticated authorized user.
In accordance with particular aspects of the specific embodiments of the invention, a set of remotely accessed voice applications are provided. One such application comprises a personal interactive multimedia response (IMR). Each user configures a personal IMR system. In a converged network environment, the user is provided access to the IMR through a personal computer interface, web interface, instant message, e-mail, as well as a voice user interface over a telephone connection.
A configurable distributed conference bridge is another potential application incorporated within the converged network architecture model of the present invention. The distributed conference bridge enables local conference resources to be utilized and incorporates external service bureau conference bridge resources when needed to supplement the internal conference bridge resources of a system.

Description

    AREA OF THE INVENTION
  • The present invention generally relates to the area of networks for providing telephony and data resources and more particularly to methods and mechanisms for providing access to networked resources via either voice or electronic data communications. [0001]
  • BACKGROUND OF THE INVENTION
  • The overwhelming majority of access to computer resources today from remote locations has been via remote electronic data communications. There are many forms of such access including for example modems or digital subscriber lines. Remote users communicate with, and access the resources of, a local system via a personal computer or computer appliance, such as for example a palm-sized scaled-down version of a personal computer. [0002]
  • Applications typically support connected computers having graphical user interfaces. However, similar interface functionality is not supported for end-devices having voice user interfaces. As a result, a user's access to the functionality of a particular application or resource is dictated by the manner in which the user accesses the computer system upon which the application or resource resides. [0003]
  • Businesses typically have two systems accessed remotely on a regular basis by their users. A local area network handles data communications, and a private branch exchange (PBX) system handles voice communications. The local area network provides access by users to file and computer applications/servers thereby enabling a user to carry out computer applications on a computer from a remote location. The PBX system enables users to retrieve and respond to voice messages left for the users on the PBX voice mail system. The PBX also enables a remote user to call multiple persons served by the PBX with a single call. [0004]
  • The businesses also include two separate and distinct sets of physical communications lines to their places of business. A first set of lines provide communication links between a public switched telephone network (PSTN) and a private branch exchange (PBX) system including phones and other telephony. A set of PSTN lines terminate at a business site at a PBX connected to a business' internal phone lines. A second set of lines provide links between external data networks and internal local area networks (LANs) for the businesses. Examples of such lines are T[0005] 1, E1, ISDN, PRI, and BRI.
  • In recognition of the potential efficiencies arising from converging two physically and operationally distinct networks into a single network, the network technology industry has sought to define and implement a single, converged, network meeting the demands for all types of communications including voice, facsimile, data, etc. As a result, a new telephony/data transmission paradigm is emerging. The new paradigm is based upon a packet-based, switched, multi-media network. Data and voice, while treated differently at the endpoints by distinct-applications, share a common transport mechanism. [0006]
  • Convergence presents the opportunity for the creation of applications including communication interfaces that not only support computer-generated commands, but also voice commands from a remote user. It also presents the opportunity to enhance the variety and flexibility of uses for PBX systems. [0007]
  • One aspect of computer systems accessed remotely via voice commands is the implementation of security measures. Voice interfaces present the opportunity for users to connect to a network from virtually any location. Presently, security mechanisms for restricted access systems accessed via telephone typically rely upon users to enter a number on a touch-tone phone to limit access. However, this method is highly susceptible to eavesdropping. Also, the users are often required to enter a long sequence of numbers that can easily be forgotten. A voice-controlled computer system will require speech recognition functionality. Speech recognition programs and associated “training” databases (used to train the software to recognize voice commands from a user) do not guarantee that another user's speech will not invoke protected operations on the computer system. Thus, if the computer system is to be secure, then additional speaker recognition/authentication procedures must be included in the system. [0008]
  • The use of speaker recognition/authentication processes to protect resources in a computer system is known. Such systems have weaknesses that enable imposters to gain access to the computer system. The simplest voice authentication scheme requires a user to speak a password, and the authentication system verifies the user by comparing the spoken password to an existing copy of the password. An obvious weakness to this authentication procedure is that the security system cannot distinguish between whether the user is the source of the vocalized password or it is merely an electronically recorded copy of the user's voice. [0009]
  • One solution to the well known “electronically-recorded” password scheme is to request the user to utter the password multiple times. The multiple utterances, in addition to being compared to the digitally stored vocal password at the computer system site, are compared to one another to ensure that the utterances are sufficiently different from one another to ensure that a recording of the password is not being replayed multiple times by an imposter seeking to gain remote access to protected computer resources. Of course, the imposter can circumvent this safeguard by making multiple recordings of the password spoken multiple times by an authorized user. Furthermore, copies of a single original spoken password can be altered and then stored to create variations from the original. [0010]
  • What is needed is a speaker authentication scheme wherein imposters cannot use a recording of the user's voice to render a valid passwords to gain access to protected computer resources. There exist a number of systems that attempt to overcome the shortcomings of voice-based authentication schemes. Such authentication mechanisms include smart cards, secure ID's, and retina scanners. However, these mechanisms require special hardware at the site from which a user calls. [0011]
  • In accordance with another aspect of a converged wide-area network interface to a computer system, there is an interest to exploit a system wherein telephony and digital data systems share programs and data. Voice-based computer access, described above, is one such effort to exploit converged technology. Once authenticated, a user may access computer resources via voice commands rather than issuing commands by means of a remote computer (e.g., a laptop computer). The user may access a number of applications integrated into the converged local network including databases, file servers, Interactive Voice Response (IVR) servers, call centers, voice mail, PBX hubs/endnodes, and conference bridges. [0012]
  • With regard to the last of the listed potential applications, it is noted that conference bridges are generally implemented today in two ways. One way is to purchase a Conference Bridge with certain capacity. It is then used as a fixed resource like a physical conference room. If a conference bridge has 24 ports it can support one 24-user conference call. It could also support three eight-port conference calls. [0013]
  • Extending the size of a conference via external conference bridging is a challenge to coordinators of a conference. A second conference phone number has to be forwarded to each of the participants who is to be bridged into the conference via the external bridge. Then the external conference bridge calls in to the internal conference bridge. Alternatively, callers could call a number that is received by the PBX handling the conference which in turn forwards the call to an external conference bridge. However, each forwarded call uses two trunks in the PBX system. [0014]
  • Another option is to subscribe to a conference bureau. A bureau is a service that supplies an external conference bridge (and number to call into the bridge). The bureau typically charges a customer based upon the number of users and the duration of the use of the bridge (e.g., per user-minute). External bridges allow for more dynamic meetings however the cost for utilizing external bridges on a regular basis is substantial. [0015]
  • SUMMARY OF THE INVENTION
  • The present invention seeks to exploit the convergence paradigm and/or the ability to communicate with a wide spectrum of end-terminals to enable users access to the resources of both converged and non-converged networks via voice and/or electronically generated commands. For example, an electronic personal assistant (ePA) incorporates generalizing/abstracting communications channels, data and resources provided through a converged computer/telephony system interface such that the data and resources are readily accessed by a variety of interface formats including a voice interface or data interface. A set of applications provide dual interfaces for rendering services and data based upon the manner in which a user accesses the data. An electronic personal assistant in accordance with an embodiment of the invention provides voice/data access to web pages, email, file shares, etc. [0016]
  • The electronic personal assistant enables a user to transmit voice commands to a voice-based resource server to provide information accessible to the resource server. In accordance with an aspect of an embodiment of the invention, a user is authenticated by receiving vocal responses by a user to one or more requests variably selected and issued by a speaker recognition-based authentication facility—thereby ensuring that every time a user logs into the network there is a unique challenge response to gain access to the network resources. A spoken response is compared to one or more stored voice samples previously provided by the user during an enrollment procedure. If the spoken response is sufficiently close to the one or more stored voice samples, then the user is authenticated as a domain user or logged onto the local system. The voice-based authentication facility enables a user to log in to a computer without the aid of a keyboard, smart card or such. This would work in a kiosk environment. Thereafter, an application proxy is created. The application proxy acts on behalf of the authenticated authorized user. [0017]
  • In accordance with particular aspects of the specific embodiments of the invention, a set of remotely accessed voice applications are provided. One such application comprises a personal interactive multimedia response (IMR). Each user configures a personal IMR system. In a converged network environment, the user is provided access to the IMR through a personal computer interface, web interface, instant message, e-mail, as well as a voice user interface over a telephone connection. [0018]
  • A configurable distributed conference bridge is another potential application incorporated within the converged network architecture model of the present invention. The distributed conference bridge enables local conference resources to be utilized and incorporates external service bureau conference bridge resources when needed to supplement the internal conference bridge resources of a system. This may or may not require any user intervention to create the bridged conference bridge. The dynamically configurable extensible conference bridge application supports standard voice conference calls, multimedia conference calls, and blended conference calls. As a consequence a customer need not provision in-house conference bridge resources, switch resources, or trunks for a worst case scenario and the conference bridge may be used on a more ad hock basis since it can dynamically grow to meet the demands of the conference. [0019]
  • In accordance with an aspect of a preferred embodiment of the conference bridge application, in addition to manual call set-up with regard to the overflow connections to the external bridge, the conference bridge application supports automatic redirecting head end conference phone numbers utilizing remote call forward, QSIG, PINT, and/or in-band signaling.[0020]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • While the appended claims set forth the features of the present invention with particularity, the invention, together with its objects and advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which: [0021]
  • FIG. 1 is a block diagram schematically depicting an exemplary computer system for incorporating the terminal abstraction architecture and carrying out the electronic personal assistant and voice print operations in accordance with a preferred embodiment of the present invention; [0022]
  • FIG. 2 is a schematic drawing depicting an exemplary network environment, including a converged network supporting both voice and data communications over a same network interface, into which the present invention may be incorporated; [0023]
  • FIG. 3 is a schematic drawing of an exemplary interface between a public and a private network for implementing an embodiment of the present invention; [0024]
  • FIG. 4 is a diagram identifying a set of voice-based applications supported on a private network in accordance with an embodiment of the present invention; [0025]
  • FIG. 5 is a block diagram depicting the components of a personal interactive multimedia application; [0026]
  • FIG. 6 is a flowchart summarizing the steps of a personal IMR application; [0027]
  • FIG. 7 is a schematic diagram depicting components within a converged computer system for facilitating voice-based authentication of a user; [0028]
  • FIG. 8 summarizes the steps performed by an interface server/controller in accordance with a voice print application to determine whether to grant access to network resources to which access is selectively provided to authenticated authorized users; [0029]
  • FIG. 9 is a schematic depiction of a distributed conference bridge; and [0030]
  • FIG. 10 is a flowchart summarizing the steps performed to create a distributed conference bridge.[0031]
  • DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT
  • Turning to the drawings, wherein like reference numerals refer to like elements, the invention is illustrated as being implemented in a suitable computing environment. Although not required, the invention will be described in the general context of computer-executable instructions, such as programs, being executed by a computer or similar device. Generally, programs include routines, other programs, objects, components, data structures, dynamic-linked libraries (DLLs), executable code, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the term “computer” is not meant to limit the invention to personal computers, as the invention may be practiced on multi-processor systems, network devices, minicomputers, mainframe computers, computer appliances, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by physically distinct processing devices that are communicatively linked. In a distributed computing environment, parts of a program may be located in both local and remote memory storage devices. [0032]
  • With reference to FIG. 1, an exemplary system for implementing the invention is shown. As best shown in FIG. 1, the system includes a general purpose computer in the form of a [0033] conventional computer 20, including a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including the system memory to the processing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory may include read only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system (BIOS) 26, containing the basic routines that help to transfer information between elements within the computer 20, such as during start-up, may be stored in the ROM 24. The computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk 60, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
  • If included in the [0034] computer 20, the hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 may be connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical disk drive interface 34, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, programs and other data for the computer 20. Although the exemplary environment described herein employs a hard disk 60, a removable magnetic disk 29, and a removable optical disk 31, it will be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories, read only memories, and the like may also be used in the exemplary operating environment.
  • A number of programs may be stored on the [0035] hard disk 60, magnetic disk 29, optical disk 31, ROM 24 or RAM 25, including an operating system 35, one or more applications programs 36, other programs 37, and program data 38. A user may enter commands and information into the computer 20 through input devices such as a keyboard 40, which is typically connected to the computer 20 via a keyboard controller 62, and a pointing device, such as a mouse 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. Input devices as well as peripheral devices may be connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, a parallel port, game port, universal serial bus (USB), 1394 bus, or other interfaces. A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor, computers typically include other devices not shown, such as speakers and printers.
  • The [0036] computer 20 operates in a networked environment using logical connections to one or more devices within a network 63, including by way of example personal computers, servers, routers, network PCs, a peer device or other common network node. These devices typically include many or all of the elements described above relative to the computer 20.
  • The logical connections depicted in FIGS. 1 and 2 include one or [0037] more network links 51, for which there are many possible implementations, including local area network (LAN) links and wide area network (WAN) links. Such networking links are commonplace in offices, enterprise-wide computer networks, intranets and the Internet. It will be appreciated that the network connections shown are exemplary and other means of establishing a data path between the computers may be used. When used in a LAN, the computer 20 may be connected to the network 63 through a network interface or adapter 53. When used in a WAN, the computer 20 typically includes a modem 54 or other means for establishing communications over the network link 51, as shown by the dashed line in FIG. 1. The network link 51 may also be created over public networks, using technologies such as dial-up networking, the Internet, Digital Subscriber Line (DSL), Asynchronous Transfer Mode (ATM), Virtual Private Network (VPN) or any other conventional communication method. The modem 54 may be connected to the system bus 23 via the serial port interface 46, and may be external or internal. In a networked environment, programs depicted relative to the computer 20, or portions thereof, may be stored on other devices within the network 63.
  • In the description that follows, the invention will be described with reference to acts and symbolic representations of operations that are performed by one or more computers, unless indicated otherwise. As such, it will be understood that such acts and operations, which are at times referred to as being executed, include the manipulation by the processing unit of the computer of electrical signals representing data in a structured form. This manipulation transforms the data or maintains it at locations in the memory system of the computer, which reconfigures or otherwise alters the operation of the computer in a manner well understood by those skilled in the art. The data structures where data is maintained are physical locations of the memory that have particular properties defined by the format of the data. However, while the invention is being described in the foregoing context, it is not meant to be limiting as those of skill in the art will appreciate that various of the acts and operation described hereinafter may also be implemented in hardware. [0038]
  • Turning now to FIG. 2, a schematic diagram depicts components of an exemplary communications network environment for incorporating an architecture wherein multiple types of user interfaces, including voice and graphical, are supported for individual applications and other computer resources residing on a networked system. Support for multiple types of user interfaces is provided by a terminal abstraction interposed between remote terminals having various user interfaces and individual applications and other computer resources on the networked system. The terminal abstraction, comprising a set of modules corresponding to user interface types, enables similar functionality to be provided by applications and resources to an extensible set of end-devices having differing user interfaces connected via a wide area network (WAN) [0039] 110 including by way of example any one or more of a set of linking networks such as a public switched telephone network (PSTN), integrated services data network (ISDN), T1, etc.
  • The converged computing/communications environment depicted in FIG. 2 includes a [0040] local network 112. In the local network 112, PSTN voice, IP voice, e-mail, instant messaging, video, fax, IP Fax, and data calls are blended together and passed through one routing/rules engine within a network interface/server 114. A converged communications link 116 connects the network interface/server 114 to the WAN 110. The converged communications link 116 supports both voice and data communications between the local network 112 and the WAN 110. While only a single link 116 is shown in FIG. 2 for the network interface/server 114, the network interface/server 114 also includes standard telephony interfaces which the network interface/server 114 utilizes to communicate over the PSTN via ordinary phone trunk lines.
  • The [0041] WAN 110 in turn provides wide area links to a variety of connected end-devices including, by way of example, a local area network 120, a public telephone 122, a facsimile machine, an Internet telephone 124, and a personal computer 126. The network interface/server 114 passes packets of information for voice phone conversations, voice mail, email, internet phone, video phone, fax, remote data access, remote service access, etc. In accordance with the connection processing architecture of the present invention, for a particular application, data and voice calls are directed to a terminal abstraction that communicates with the application according to an end-device independent format. Communications between the terminal abstraction and the application are not distinguished by the mode of access by an end-device to the application.
  • With regard to the [0042] local network 112, a link 128 connects the network interface/server 114 to an Ethernet link 128 of a local computer network including a set of computing devices 130. The computing devices 130 comprise, for example, personal computers, servers, client terminals and workstations. FIG. 2 explicitly shows two such servers, i.e., an email server 132 and a database server 134. The network interface/server 114 is also coupled to a voice mail system 135 and includes a link to the Internet 136. While not shown in FIG. 1, those skilled in the art will appreciate that the network interface/server 114 is physically coupled to links 116 and 128 via network interfaces including hardware and software adapted to transmit and receive data in accordance with the communications protocol for the associated links 116 and 128.
  • In accordance with the spectrum of communications supported by the network interface/[0043] server 114, the network interface/server 114 acts as a PBX hub and supports connections to a set of telephony equipment including telephones 137, facsimile machines, etc. via a variety of link types including, ordinary telephone lines, Ethernet, ATM, or even a wireless communication link. The network architecture of the local network 112 is merely exemplary. While the PBX functionality is built into the network server/interface 114 in the present example, a separate PBX hub may be located external to the network server/interface 114. The actual hardware configuration of a network or system embodying the present invention will be based upon choices of system hardware providers and the customers that utilize systems embodying the present invention. However, in accordance with an embodiment of the present invention, a terminal abstraction, a software entity, is interposed between an application and an end-terminal device that is communicating with the application.
  • The [0044] local area network 120, connected to the WAN 110 via link 138 includes network components similar to those of the first private network 112. Link 138 is connected to a computer network data interface/server 142. However, in contrast to the network interface/server 114, the link 138 between the WAN 110 and the computer network data interface/server 142 supports only data calls (i.e., voice telephone calls are not supported). However, while only a single link 138 is shown in FIG. 2 for the network interface/server 142, the network interface/server 142 may comprise multiple physical lines including multiple phone trunk lines to communicate over the PSTN.
  • An Ethernet link [0045] 140 connects the computer network data interface/server 142 to computing equipment 144. Computer network data interface/server 142 is connected via link 146 to telephony equipment 148 (including a PBX hub and telephones). Since the link 138 does not support voice calls, a trunk line 150 connects the PBX of the telephony equipment 148 to the public switched transmission network of the WAN 110. The PBX hub of the telephony equipment 148 includes functionality enabling applications within the local area network 120 to interface with voice-based end devices via link 146.
  • The [0046] links 116 and 138, in accordance with an embodiment of the present invention, are circuit switched. In other words, any particular connection supported by the links 116 and 138 is assigned a channel or channels (or a range of bandwidth) from a set of available channels (or bandwidth ranges). However, in alternative embodiments of the present invention, connections via links 118 and 138 are identified within transmitted packets rather than assigning a particular channel. Thus the local networks 112 and 120 may incorporate either circuit or packet switching.
  • FIG. 2 depicts an exemplary network configuration; however, those skilled in the art will readily appreciate from the disclosure herein that a multitude of network configurations incorporating the present invention are possible. In fact, convergence of data and voice communications expands the possibilities for potential networks that are not confined by the type of end devices (e.g., phone, computer, fax machine, instant messaging) connected to the network or even a same link on a network—such as both voice and data nodes on a single Ethernet link. [0047]
  • Text to speech (TTS) and speech to text (STT) converters play an important role in systems incorporating both voice and electronic (e.g., networked computer) modes of user access to applications incorporating the terminal abstraction architecture. User interaction, via audible commands and responses, with a variety of applications (e.g., databases) is rendered by TTS and STT converters within or coupled to the network interface/[0048] server 114. The TTS converter enables applications executing within the local area network 112 to transmit human understandable speech signals to a phone receiver used by a remote user thereby enabling the applications to communicate information to the remote users via audible sounds. The STT converter, employing speech recognition technology, enables a user to issue vocal commands and provide information by speaking commands into the receiver of a phone or through a voice command interface of a multimedia personal computer or a host-based server supporting various numbers of users simultaneously. The TTS and STT converters enable a user to communicate with the resources of the local area network 112 even if the user does not have a computer to receive and interpret a digitally encoded message. Alternatively, the user may submit commands via touch tone signals.
  • A network interface need not be converged to support both vocal and electronic data commands from a remote user. In an alternative embodiment, a network interface is non-converged and a user accesses resources within a data network via voice and/or touch-tone commands by means of the TTS converter and the STT converter. Finally, it is noted that a number of individually identified network entities depicted in FIG. 2 can be incorporated into a single hardware component. For example, a private branch exchange, database, and special purpose servers (e.g., email, voicemail, etc.) may be incorporated into the network interface/[0049] server 114 assuming that the processor could handle the aggregate processing load without degrading the expected level of performance of the network interface/server 114.
  • Furthermore, the system hardware and software can be owned and managed in a variety of manners. For example the entire system can be customer owned and managed, customer owned and managed by third parties, owned and managed by a third party offering IP Centrex services, or an ISP offering the service(s) in conjunction with an IP Centrex company. [0050]
  • Having described a general network environment within which the present invention may be deployed, attention is directed to FIG. 3 which schematically depicts functional components of an exemplary computer network data interface/server (i.e., communications server), such as network interface/[0051] server 114 embodying the present invention. The network interface/server 114 is physically coupled to links 116 and 128 via network interfaces 160 and 162. The hardware and software in network interfaces 160 and 162 conform to the protocols of corresponding links 116 and 128. The network interfaces 160 and 162 comprise multiple replicas of individual network cards to support multiple lines, such as telephone system trunk lines connecting the network interface/server 114 to the PSTN. Other interfaces, that have not been depicted in FIG. 2, support the connection of phone lines for the local phones 137 to the PBX system within the network interface/server 114.
  • Each of the network interfaces [0052] 160 and 162 is communicatively coupled, via software and/or hardware links 172 and 174 respectively, to a multipurpose driver 170 supporting both data and telephony connections. Data calls are calls that do not communicate via audible speech commands. Voice calls involve spoken commands and information. Data calls include, by way of example, Internet multimedia, video, Fax, IP telephony, e-mail, web forms, and web events. The multipurpose driver 170 utilizes unique identification information to distinguish between voice calls and data calls and route the calls accordingly to higher level programs and processes.
  • Voice call connection requests are routed by the [0053] multipurpose driver 170 to a telephony device object 180. The telephony device object 180 passes the requests to call control application program interfaces (APIs) 182. The call control APIs 182 pass the requests to higher level processes in the user level of the network interface/server 114 to perform application-specific operations. More particularly,.the requests submitted via a voice call connection are passed by the call control APIs 182 to a voice call applications server 186. The voice call applications server 186 determines the nature of the request and invokes a particular application from a set of applications 188 registered with the voice applications server 186.
  • In accordance with a preferred embodiment of the present invention, one or more of the set of [0054] applications 188 support multiple modes of access via various terminal types. The support of multiple terminal types is facilitated by a terminal abstraction comprising interface models defining a variety of user interfaces for a variety of distinct modes of accessing corresponding applications. As a result, the applications are able to present their functionality (e.g., a schedule planner, email, a database, etc.) to connected users via a number of distinct modes of access. The different modes of access result from the use of unconventional end-terminal types (i.e., other than personal computers) to communicate with the applications and request the resources provided by the applications. Such unconventional end-terminal types include, by way of example, a cellular phone (including potentially a graphical or text interface), a palm-sized computer, computer appliance, and an ordinary telephone. In each instance a typical user interface cannot be supported by the end-terminal due to computational power limitations as well as, in some instances the absence of any visual display. Terminal abstraction modules are discussed in greater detail herein below with reference to FIG. 5, a schematic depiction of a particular example of an application (an interactive multimedia response system) that incorporates the terminal abstraction architecture for supporting multiple modes of access.
  • The terminal abstraction, conceptually an interface layer between functional components of an application and user terminals, can be either tightly integrated with a particular application or be provided as a generic/universal entity with a defined interface to which applications make calls during the course of execution of the applications. Thus, in certain embodiment of the present invention, the terminal abstractions are a part of specific applications. In other embodiments of the present invention, the terminal abstraction is at least partially carried out by system-level functions having standard interface definitions thereby significantly reducing the size and complexity of the applications that utilize them and thus reducing the programming effort involved in developing applications supporting multiple modes of access. [0055]
  • During the course of operation, the [0056] applications 188 pass requests to the voice applications server 186. The voice applications server 186 reformulates the request if necessary and passes the reformed request in the form of a system request to an NT Interface 184. The NT Interface 184 passes commands to the call control APIs 182 which pass the requests, in the form of system commands, to the WINDOWS NT operating system (or a suitable alternative operating system). Examples of system commands used to support the voice applications include lineAddProvider, lineClose, lineDrop, lineGetID, and lineMakeCall. Those skilled in the art will readily appreciate that a number of other general system commands can used to support execution of the voice applications 188 in view of the disclosure herein.
  • Both data calls and voice calls are initially routed to a [0057] network device proxy 190. At the commencement of a call, the network device proxy 190 routes the call to the call control APIs 182 including for example TAPI. Processes and tables within the call control APIs 182 in cooperation with a remote access service (RAS) manager 194 register the call, and in the case of data calls potentially create additional connections based upon the throughput requested for the data call and the availability of additional channels on the link 118.
  • After registering the call and allocating the proper number of channels to the call, control of the remainder of the call session is directed to application-specific processes. In the case of a voice call, the call is directed to the [0058] telephony device driver 180 that, in turn, directs the call to a particular application in the manner described previously above. In the case of a data call, the call is directed from the network device proxy 190 to a wide area network/network device interface 196. While in the data connection mode, the WAN/network device interface 196 calls a transport layer driver 198 and thereafter executes the call by direct calls to the RAS manager 194 via path 199. The RAS manager 194 in turn accesses the applications 188.
  • Turning now to FIG. 4, a set of voice applications are identified from the [0059] applications 188 generally identified in FIG. 3. The applications identified in FIG. 4, and others identified herein below, are provided collectively in the form of an electronic personal assistant that combines access to computer and telephony resources into a single extensible data and resource access system. In accordance with an embodiment of the present invention, one or more of the applications provide at least a graphical user interface facilitating user access via personal computers and a voice user interface for access to the resources of the electronic personal assistant via ordinary telephones. It is noted that the list of applications identified in FIG. 4 and recited herein is not exhaustive, and thus those skilled in the art will readily appreciate that additional applications may be added to, and even ones of the recited applications removed from, the electronic personal assistant without departing from the present invention.
  • A [0060] voice print application 200, a security mechanism, enables an authorized user to call into the network interface/server 114 (or in general a communications server) from any phone or other terminal device having a suitable voice signal transducer, including for example a personal computer having a microphone input, and be authenticated by properly responding to a set of authentication queries by the voice print application 200. The voice print application 200 utilizes a variable challenge/response scheme to confound imposters seeking to gain access using a recorded version of an authentic user's vocal response to a static query. The challenge/response scheme embodied within the voice print application 200, described herein below in conjunction with FIGS. 7 and 8, comprises variably issuing one or more queries, from a set containing multiple potential challenges, to an authorized user to obtain a voice sample for authentication of the user during logon.
  • Use of the [0061] voice print application 200 is not limited to remote calls. The voice print application 200 is intended for use at any terminal including a suitable voice transducer. Therefore, the voice print application 200 may also be used, by way of example to logon to a standalone computer or a local area network to gain access to restricted resources contained therein.
  • Users are preferably able to access the electronic personal assistant from a variety of end-terminal devices having different voice transducers, including ordinary telephones, cellular phones, wireless transmitters, and personal computer microphones. The potential to access the electronic personal assistant from a variety of terminals and connections of varying quality presents the need to ensure that a user's vocal logon attempt is not rejected merely because a different voice transducer or bad connection created differences between a training sequence and a query response. Preferably, sufficiently robust voice match procedures, known to those skilled in the art of voice-based user identity verification, are carried out during the comparison operation to reliably generate a positive match result when a proper user accesses the electronic personal assistant. Fail-safe authentication procedures for authentication provide fallback mechanisms for instances where a user's voice is improperly rejected due to changes in the user's voice because of a cold or a poor phone connection. [0062]
  • A [0063] personal IMR application 202 enables an authorized user to configure a customized interactive multimedia response system that is unique to the user's phone (or any other end-terminal suitable for receiving calls) It is noted that in the context of the disclosed and claimed invention, a “call” generally encompasses an event involving one entity (e.g., person) initiating contact with another entity (e.g., person) without regard to a particular mode of communication. Examples of various call types include: voice calls, e-mail, or instant messages executed using a variety of computers/appliances. In known phone systems, a single voice response system definition (a set of response rules) is applied to an ACD (automated call distributor) or to the company's head number to route voice telephone calls to specific numbers or a queue. In contrast, in accordance with an embodiment of the present invention, a database within the network interface/server 114 supports a distinct IMR configuration for each phone or other callable end-terminal in a PBX system (including converged networks). Other callable end-terminals include by way of example IP phones and applications within networked computers.
  • In addition to individual custom configuration, another feature of the [0064] personal IMR application 202 is the flexible/extensible multimedia nature of the personal IMR application 202. The personal IMR application 202 receives communications, including phone calls and electronic messages (e.g., email), in a variety of formats and routes the communications to a variety of destinations according to a set of rules defined for the particular recipient of the communications. A rules engine attempts to establish communication between the two users via the best method available. For example Person A calls Person B. Person B has set the find me status to out of the office. Person B's out-of-the-office device is a two-way pager capable of receiving pages, e-mail, and instant messages. The IMR system attempts to determine the capabilities of Person A's terminal either through querying the device directly or asking the user interactively through an interactive voice response menu. For example if Person A's terminal (a phone) is a phone capable of sending instant messages, the IMR will establish an instant messaging (IM) session between the two users. If Person A's terminal is not capable of sending e-mail or an instant message, the IMR will allow Person A to send a numeric page to Person B.
  • Furthermore, the [0065] personal IMR application 202 incorporates access to databases tied to other applications. One configurable feature is a “find me” function that determines a likely present location(s) of the call recipient by accessing information stored in a personal database file such as a personal planner or appointment calendar. Rather than route the call to ordinary voice mail (thus initiating a phone tag sequence), the call is redirected, if designated to do so by the recipient, to the likely present location or locations, simultaneously or serially, at which the call recipient can be reached (e.g., a cell phone number). The form of the forwarded call is not confined to a voice phone call. As will be demonstrated by an example below, the personal IMR application 202 also forwards calls to the recipient in the form of text messages.
  • In an exemplary configured response scenario the [0066] personal IMR application 202 is programmed to route a received instant message to a cell phone or a beeper that accepts text messages, two way pages, or instant messages. In response to the instant message sent to the personal IMR application, the personal IMR determines, by referring to a user status variable and/or a set of configured rules for the recipient, that the intended recipient is likely on a particular cell phone that accepts text messages. The IMR application issues a response to the sender of the instant message informing the sender that the recipient is out of the office. The response further invites the sender to transmit a message to the recipient's cell phone with the following format: “cell phone: message”. The personal IMR system also notifies the sender of any particular restrictions on messages to the cell phone. For example, the IMR application 202 may inform the sender that messages to the recipient's cell phone are limited to 125 characters, and that the recipient's receiving device cannot send replies. The personal IMR stores a subsequently received text message in a personal message storage space for the recipient. After retrieving the message, the recipient may issue a response in the format of “Message: message”. In other words, a Message type designation followed by the message text. The personal IMR application 202 provides a number of advantages over known interactive voice response systems. The potential modes of access to the IMR application 120 are expanded because the personal IMR application 202 supports both voice and electronic data access. Furthermore, the breadth of potential responses is expanded to include electronic data message responses such as instant messaging and email in addition to the traditional voice mail and call forwarding capabilities of known PBXs. Moreover, the personal IMR application 202 accesses databases to determine the status of the recipient and select a proper response based upon applying the status information to a configured set of rules. Finally, the personal IMR application 202 is defined for individual recipients, thereby enabling customized response schemes to be defined for each recipient. By way of example, in one configuration of the personal IMR application 202, a user browsing on a web page could cause a “call” to be placed in the sales queue by a personal IMR of the call recipient. When a sales agent becomes available they will place a “call” to the user. The call may be in the form of email, instant message, a phone call, an Internet Protocol phone call, etc. The structure of the personal IMR application 202 is discussed further herein below in conjunction with FIGS. 5 and 6.
  • A distributed [0067] conference bridge application 204 performs automatic set-up of a phone conference that may include either of both internal and external conference bridge hardware. The participants in the phone conference are connected according to a conference call connection arrangement defined by a user. Through a configuration editor interface, the user specifies a threshold value, including zero, for the number of conference participants to be connected into the phone conference via an internal conference bridge (typically integrated into a PBX system). A configuration editor component of the distributed conference bridge application 204 may incorporate the terminal abstraction architecture described herein above. Such a configuration editor supports user specification of distributed conference bridge parameter values via graphical and voice user interfaces.
  • After the connection scheme has been defined, the distributed [0068] conference bridge application 204 controls the set-up of the conference call connections. Under the direction of the distributed conference bridge application 204, conference participants are connected to the internal conference bridge until the number of connections corresponds to the threshold value for internal conference bridge connections. Thereafter, the distributed conference bridge application 204 signals the central office controlling a first head end telephone number for the customer's conference bridge to redirect callers to a second head end telephone number corresponding to the external conference bridge. The signal to redirect calls to the external conference bridge is provided in the form of PINT,QSIG, or in-band remote call forwarding, all of which are well known signals to those skilled in the art.
  • An advantage of the above described re-direction capability is the simplicity with which the distributed conference bridge, including both an internal (PBX integrated) conference bridge and an external conference bridge, is assembled. Only a single conference call need be identified to the participants. In the case where participants call in, all participants use a same call-in number. With regard to the participants that are connected to the external conference bridge after the internal bridge reaches its designated capacity, the participants are unaware that their call was redirected. There is no change in participants' procedure or a reduction of features from users that are connected to internal conference bridge. [0069]
  • One embodiment of a distributed conference bridge includes a conference call involving calls over ordinary phone lines such as for example PBX and PSTN lines. However, the conference bridge connection operations and mechanisms described above are not limited to such networks. Rather they are also applicable to conference calls over virtually any public or private network. Finally, incorporating the terminal abstraction architecture to the call connections enables the creation of a hybrid conference call arrangement including, for example callers connected through private phone networks, a PSTN and/or the Internet. [0070]
  • An [0071] instant messaging application 206 treats an instant message the same as a phone call. The external interface and operation of instant messaging remains the same as known instant messaging services. A user via the network interface/server 114 registers with an instant message server (e.g., MICROSOFT NETWORK). In accordance with an aspect of the particular implementation of the convergence paradigm in the present electronic personal assistant, all messages are transformed into message abstractions that are treated equally, to the extent possible, regardless of the end-terminal that issued the message. Thus, email, voicemail, instant messages, etc. can be accessed by a recipient by phone or computer interface.
  • However, this does not mean that the type of end-terminal is irrelevant to the [0072] instant messaging application 206. The terminal abstraction renders a generic message, and the rules engine applies a criterion for handling the generic message. The call type is taken into account when routing. For example an instant message would never be routed to a telephone headset unless the text message has been converted to audible speech or the telephone was equipped with a text data display. With regard to the instant messaging application, the instant message can be forwarded to voice mail, an instant message enabled destination phone, etc. Instant messaging forwarding could use the IMR to forward the message or have it's own forwarding mechanism.
  • A [0073] Call Announcement application 208 provides both audible (PC chime or utilizing TTS speaks the callers name) and/or visual call announcements through a call recipient's personal computer. The Call Announcement application 208 also enables the call recipient to issue commands to control acceptance or rerouting of a received call via graphical and/or voice user interface commands. The Call Announcement application 208 receives caller identification information associated with an incoming call. Thereafter, the call announcement application 208 references a rules database to determine any particular customized announcement features to apply to the call. An example of a customized announcement feature is immediate forwarding of calls to voice mail. Another example, in an environment adopting the terminal abstraction architecture, is converting a voice mail message to text and storing the message in email. The call announcement application 208 thereafter carries out the call announcement.
  • The set of [0074] applications 188 is extensible both horizontally (new independent applications) and vertically (leveraging existing voice/phone accessed applications). Thus, any number of additional voice applications may be added to the set of voice applications 188.
  • Other applications are also included within the extensible set of [0075] applications 188, but not specifically identified in FIG. 4. The applications described below provide multiple modes of access by incorporating the terminal abstraction architecture. Also, the multi-access mode capability facilitates integrating the described applications with other base applications such as email, databases, and Web browsers to enhance utility of those applications.
  • A workgroup monitoring application enables authorized users to monitor the status of a workgroup member's phone line to determine the line status and other call information, including a caller identity and degree of importance of the call. Access to monitor a particular line is controlled through security. For example a secretary could monitor the phone of another employee for whom the secretary provides assistance. The secretary's workgroup monitoring application would likely not be allowed to monitor the phone of another employee for whom she provides no assistance. The workgroup monitoring application includes voice access mode access to enable a workgroup member to monitor a line from out of the office at a public phone and issue a message (e.g., via urgent email dictated and sent via vocal commands from a phone) to a particular recipient to get off the phone to free the line for another important call. [0076]
  • Another voice application is voice activated dialing (Intelligent Dial Tone) that not only initiates dialing a phone number but also carries out particular types of phone calls such as conference calls based upon verbal commands. An Internet/intranet integration application responds to verbal commands while performing a voice-based task such as replaying email, accessing information from a central database, files on a network share, sending a document to a fax recipient, by launching a browser and retrieving and reading back (email or fax) information accessed via the voice commands. [0077]
  • Enhanced Contact Controls are yet another application that may exploit the terminal abstraction architecture presented herein. Enhanced Contact Control enables scheduled tasks to be automatically activated, and a user is prompted to initiate a call via voice commands rendered directly to a phone integrated within the computer. The call can alternatively be initiated by a sequence of clicks and drag/drop acts by a user at the computer. The Enhanced Contact Control application may also incorporate priority rules etc. when executing scheduled tasks. [0078]
  • VUI Personal Information Manager applications enable a user to access contact information from a remote location by vocal commands to databases maintained within the control of the network interface/[0079] server 114 and to take appropriate actions including dialing a client's telephone number that was retrieved by the PIM. This application integrates a number of previously discussed features and applications supported by the electronic personal assistant including the voice print application 200, TTS, STT, and the voice activated dialing application.
  • Turning now to FIG. 5, an exemplary application program architecture is provided to illustrate the general functional parts of the terminal abstraction architecture facilitating multiple modes of access by users to applications and their associated resources through a communications server such as the network interface/[0080] server 114. The personal IMR application 202 provides user configured responses to callers that utilize a variety of access modes to contact a particular recipient. A set of access modes 300 includes a public switched telephone network (PSTN) telephone 302, an Internet Protocol (IP) telephone 304, a videoconference phone 306, a web form 308 via a personal computer and an instant message 310 via a personal computer. The set of different access modes depicted in FIG. 5 is exemplary and thus there is no intention to limit the scope of the terminal abstraction to handling sessions involving the specifically identified access modes. Rather the set of modes is preferably extensible. Additional modes of access are incorporated into the terminal abstraction software of the application (or operating system) software.
  • In an embodiment of the terminal abstraction architecture, the [0081] IMR application 202 comprises two functional components, a terminal abstraction component 320 and a rules engine component 330. The terminal abstraction component communicates, on behalf of the IMR application 202, with the end terminals. Differences between modes of access are handled primarily by the terminal abstraction component 320. The terminal abstraction tailors functionality provided by the IMR application 202 (including the interface specification) to a specific mode of access. For example, the terminal abstraction component 320 tailors interaction with the PSTN telephone 302 and IP telephone 304 to voice user interface. In contrast, the terminal abstraction component 320 tailors interaction with the Web form 308 and Instant Message 310 modes of access to a text or graphical user interface.
  • The method of communication between the [0082] terminal abstraction component 320 and functional components of the IMR application 202, such as a rules engine component 330, is the same without regard to the mode of access. Thus, the functional components of the IMR application 202 are not directly exposed to, and need not consider, the particular one of the set of modes of access 300 to a call recipient. The terminal abstraction component 320 tailors a generalized call response, formulated by a rules engine 330, to a particular mode of access used to call the recipient.
  • The [0083] rules engine component 330 comprises a framework for applying a set of response rules applicable to all types of calls regardless of the mode of access to a particular recipient. The rules engine component of the IMR application 208 applies a defined criterion to a set of status and data values pertaining to a particular call recipient. The rules engine formulates a response. The generalized response is then provided to the terminal abstraction. Because the terminal abstraction component 320 of the personal IMR application 202 handles communication and interface differences between various modes of access, the rules engine component 330 need not consider the mode of access utilized by a caller when formulating a response. This does not preclude, a user from specifying a particular type of response based upon the mode of access by a caller and the rules engine applying that rule to formulate a response.
  • A portion of the parameters potentially accessed by the [0084] rules engine component 330 are designated via user configuration interfaces. A set of user defined options 340 specify a user customizable set of response options that are applied by the rules engine component 330 to formulate a call response. A user state 342 specifies the status of a call recipient. For example the recipient may be in/out of the office, on the phone, in a meeting, etc. Both the user defined options 340 and user state 342 are set via configuration applications 344 and 346. The configuration applications 344 and 346 need not be applets that are integrated into the personal IMR application. Rather, the configuration applications 344 and 346 may be a web browser, a text editor, a voice-based user configuration interface, etc. Multiple modes of access are supported enabling configuration from a number of different end-terminal types.
  • The [0085] rules engine component 330 consults automatically set values to formulate a response. For example a terminal state 348 may be accessed. The terminal state 348 may include whether a computer terminal is on, being used, is on standby/screen saver mode. The terminal state 348 may include whether the phone is off-hook or the do not disturb feature has been activated in order to formulate a response.
  • The [0086] rules engine component 330 also consults parameter values that are independently set by other applications, but are accessible to the rules engine component 330. For example, the rules engine component may consult a calendar 350 maintained by the call recipient to determine a probable location of the call recipient. Other potential databases may also be accessed to render information used by the rules engine component 330 to formulate a response.
  • Having described the components of the [0087] personal IMR application 202, attention is directed to FIG. 6 showing the steps performed in response to a received call to a recipient with an activated personal IMR application 202. During step 400 a call is received by the personal IMR for a particular caller. In response, during step 402 if the call (which may be a regular call, an email message, a web form, a fax, an instant message, etc.) is answered, then control passes to step 404 and the call proceeds as normal. That is, response mechanisms of the personal IMR are not invoked. Control then passes to the End 406 which corresponds to the end of a call.
  • If the call is not answered by the call recipient during [0088] step 402, then control passes to step 408. At step 408 the IMR application 202 determines the identity of the caller and whether response rules exist for the caller and the current mode of access used by the caller to reach the recipient. If a set of rules have been established for the identified caller and the identified mode of access, then control passes to step 410 wherein the rules engine component 330 processes the call in accordance with a configured response options (specified for both the caller and the recipient) and the present status and data values for the call recipient. The media or manner in which the response is provided is not limited to voice response. Rather the response may take the form of a call queue wherein the caller placed behind other callers who are on hold. The response may be activation of a find me application which seeks to track down the intended call recipient by referencing a calendar or day planner database, or by forwarding the call to a number specified by the recipient. The response may request the caller to leave a message—which could be placed in a voice mailbox, email box or an instant message for the recipient. The responses are not limited to the above identified response types, rather the responses are intended to be an extensible set that are added in accordance with new modes of access and channels by which a recipient can request further actions by the caller when the recipient is unavailable or unable to take a call. Control then passes from step 410 to the End 406.
  • If during step [0089] 408 a set of rules cannot be identified for the particular caller, then control passes to step 412. At step 412 the capabilities of the caller's terminal are determined. Step 412 involves gaining sufficient information about the caller's mode of access to select a proper interface and options to be implemented by the terminal abstraction component 320 of the personal IMR application 202.
  • After determining the traits of the caller's mode of access, control passes to step [0090] 414 wherein the caller is presented a menu comprising a set of IMR actions. The user interface of the menu is tailored by the personal IMR application 202 to the caller's mode of access and carried out by the terminal abstraction component 320 according to the caller's mode of access.
  • The caller may select from the menu an option to play a voice menu for a voice access terminal. Another selection is to allow the caller to send an instant message to the terminal of the call recipient—based for example on the determination by the [0091] personal IMR application 202 that the recipient's terminal is on. The caller is presented the opportunity to send an email message to the email box associated with the call recipient. Yet another exemplary response is sending a browser menu in the event that the caller terminal is an Internet Protocol terminal. The set of multimedia options presented to a caller by the personal IMR application 202 is by no means limited to the above examples. The potential selections in the menu of options selectable by the caller include playing or sending menus to presenting options to callers according to the mode of access used by the caller to contact the call recipient.
  • At [0092] step 416, the personal IMR application 202 receives a response from the caller based upon the set of options provided to the caller during step 414. Control then passes to step 410, described previously above, wherein the caller selection is processed by the rules engine component 330 based upon the configured response and the status and data parameters for the call recipient. Control then passes to the End 406. It should be understood that the above described sequence of steps performed by a personal IMR application are illustrative, and that those skilled in the art will recognize that the personal IMR application can be performed in a multitude of ways.
  • Having described a set of voice applications accessed via the network interface/server [0093] 114 (or any other suitable communications server) and having further described an example of the terminal abstraction architecture in the form of a personal IMR application 202, attention is now directed to FIGS. 7 and 8 depicting and summarizing the voice print application 200. A public switched telephone network 510 (or other suitable network) connects users having access to any phone such as phone 512 to a network communications server 516. A user may alternatively call into the network communications server 516 via a premise telephone 514 that is directly connected to the network communications server 516 as shown in FIG. 7 (in the event that a PBX hub is built into the network communications server 516). In other embodiments, a PBX hub is interposed between the premise telephone 514 and the network communications server 516. The type of end terminal need not be limited to the above described phones. Rather, the “phone” may comprise, by way of example, a microphone equipped personal computer 518 or an Internet Protocol phone 520 connected to the network communications server 516 via a LAN link 522. The communications server 516 includes a number of applications such as the aforementioned applications 188. LAN link 522 also supports connections to other applications servers 524.
  • The [0094] network communications server 516 executes a voice print application 526 including a voice print authentication database 530. The voice print authentication database 530 includes multiple entries corresponding to each of the authorized users of the system. An identification field 532 within each user entry comprises a unique user identification. The unique user identification is used to reference a proper voice print challenge and pre-stored expected response from the user.
  • A voice print [0095] key field 534 stores multiple challenge/response pairs for each user. During a user voice logon, one or more of the challenge/response pairs are variably selected (e.g., randomly/pseudo-randomly from a set) to facilitate authenticating the user. A user identification/password field 536 includes the alphanumeric sequences for logging a user onto the system (e.g., a network domain, a specific application, etc.). The information within the user identification/password field 536 is sensitive in nature and must be secure both within the database 530 and when transmitted to a domain controller 540 during logon.
  • It is noted that while not specifically identified in the drawings, the voice [0096] print authentication database 530 includes a file of queries enabling the computer network data interface/server 216 to transmit challenge queries to an identified user in order to prompt a response. In cases where a large quantity of potential questions are stored, the questions themselves can be stored as text. The text of a query is retrieved and converted to speech by a TTS converter. The query is not to be confused with the expected response(s) that are stored as a digital file representing a vocal recording of the speaker during a learning phase.
  • As previously mentioned, the queries are such that a variable response is required. The query itself need not be variable. For example, the question may request the user to repeat a present date and time furnished by the voice print application. In another example of a variable response, the questions themselves are indeed variable between logon attempts. The contents of the [0097] identification field 532 and the identification/password field 536 are used to log an authenticated user onto the system via a standard Windows challenge response mechanism utilizing the domain controller 540.
  • Turning now to FIG. 8, an exemplary set of steps are depicted for invoking and executing a user logon procedure that compares a user's vocal query response to one or more stored voice samples corresponding to an expected response to authenticate an authorized user. In a secure system, the comparison and successful match of a response to a pre-stored sample is a precondition to granting access to the data and other resources available to the user via the [0098] communications server 516. Thus, in response to receiving a call during step 600 from a user requesting authentication, control passes to step 602 wherein the communications server 516 routes the request to the voice applications 188, and more particularly the voice print application 200.
  • At [0099] step 604, the voice print application 200 invokes operations within the communications server 516 to issue a prompt (preferably audible, but may be text in the case of text interfaces available on personal computers and some phones today) to the user to submit a user identification. Next, during step 606 the communications server 516 receives the user's identification. The user identification may be in the form of a sequence of touch tones or alternatively spoken words. The response is converted to an alphanumeric sequence that is then used to access an entry corresponding to the user within the voice print authentication database 530. Assuming a corresponding entry is located within the database 530, control passes to step 608.
  • At [0100] step 608, the voice print application 200 variably selects a challenge query from the corresponding voice print key field 534. The form of the query may be a request to repeat a word, phrase, or sequence of numbers. For example, the voice print application 200 selects a request out of a pool of potential requests and couples the query with a request for the speaker to speak today's date (e.g. “Please say Seattle and today's date”). In this particular example, it is reasonably assured that the combination of words and phrases in the response will be unique every time an authorized user logs onto the system. An important factor in the variable logon request scheme is that there is a low likelihood that a particular request will be repeated by the voice print application 200. Thus the voice print application provides assurance that expected user responses will be unique and reduces the system's vulnerability to imposter attacks. Alternatively the query may comprise one or more questions from a set of personal questions answered by the user during a secure registration process. The query is transmitted to the user by the communications server 516.
  • Next, during [0101] step 610, the communications server 516 receives the identified user's audible response, and the response is forwarded to the voice print application 200. The voice print application 200 compares the user's response to a pre-stored reference response (or set of responses). At step 612, if the user's response comes within an acceptable range of similarity to the pre-stored reference response, then the identified user is considered authentic by the voice print application 200 and control passes to step 614.
  • At [0102] step 614 the voice print application 200 creates a virtual user desktop for the authenticated user and logs into the domain with the cached user credentials that are stored in the voice print application 200. A MICROSOFT TERMINAL SERVER could be used for the virtual desktop and operate on behalf of the user. The voice print application 200 retrieves the contents of the network identification/password field 536 from the voice print authentication database 530 and a logon proxy submits a logon request via a password notification message to the connected domain controller 540. Thereafter, the voice print application 200 creates an application proxy that holds the credentials for the authenticated user. In a network environment, the application proxy would have all the credentials of the user as if the user had logged in locally via a personal computer or remotely over a remote access server (RAS).
  • During [0103] step 616, the application proxy created during step 614 carries out requests received from the authenticated user. The user requests may be either vocal or electronically generated (e.g., touch tone). Examples of network resources that may be directly accessed by the application proxy include: email requests that are accessed and read back to the authenticated user; a personal IMR editor (e.g., change a forwarding number); Internet sites that are accessed, for example, via an Web telephony engine; and a database that is selectively accessed according to the authenticated user's credentials assigned during the logon step 614. The application proxy created by the voice print application 200 may interact with other applications that in turn access computer resources. The application proxy could also utilize Microsoft's accessibility features and allow a user to fully interact with the terminal server virtual desktop and applications similar to how a sight-impaired user interacts with a PC monitor. When a user hangs up the phone, the session is terminated and control passes to the End.
  • If at [0104] step 612, the voice print application 200 determines that the user's audible response is not sufficiently similar to the pre-stored reference response (or responses), then control passes to step 618 wherein the voice print application rejects the user logon request and control passes to the End. However, in an alternative embodiment of the present invention, the user may be allowed multiple tries to logon, in such a case an event log will tally an unsuccessful logon attempt by a user during step 618 and return to step 308 (or a variation thereof where the user is merely asked to repeat a previous response).
  • The voice print application will repeat the query/response cycle until the number of successive failures reaches a limit and then control passes to the End. Those skilled in the art will appreciate that there are numerous ways to gauge whether a match of a response and a pre-stored sample has occurred, and various the challenge/response/match cycle may be repeated multiple times to ensure that a user is authentic—even in instances where a match has occurred. Therefore, there is no intention to limit the present invention to the illustrative challenge/response/match sequence depicted in FIG. 8. [0105]
  • Having described the [0106] voice print application 200, attention is now directed to the previously mentioned distributed conference bridge application 204 with reference to FIGS. 9 and 10. FIG. 9 provides an exemplary conference call arrangement wherein part of a distributed conference bridge arrangement comprising 10 trunk lines is handled by an internal conference bridge 700 within the network interface/server 114. The PBX system within the network interface/server 114 handles more than the ten trunk lines needed for the conference. However, the internal conference bridge 700 can only connect six callers for a conference involving ten different lines. Therefore, the remaining participants are connected to an external conference bridge 702. A conference connection 710 between the internal conference bridge 700 and the external conference bridge 702 merges the two conference bridges into a single, distributed conference bridge. The conference call includes callers attached via the PSTN as well as locally connected phones within the PBX such as phone 704.
  • The dotted connection lines in FIG. 9 illustratively depict that even though the actual connection of a portion of the participants to the conference occurs through the [0107] external bridge 702, this connection is transparent to the participants. All conference participants follow procedures for connecting to the internal conference bridge 700. The system handles re-direction of calls to the connected external bridge 702. The example in FIG. 9 includes only telephone end points. However, it is noted that the method and apparatus for building and controlling a distributed conference bridge, described below with reference to FIG. 10 is applicable to Internet Protocol terminals (e.g., in a Net Meeting application), video conferences, and wireless end-terminals—even hybrid conference call arrangements.
  • Turning to FIG. 10, the steps are summarized for setting up a distributed conference bridge including both an internal conference bridge and external conference bridge as depicted in FIG. 9. Prior to commencing set up of a conference call, during [0108] step 800 the network interface/server 114 is configured. Assignment of lines to the internal conference bridge during configuration is accomplished via a graphical or voice user interface presented to the arranger of the conference call via a logged on computer or other end-terminal or rules logic assigned to the conference bridge application. The set up interface is tailored by a terminal abstraction module of the distributed conference bridge application-based upon the type of terminal used to perform the configuration. During the configuration a threshold is specified. The threshold corresponds to the maximum number of lines (including a value of zero) that can be connected into the internal conference bridge 700 when the conference call is set up. Configuration also includes designating the total number of callers expected to participate in the call. An external conference bridge service is notified of the need for external conference bridge resources.
  • After configuring the distributed conference bridge, decision-making and call routing processes executed by the distributed [0109] conference bridge application 204 carry out automated assembly/set-up of a phone conference. The phone conference includes both an internal conference bridge associated with the PBX system of the user and an external conference bridge provided by an outside phone services vendor. In particular, during step 802 the network interface/server 114 connects callers into the internal conference bridge 700 until the threshold has been reached. In particular, during step 802 the network interface/server 114 determines whether the threshold has been reached. If the threshold has not been reached, then a next caller is connected to the internal conference bridge 700. If the threshold has been reached, then control passes to step 804 wherein one of the bridge connections of the internal conference bridge 700 is used to automatically establish a conference linkage to the external conference bridge utilizing automatic dialing functions supported by the network interface/server 114. The connection between the internal bridge 700 and the external bridge 702 is established through QSIG, PINT, in band signaling, or data exchange across the Internet between two conference bridge servers. Control then passes to step 806.
  • At [0110] step 806, the network interface/server 114, under the control of the distributed conference bridge application 204, automatically signals the central office controlling the head end telephone number for the customer's conference bridge using the PINT, QSIG, or in-band Remote Call Forwarding to redirect callers to a head end telephone number corresponding to the bridged conference bridge. The remaining callers are connected to the external conference bridge 702 without their calls ever reaching the PBX supporting the internal conference bridge 700. By intercepting the calls at the central office and forwarding them to the external conference bridge, the distributed conference bridge application prevents calls by the externally connected participants from tying up trunk lines to a PBX system supporting the internal portion of the phone conference. Participants in the conference are unaware that their call was redirected. There is no change in end user's procedure to connect to the external conference bridge 702 or reduction of features from users that connected to the customer's conference bridge. The conference call continues to completion.
  • Illustrative embodiments of the present invention and certain variations thereof have been provided in the Figures and accompanying written description. Those skilled in the art will readily appreciate from the above disclosure that many variations to the disclosed embodiment are possible including for example using alternative program and data structures. For example, while a particular arrangement of processes is presented in FIG. 3 for implementing a computer network data interface/server (or more generally, a communications server), other arrangements may be used without deviating from the invention. Also, the order of performing the disclosed steps is subject to modification without departing from the scope of the present invention. The manner in which the general steps themselves are carried out may be modified in alternative embodiments of the invention. The present invention is not intended to be limited to the specifically disclosed exemplary embodiments. Rather the present invention is intended to cover the disclosed embodiments as well as others falling within the scope and spirit of the invention to the fullest extent permitted in view of this disclosure and the inventions defined by the claims herein below. [0111]

Claims (20)

1.-13. (Canceled)
14. A method for providing access to networked computer resources through a set of different end devices utilizing differing user interfaces, the method comprising the steps of:
providing a terminal abstraction configured to enable communication with a plurality of applications, the terminal abstraction including:
an external input interface for receiving a first message in an end device communication format;
a protocol converter coupled to the external input interface, for receiving the first message and transforming the first message into a second message in an end device independent format, the end device independent format recognized by a first application to which the second message is sent, the transforming of the first message into the end device independent format enabling communication between the first application and the set of differing end devices utilizing differing user interfaces, the protocol converter responsive to a rules engine configured to determine a method of communication; and
an application functional resource interface coupled to the protocol converter, for enabling transmitting the second message in end device independent format to functional resources of the first application; and
providing an extensible set of application programs, including at least the first application, the extensible set of application programs providing access to the networked computer resources.
15. A computer-readable media including computer-executable instructions for performing a set of steps for providing access to networked computer resources through a set of different end devices utilizing differing user interfaces, the steps including:
providing a terminal abstraction configured to enable communication with a plurality of applications, the terminal abstraction including:
an external input interface for receiving a first message in an end device communication format;
a protocol converter coupled to the external input interface, for receiving the first message and transforming the first message into a second message in an end device independent format, the end device independent format recognized by a first application to which the second message is sent, the transforming of the first message into the end device independent format enabling communication between the first application and the set of differing end devices utilizing differing message formats, the protocol converter responsive to a rules engine configured to determine a method of communication; and
an application functional resource interface coupled to the protocol converter, for enabling transmitting the second message in end device independent format to functional resources of the first application; and
providing an extensible set of application programs, including at least the first application, the extensible set of application programs providing access to the networked computer resources.
16. A personal interactive multimedia response (IMR) system including:
an end-terminal-to-application interface providing access to functional components of an interactive multimedia response application by a plurality of end-devices having user interfaces of multiple types, including graphical and voice user interfaces, the end-terminal-to-application interface comprising a terminal abstraction configured to, at least, transform communications from each of the plurality of end-devices into messages having an end-device-independent format;
a set of individually configurable rules defining actions of the personal interactive multimedia response system for responding to calls to a specified recipient; and
a rules engine having access to the set of individually configurable rules and formulating a response to a call according to the set of individually configurable rules and present values for a set of status variables, including at least one status variable corresponding to the mode of access used by the end-device, the rules engine configured to determine a method of communication.
17. The personal interactive multimedia response system of claim 16 wherein the terminal abstraction is interposed between functional resources of the personal IMR system and the plurality of end-devices in order to provide the functional resources in a manner tailored to individual ones of a variety of user interfaces, including graphical and voice user interfaces, the terminal abstraction further comprising:
a graphical user interface terminal abstraction component interposed between the functional resources and a first end-device supporting a graphical user interface, the graphical user interface terminal abstraction component transforming messages from the first end-device to a generic format expected by the functional resources, the graphical user interface terminal abstraction component further transforming messages from the functional resources to a first end-device format expected by the first end-device; and
a voice user interface terminal abstraction component interposed between the functional resources and a second end-device supporting a voice user interface, the voice user interface terminal abstraction component transforming messages from the second end-device to a generic format expected by the functional resources, the voice user interface terminal abstraction component further transforming messages from the functional resources to a second end-device format expected by the second end-device.
18. The personal IMR system of claim 16 further comprising a registration component enabling designating a manner of interaction between a caller and the personal IMR system.
19. The personal IMR system of claim 16 wherein the set of status variables comprises the state of the user's terminal.
20. The personal IMR system of claim 16 wherein the set of status variables comprises appointment calendar entries.
21. A method for providing a personal interactive multimedia response (IMR) system for end-users, the method comprising the steps of:
executing an end-terminal-to-application interface providing access to functional components of an interactive multimedia response application by a plurality of end-devices having user interfaces of multiple types, including graphical and voice user interfaces, the end-terminal-to-application interface comprising a terminal abstraction configured to, at least, transform communications from each of the plurality of end-devices into messages having an end-device-independent format;
maintaining a set of individually configurable rules defining actions of the personal interactive multimedia response system for responding to calls to a specified recipient; and
operating a rules engine having access to the set of individually configurable rules and formulating a response to a call according to the set of individually configurable rules and present values for a set of status variables, including at least one status variable corresponding to the mode of access used by the end-device, the rules engine configured to determine a method of communication.
22. The method of claim 21 further comprising the step of registering a caller, said registration step comprising determining the manner in which the caller has accessed the personal IMR system.
23. The method of claim 21 wherein the formulating a response includes providing a response tailored to the manner in which a caller has accessed the personal IMR system.
24. The method of claim 21 wherein the manner in which a caller has accessed the personal IMR system involves a computer terminal.
25. The method of claim 21 wherein the manner in which a caller has accessed the personal IMR system involves a telephone.
26. A computer-readable media including computer-executable instructions for performing a set of steps to provide a personal interactive multimedia response system for end-users, the steps including:
executing an end-terminal-to-application interface providing access to functional components of an interactive multimedia response application by a plurality of end-devices having user interfaces of multiple types, including graphical and voice user interfaces, the end-terminal-to-application interface comprising a terminal abstraction configured to, at least, transform communications from each of the plurality of end-devices into messages having an end-device-independent format;
maintaining a set of individually configurable rules defining actions of the personal interactive multimedia response system for responding to calls to a specified recipient; and
operating a rules engine having access to the set of individually configurable rules and formulating a response to a call according to the set of individually configurable rules and present values for a set of status variables, including at least one status variable corresponding to the mode of access used by the end-device, the rules engine configured to determine a method of communication based on the status variable.
27.-37. (Canceled)
38. The method of claim 14, wherein the terminal abstraction further includes:
a graphical user interface terminal abstraction component configured to, at least, transform a message from an end device supporting a graphical user interface into the second message in the end device independent format; and
a voice user interface terminal abstraction component configured to, at least, transform a message from an end device supporting a voice user interface into the second message in the end device independent format.
39. The computer-readable media of claim 15, wherein the terminal abstraction further includes:
a graphical user interface terminal abstraction component configured to, at least, transform a message from an end device supporting a graphical user interface into the second message in the end device independent format; and
a voice user interface terminal abstraction component configured to, at least, transform a message from an end device supporting a voice user interface into the second message in the end device independent format.
40. The computer-readable media of claim 16, wherein the terminal abstraction comprises:
a graphical user interface terminal abstraction component configured to, at least, transform communications from each of the plurality of end-devices that support a graphical user interface into messages having the end-device-independent format; and
a voice user interface terminal abstraction component configured to, at least, transform communications from each of the plurality of end-devices that support a voice user interface into messages having the end-device-independent format.
41. The computer-readable media of claim 21, wherein the terminal abstraction comprises:
a graphical user interface terminal abstraction component configured to, at least, transform communications from each of the plurality of end-devices that support a graphical user interface into messages having the end-device-independent format; and
a voice user interface terminal abstraction component configured to, at least, transform communications from each of the plurality of end-devices that support a voice user interface into messages having the end-device-independent format.
42. The computer-readable media of claim 26, wherein the terminal abstraction comprises:
a graphical user interface terminal abstraction component configured to, at least, transform communications from each of the plurality of end-devices that support a graphical user interface into messages having the end-device-independent format; and
a voice user interface terminal abstraction component configured to, at least, transform communications from each of the plurality of end-devices that support a voice user interface into messages having the end-device-independent format.
US10/875,914 2000-02-11 2004-06-24 Multi-access mode electronic personal assistant Abandoned US20040230689A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/875,914 US20040230689A1 (en) 2000-02-11 2004-06-24 Multi-access mode electronic personal assistant
US12/144,626 US8406399B2 (en) 2000-02-11 2008-06-24 Distributed conference bridge and voice authentication for access to networked computer resources

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/503,602 US6895558B1 (en) 2000-02-11 2000-02-11 Multi-access mode electronic personal assistant
US10/875,914 US20040230689A1 (en) 2000-02-11 2004-06-24 Multi-access mode electronic personal assistant

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/503,602 Continuation US6895558B1 (en) 2000-02-11 2000-02-11 Multi-access mode electronic personal assistant

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/144,626 Continuation US8406399B2 (en) 2000-02-11 2008-06-24 Distributed conference bridge and voice authentication for access to networked computer resources

Publications (1)

Publication Number Publication Date
US20040230689A1 true US20040230689A1 (en) 2004-11-18

Family

ID=33418510

Family Applications (3)

Application Number Title Priority Date Filing Date
US09/503,602 Expired - Lifetime US6895558B1 (en) 2000-02-11 2000-02-11 Multi-access mode electronic personal assistant
US10/875,914 Abandoned US20040230689A1 (en) 2000-02-11 2004-06-24 Multi-access mode electronic personal assistant
US12/144,626 Expired - Fee Related US8406399B2 (en) 2000-02-11 2008-06-24 Distributed conference bridge and voice authentication for access to networked computer resources

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/503,602 Expired - Lifetime US6895558B1 (en) 2000-02-11 2000-02-11 Multi-access mode electronic personal assistant

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/144,626 Expired - Fee Related US8406399B2 (en) 2000-02-11 2008-06-24 Distributed conference bridge and voice authentication for access to networked computer resources

Country Status (1)

Country Link
US (3) US6895558B1 (en)

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030233555A1 (en) * 2000-03-09 2003-12-18 Yigal Shusteri Secure system for smartcard transactions
US20040075675A1 (en) * 2002-10-17 2004-04-22 Tommi Raivisto Apparatus and method for accessing services via a mobile terminal
US20040203611A1 (en) * 2002-05-31 2004-10-14 Laporta Thomas F. Architecture and services for wireless data
US20040255041A1 (en) * 2003-06-12 2004-12-16 Shih-Li Wen System and method for multimedia messages interchange between different communication interfaces
EP1755305A1 (en) * 2005-08-17 2007-02-21 Alcatel Apparatus to administrate the joining of parallel multimedia sessions to principal multimedia sessions in a communication network
US20070047719A1 (en) * 2005-09-01 2007-03-01 Vishal Dhawan Voice application network platform
US20070189481A1 (en) * 2006-01-27 2007-08-16 Microsoft Corporation Telephone call routing
US20080084987A1 (en) * 2006-09-22 2008-04-10 Sprint Communications Company L.P. Content switch for enhancing directory assistance
US20080120101A1 (en) * 2006-11-16 2008-05-22 Cisco Technology, Inc. Conference question and answer management
US20080195395A1 (en) * 2007-02-08 2008-08-14 Jonghae Kim System and method for telephonic voice and speech authentication
US20080260169A1 (en) * 2006-11-06 2008-10-23 Plantronics, Inc. Headset Derived Real Time Presence And Communication Systems And Methods
US20080310402A1 (en) * 2001-11-27 2008-12-18 Verizon Business Global Llc Communication systems and qsig communications methods
US20090202060A1 (en) * 2008-02-11 2009-08-13 Kim Moon J Telephonic voice authentication and display
US20090279676A1 (en) * 2007-10-23 2009-11-12 Nicholas Zazza Systems and methods for delivering computer implemented voicemails
US20100158215A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for announcing and routing incoming telephone calls using a distributed voice application execution system architecture
US20100161426A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for providing television programming recommendations and for automated tuning and recordation of television programs
US20100158230A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for performing certain actions based upon a dialed telephone number
US20100158208A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for connecting a user to business services
US20100158207A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for verifying the identity of a user by voiceprint analysis
US20100158219A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for interacting with a user via a variable volume and variable tone audio prompt
US20100158218A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for providing interactive services
US20100158217A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for placing telephone calls using a distributed voice application execution system architecture
US20100166161A1 (en) * 2005-09-01 2010-07-01 Vishal Dhawan System and methods for providing voice messaging services
US20100223494A1 (en) * 2008-12-17 2010-09-02 Tristan Barnum Degenhardt System and method for providing ip pbx service
US7809663B1 (en) 2006-05-22 2010-10-05 Convergys Cmg Utah, Inc. System and method for supporting the utilization of machine language
US20110164537A1 (en) * 2008-09-29 2011-07-07 Yigang Cai Call response services in ims networks for businesses
US20120271643A1 (en) * 2006-12-19 2012-10-25 Nuance Communications, Inc. Inferring switching conditions for switching between modalities in a speech application environment extended for interactive text exchanges
US8379830B1 (en) 2006-05-22 2013-02-19 Convergys Customer Management Delaware Llc System and method for automated customer service with contingent live interaction
US8452668B1 (en) 2006-03-02 2013-05-28 Convergys Customer Management Delaware Llc System for closed loop decisionmaking in an automated care system
US20150201074A1 (en) * 2007-03-23 2015-07-16 At&T Mobility Ii Llc Dynamic Voicemail Receptionist System
US20150213453A1 (en) * 2008-08-28 2015-07-30 Ebay Inc. Voice phone-based method and system to authenticate users
US20160191520A1 (en) * 2003-12-30 2016-06-30 Entrust, Inc. Offline methods for authentication in a client/server authentication system
US10187517B1 (en) * 2013-12-13 2019-01-22 West Corporation Reduction in network congestion
US20190149348A1 (en) * 2017-11-15 2019-05-16 Eliahu Antopolsky Recording System with Personal Keys for Personal Meetings with Service Providers
CN110622126A (en) * 2017-05-15 2019-12-27 谷歌有限责任公司 Providing access to user-controlled resources through automated assistant
US10733278B2 (en) * 2018-02-21 2020-08-04 Verizon Patent And Licensing Inc. System and method of retrieving and conveying sensitive information when using voice command devices
US11102342B2 (en) 2005-09-01 2021-08-24 Xtone, Inc. System and method for displaying the history of a user's interaction with a voice application
US20220083687A1 (en) 2018-08-07 2022-03-17 Google Llc Threshold-based assembly of remote automated assistant responses
US11574071B2 (en) 2020-07-28 2023-02-07 Bank Of America Corporation Reliability of information security controls for attack readiness
US12126750B2 (en) 2024-01-15 2024-10-22 Xtone, Inc. Voice application network platform

Families Citing this family (317)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU6630800A (en) 1999-08-13 2001-03-13 Pixo, Inc. Methods and apparatuses for display and traversing of links in page character array
US7206746B1 (en) * 1999-11-09 2007-04-17 West Corporation Third party verification system
US8645137B2 (en) 2000-03-16 2014-02-04 Apple Inc. Fast, language-independent method for user authentication by voice
US7334050B2 (en) * 2000-06-07 2008-02-19 Nvidia International, Inc. Voice applications and voice-based interface
US7590539B1 (en) 2000-06-28 2009-09-15 At&T Intellectual Property I, L.P. System and method for email notification
US6697858B1 (en) * 2000-08-14 2004-02-24 Telephony@Work Call center
US20020026419A1 (en) * 2000-08-24 2002-02-28 Sony Electronics, Inc. Apparatus and method for populating a portable smart device
US7673241B2 (en) * 2002-06-26 2010-03-02 Siebel Systems, Inc. User interface for multi-media communication for the visually disabled
JP2002175274A (en) * 2000-12-06 2002-06-21 Sony Corp Information processing device and information processing method, network system, storage medium, and computer program
US7188110B1 (en) * 2000-12-11 2007-03-06 Sony Corporation Secure and convenient method and apparatus for storing and transmitting telephony-based data
US7581230B2 (en) * 2001-02-06 2009-08-25 Siebel Systems, Inc. Adaptive communication application programming interface
JP2002279141A (en) * 2001-03-19 2002-09-27 Ricoh Co Ltd Information display system, information display method, information display server and information display program
US7315616B2 (en) * 2001-03-31 2008-01-01 Siebel Systems, Inc. System and method for maintaining real-time agent information for multi-channel communication queuing
DE10117679B4 (en) * 2001-04-09 2006-04-27 Siemens Ag A method of exchanging messages and information during a telephone conference
US7103171B1 (en) * 2001-06-29 2006-09-05 Siebel Systems, Inc. System and method for multi-channel communication queuing using routing and escalation rules
US7062718B2 (en) * 2001-08-14 2006-06-13 National Instruments Corporation Configuration diagram which graphically displays program relationship
ITFI20010199A1 (en) * 2001-10-22 2003-04-22 Riccardo Vieri SYSTEM AND METHOD TO TRANSFORM TEXTUAL COMMUNICATIONS INTO VOICE AND SEND THEM WITH AN INTERNET CONNECTION TO ANY TELEPHONE SYSTEM
US7089280B1 (en) 2001-11-02 2006-08-08 Sprint Spectrum L.P. Autonomous eclone
US8091042B2 (en) 2001-11-15 2012-01-03 Siebel Systems, Inc. Apparatus and method for displaying selectable icons in a toolbar for a user interface
US7139565B2 (en) 2002-01-08 2006-11-21 Seven Networks, Inc. Connection architecture for a mobile network
US7203907B2 (en) * 2002-02-07 2007-04-10 Sap Aktiengesellschaft Multi-modal synchronization
US7962644B1 (en) 2002-03-18 2011-06-14 Oracle International Corporation Systems and methods for handling a plurality of communications
US7113169B2 (en) * 2002-03-18 2006-09-26 The United States Of America As Represented By The Secretary Of The Air Force Apparatus and method for a multiple-user interface to interactive information displays
US7958144B2 (en) * 2002-08-30 2011-06-07 Boss Logic, Llc System and method for secure reciprocal exchange of data
GB2394801A (en) * 2002-10-30 2004-05-05 Hewlett Packard Co Remote worker's display device
US7573999B2 (en) 2002-12-31 2009-08-11 At&T Intellectual Property I, L.P. Computer telephony integration (CTI) complete healthcare contact center
US20040128342A1 (en) * 2002-12-31 2004-07-01 International Business Machines Corporation System and method for providing multi-modal interactive streaming media applications
US7620170B2 (en) * 2002-12-31 2009-11-17 At&T Intellectual Property I, L.P. Computer telephony integration (CTI) complete customer contact center
US7853563B2 (en) 2005-08-01 2010-12-14 Seven Networks, Inc. Universal data aggregation
US7917468B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US7248688B2 (en) 2003-01-27 2007-07-24 Bellsouth Intellectual Property Corporation Virtual physician office systems and methods
US20040165580A1 (en) * 2003-02-25 2004-08-26 Stillman Scott Traynham Checking of broadband network components
US7669134B1 (en) 2003-05-02 2010-02-23 Apple Inc. Method and apparatus for displaying information during an instant messaging session
US7424537B2 (en) * 2003-07-21 2008-09-09 International Business Machines Corporation Communication capability coupons
WO2005027478A1 (en) * 2003-09-11 2005-03-24 Voice Signal Technologies, Inc. Automatic voice addressing and messaging methods and apparatus
US7546343B2 (en) * 2003-09-23 2009-06-09 Alcatel-Lucent Usa Inc. System and method for supporting virtual conferences
US7609820B2 (en) * 2003-11-12 2009-10-27 At&T Intellectual Property I, L.P. Identification and management of automatically-generated voicemail notifications of voicemail and electronic mail receipt
US20050125541A1 (en) * 2003-12-04 2005-06-09 Randall Frank Integrating multiple communication modes
US20050141479A1 (en) * 2003-12-31 2005-06-30 Timucin Ozugur Presence-based routing in a communications network environment
US20050141687A1 (en) * 2003-12-31 2005-06-30 Timucin Ozugur Call treatment in a communications system based on instant messaging
US7675903B2 (en) * 2004-02-06 2010-03-09 Alcatel Lucent Dynamic contact list management system and method
JP2005339237A (en) * 2004-05-27 2005-12-08 Aruze Corp Application usage assisting system
US7616764B2 (en) * 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
US7441271B2 (en) 2004-10-20 2008-10-21 Seven Networks Method and apparatus for intercepting events in a communication system
US8010082B2 (en) 2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture
US7706781B2 (en) 2004-11-22 2010-04-27 Seven Networks International Oy Data security in a mobile e-mail service
FI117152B (en) 2004-12-03 2006-06-30 Seven Networks Internat Oy E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful
US8762541B2 (en) * 2005-02-25 2014-06-24 Siemens Enterprise Communications, Inc. Systems and methods for routing a communications link
US7752633B1 (en) 2005-03-14 2010-07-06 Seven Networks, Inc. Cross-platform event engine
US7796742B1 (en) 2005-04-21 2010-09-14 Seven Networks, Inc. Systems and methods for simplified provisioning
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US8885812B2 (en) 2005-05-17 2014-11-11 Oracle International Corporation Dynamic customer satisfaction routing
WO2006136660A1 (en) 2005-06-21 2006-12-28 Seven Networks International Oy Maintaining an ip connection in a mobile network
JP4375288B2 (en) * 2005-06-23 2009-12-02 コニカミノルタビジネステクノロジーズ株式会社 User interface device, user interface device control method, and user interface device control program
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US7844037B2 (en) 2005-08-08 2010-11-30 Palm, Inc. Method and device for enabling message responses to incoming phone calls
US8583466B2 (en) * 2005-08-09 2013-11-12 Oracle International Corporation System and method for routing workflow items based on workflow templates in a call center
US8677377B2 (en) 2005-09-08 2014-03-18 Apple Inc. Method and apparatus for building an intelligent automated assistant
US7633076B2 (en) 2005-09-30 2009-12-15 Apple Inc. Automated response to and sensing of user activity in portable devices
US8942367B1 (en) * 2005-10-31 2015-01-27 At&T Intellectual Property Ii, L.P. Method and apparatus for routing a call in a communications network
US7921456B2 (en) 2005-12-30 2011-04-05 Microsoft Corporation E-mail based user authentication
US7769395B2 (en) 2006-06-20 2010-08-03 Seven Networks, Inc. Location-based operations and messaging
US8739278B2 (en) * 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
US20080005011A1 (en) * 2006-06-14 2008-01-03 Microsoft Corporation Managing information solicitations across a network
US20080004880A1 (en) * 2006-06-15 2008-01-03 Microsoft Corporation Personalized speech services across a network
US20070294349A1 (en) * 2006-06-15 2007-12-20 Microsoft Corporation Performing tasks based on status information
US20080010124A1 (en) * 2006-06-27 2008-01-10 Microsoft Corporation Managing commitments of time across a network
US20080040437A1 (en) * 2006-08-10 2008-02-14 Mayank Agarwal Mobile Social Networking Platform
US7996467B2 (en) * 2006-08-29 2011-08-09 Oracle International Corporation Techniques for applying policies for real time collaboration
US9318108B2 (en) 2010-01-18 2016-04-19 Apple Inc. Intelligent automated assistant
US9106422B2 (en) * 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
US20080148014A1 (en) * 2006-12-15 2008-06-19 Christophe Boulange Method and system for providing a response to a user instruction in accordance with a process specified in a high level service description language
US8799369B2 (en) * 2007-02-23 2014-08-05 At&T Intellectual Property I, L.P. Recipient-controlled remote E-mail alerting and delivery
US8719348B2 (en) * 2007-02-23 2014-05-06 At&T Intellectual Property I, L.P. Sender-controlled remote e-mail alerting and delivery
US8977255B2 (en) 2007-04-03 2015-03-10 Apple Inc. Method and system for operating a multi-function portable electronic device using voice-activation
US7286661B1 (en) * 2007-05-01 2007-10-23 Unison Technologies Llc Systems and methods for scalable hunt-group management
US20080273678A1 (en) * 2007-05-01 2008-11-06 Igor Balk Systems and methods for phone call management
US20080285587A1 (en) * 2007-05-16 2008-11-20 Unison Technologies Llc Systems and methods for providing unified collaboration systems with user selectable reply format
US20080285588A1 (en) 2007-05-16 2008-11-20 Unison Technologies Llc Systems and methods for providing unified collaboration systems with combined communication log
US20080285736A1 (en) * 2007-05-16 2008-11-20 Unison Technolgies Llc Systems and methods for providing unified collaboration systems with conditional communication handling
US8693494B2 (en) 2007-06-01 2014-04-08 Seven Networks, Inc. Polling
US8805425B2 (en) 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
US9794348B2 (en) 2007-06-04 2017-10-17 Todd R. Smith Using voice commands from a mobile device to remotely access and control a computer
ITFI20070177A1 (en) 2007-07-26 2009-01-27 Riccardo Vieri SYSTEM FOR THE CREATION AND SETTING OF AN ADVERTISING CAMPAIGN DERIVING FROM THE INSERTION OF ADVERTISING MESSAGES WITHIN AN EXCHANGE OF MESSAGES AND METHOD FOR ITS FUNCTIONING.
US8644206B2 (en) 2007-08-17 2014-02-04 Qualcomm Incorporated Ad hoc service provider configuration for broadcasting service information
US20090046644A1 (en) * 2007-08-17 2009-02-19 Qualcomm Incorporated Service set manager for ad hoc mobile service provider
US20090047964A1 (en) 2007-08-17 2009-02-19 Qualcomm Incorporated Handoff in ad-hoc mobile broadband networks
US20090061833A1 (en) * 2007-08-30 2009-03-05 Junius Ho System, method and device to use messaging to implement programmatic actions
US9053089B2 (en) 2007-10-02 2015-06-09 Apple Inc. Part-of-speech tagging using latent analogy
US8165886B1 (en) 2007-10-04 2012-04-24 Great Northern Research LLC Speech interface system and method for control and interaction with applications on a computing system
US8595642B1 (en) 2007-10-04 2013-11-26 Great Northern Research, LLC Multiple shell multi faceted graphical user interface
US8364694B2 (en) 2007-10-26 2013-01-29 Apple Inc. Search assistant for digital media assets
US8620662B2 (en) 2007-11-20 2013-12-31 Apple Inc. Context-aware unit selection
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US8793305B2 (en) 2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service
US10002189B2 (en) 2007-12-20 2018-06-19 Apple Inc. Method and apparatus for searching using an active ontology
US9330720B2 (en) 2008-01-03 2016-05-03 Apple Inc. Methods and apparatus for altering audio output signals
US8327272B2 (en) 2008-01-06 2012-12-04 Apple Inc. Portable multifunction device, method, and graphical user interface for viewing and managing electronic calendars
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US20090193338A1 (en) 2008-01-28 2009-07-30 Trevor Fiatal Reducing network and battery consumption during content delivery and playback
US8825109B2 (en) * 2008-02-15 2014-09-02 Blackberry Limited Policy-based data routing for a multi-mode device
US8065143B2 (en) 2008-02-22 2011-11-22 Apple Inc. Providing text input using speech data and non-speech data
US8289283B2 (en) 2008-03-04 2012-10-16 Apple Inc. Language input interface on a device
US8996376B2 (en) 2008-04-05 2015-03-31 Apple Inc. Intelligent text-to-speech conversion
US8224714B2 (en) * 2008-05-01 2012-07-17 Microsoft Corporation Peer to peer network personal assistant
US10496753B2 (en) 2010-01-18 2019-12-03 Apple Inc. Automatically adapting user interfaces for hands-free interaction
US8464150B2 (en) 2008-06-07 2013-06-11 Apple Inc. Automatic language identification for dynamic text processing
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US20100030549A1 (en) 2008-07-31 2010-02-04 Lee Michael M Mobile device having human language translation capability with positional feedback
US8768702B2 (en) 2008-09-05 2014-07-01 Apple Inc. Multi-tiered voice feedback in an electronic device
US8898568B2 (en) 2008-09-09 2014-11-25 Apple Inc. Audio user interface
US20100082328A1 (en) * 2008-09-29 2010-04-01 Apple Inc. Systems and methods for speech preprocessing in text to speech synthesis
US8352272B2 (en) 2008-09-29 2013-01-08 Apple Inc. Systems and methods for text to speech synthesis
US8352268B2 (en) 2008-09-29 2013-01-08 Apple Inc. Systems and methods for selective rate of speech and speech preferences for text to speech synthesis
US8396714B2 (en) 2008-09-29 2013-03-12 Apple Inc. Systems and methods for concatenation of words in text to speech synthesis
US8712776B2 (en) 2008-09-29 2014-04-29 Apple Inc. Systems and methods for selective text to speech synthesis
US8583418B2 (en) 2008-09-29 2013-11-12 Apple Inc. Systems and methods of detecting language and natural language strings for text to speech synthesis
US8355919B2 (en) 2008-09-29 2013-01-15 Apple Inc. Systems and methods for text normalization for text to speech synthesis
US8676904B2 (en) 2008-10-02 2014-03-18 Apple Inc. Electronic devices with voice command and contextual data processing capabilities
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
WO2010067118A1 (en) 2008-12-11 2010-06-17 Novauris Technologies Limited Speech recognition involving a mobile device
US8380794B2 (en) * 2009-01-09 2013-02-19 International Business Machines Corporation Generating context aware data and conversation's mood level to determine the best method of communication
US8862252B2 (en) 2009-01-30 2014-10-14 Apple Inc. Audio user interface for displayless electronic device
US8380507B2 (en) 2009-03-09 2013-02-19 Apple Inc. Systems and methods for determining the language to use for speech generated by a text to speech engine
US10241752B2 (en) 2011-09-30 2019-03-26 Apple Inc. Interface for a virtual digital assistant
US9858925B2 (en) 2009-06-05 2018-01-02 Apple Inc. Using context information to facilitate processing of commands in a virtual assistant
US10241644B2 (en) 2011-06-03 2019-03-26 Apple Inc. Actionable reminder entries
US10255566B2 (en) 2011-06-03 2019-04-09 Apple Inc. Generating and processing task items that represent tasks to perform
US10540976B2 (en) 2009-06-05 2020-01-21 Apple Inc. Contextual voice commands
US8306191B2 (en) * 2009-06-12 2012-11-06 Avaya Inc. Caller recognition by voice messaging system
US9431006B2 (en) 2009-07-02 2016-08-30 Apple Inc. Methods and apparatuses for automatic speech recognition
US20110099507A1 (en) 2009-10-28 2011-04-28 Google Inc. Displaying a collection of interactive elements that trigger actions directed to an item
US8682649B2 (en) 2009-11-12 2014-03-25 Apple Inc. Sentiment prediction from textual data
US8600743B2 (en) 2010-01-06 2013-12-03 Apple Inc. Noise profile determination for voice-related feature
US8381107B2 (en) 2010-01-13 2013-02-19 Apple Inc. Adaptive audio feedback system and method
US8311838B2 (en) 2010-01-13 2012-11-13 Apple Inc. Devices and methods for identifying a prompt corresponding to a voice input in a sequence of prompts
US10276170B2 (en) 2010-01-18 2019-04-30 Apple Inc. Intelligent automated assistant
US10705794B2 (en) 2010-01-18 2020-07-07 Apple Inc. Automatically adapting user interfaces for hands-free interaction
US10553209B2 (en) 2010-01-18 2020-02-04 Apple Inc. Systems and methods for hands-free notification summaries
US10679605B2 (en) 2010-01-18 2020-06-09 Apple Inc. Hands-free list-reading by intelligent automated assistant
WO2011089450A2 (en) 2010-01-25 2011-07-28 Andrew Peter Nelson Jerram Apparatuses, methods and systems for a digital conversation management platform
US8682667B2 (en) 2010-02-25 2014-03-25 Apple Inc. User profiling for selecting user specific voice input processing information
TW201209697A (en) 2010-03-30 2012-03-01 Michael Luna 3D mobile user interface with configurable workspace management
US9183560B2 (en) 2010-05-28 2015-11-10 Daniel H. Abelow Reality alternate
US8639516B2 (en) 2010-06-04 2014-01-28 Apple Inc. User-specific noise suppression for voice quality improvements
US8713021B2 (en) 2010-07-07 2014-04-29 Apple Inc. Unsupervised document clustering using latent semantic density analysis
US9104670B2 (en) 2010-07-21 2015-08-11 Apple Inc. Customized search or acquisition of digital media assets
CA2806557C (en) 2010-07-26 2014-10-07 Michael Luna Mobile application traffic optimization
WO2012018477A2 (en) 2010-07-26 2012-02-09 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy
EP3407673B1 (en) 2010-07-26 2019-11-20 Seven Networks, LLC Mobile network traffic coordination across multiple applications
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US20120047025A1 (en) 2010-08-19 2012-02-23 Google Inc. Query stem advertising
US8719006B2 (en) 2010-08-27 2014-05-06 Apple Inc. Combined statistical and rule-based part-of-speech tagging for text-to-speech synthesis
US8719014B2 (en) 2010-09-27 2014-05-06 Apple Inc. Electronic device with text error correction based on voice recognition data
WO2012060995A2 (en) 2010-11-01 2012-05-10 Michael Luna Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
WO2012061430A2 (en) 2010-11-01 2012-05-10 Michael Luna Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US8204953B2 (en) 2010-11-01 2012-06-19 Seven Networks, Inc. Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8903954B2 (en) 2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests
US9330196B2 (en) 2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers
US9060032B2 (en) 2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
WO2012060996A2 (en) 2010-11-01 2012-05-10 Michael Luna Caching adapted for mobile application behavior and network conditions
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
WO2012071283A1 (en) 2010-11-22 2012-05-31 Michael Luna Aligning data transfer to optimize connections established for transmission over a wireless network
US10762293B2 (en) 2010-12-22 2020-09-01 Apple Inc. Using parts-of-speech tagging and named entity recognition for spelling correction
US10515147B2 (en) 2010-12-22 2019-12-24 Apple Inc. Using statistical language models for contextual lookup
WO2012094675A2 (en) 2011-01-07 2012-07-12 Seven Networks, Inc. System and method for reduction of mobile network traffic used for domain name system (dns) queries
US8781836B2 (en) 2011-02-22 2014-07-15 Apple Inc. Hearing assistance system for providing consistent human speech
US8542810B2 (en) 2011-03-21 2013-09-24 Microsoft Corporation Automatic rejoining of conferences
US9262612B2 (en) 2011-03-21 2016-02-16 Apple Inc. Device access using voice authentication
EP2700021A4 (en) 2011-04-19 2016-07-20 Seven Networks Llc Shared resource and virtual resource management in a networked environment
GB2493473B (en) 2011-04-27 2013-06-19 Seven Networks Inc System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
US10057736B2 (en) 2011-06-03 2018-08-21 Apple Inc. Active transport based notifications
US10672399B2 (en) 2011-06-03 2020-06-02 Apple Inc. Switching between text data and audio data based on a mapping
CN102223234B (en) * 2011-06-17 2013-11-20 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
US8812294B2 (en) 2011-06-21 2014-08-19 Apple Inc. Translating phrases from one language into another using an order-based set of declarative rules
WO2013015994A1 (en) 2011-07-27 2013-01-31 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US8706472B2 (en) 2011-08-11 2014-04-22 Apple Inc. Method for disambiguating multiple readings in language conversion
US8994660B2 (en) 2011-08-29 2015-03-31 Apple Inc. Text correction processing
US8762156B2 (en) 2011-09-28 2014-06-24 Apple Inc. Speech recognition repair using contextual information
EP2789138B1 (en) 2011-12-06 2016-09-14 Seven Networks, LLC A mobile device and method to utilize the failover mechanisms for fault tolerance provided for mobile traffic management and network/device resource conservation
US8934414B2 (en) 2011-12-06 2015-01-13 Seven Networks, Inc. Cellular or WiFi mobile traffic optimization based on public or private network destination
GB2498064A (en) 2011-12-07 2013-07-03 Seven Networks Inc Distributed content caching mechanism using a network operator proxy
US9277443B2 (en) 2011-12-07 2016-03-01 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
EP2792188B1 (en) 2011-12-14 2019-03-20 Seven Networks, LLC Mobile network reporting and usage analytics system and method using aggregation of data in a distributed traffic optimization system
US8861354B2 (en) 2011-12-14 2014-10-14 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
US10122771B2 (en) 2011-12-21 2018-11-06 Level 3 Communications, Llc Routing of conference participant based on caller recognition
US9178918B2 (en) 2011-12-21 2015-11-03 Level 3 Communications, Llc Method for routing in a central conferencing routing server
US9716860B2 (en) 2011-12-21 2017-07-25 Level 3 Communications, Llc Collaboration conference linking in a telecommunications network
US8909202B2 (en) 2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
WO2013116856A1 (en) 2012-02-02 2013-08-08 Seven Networks, Inc. Dynamic categorization of applications for network access in a mobile network
US9326189B2 (en) 2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US10134385B2 (en) 2012-03-02 2018-11-20 Apple Inc. Systems and methods for name pronunciation
US9483461B2 (en) 2012-03-06 2016-11-01 Apple Inc. Handling speech synthesis of content for multiple languages
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
WO2013155208A1 (en) 2012-04-10 2013-10-17 Seven Networks, Inc. Intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network
US9280610B2 (en) 2012-05-14 2016-03-08 Apple Inc. Crowd sourcing information to fulfill user requests
US8775442B2 (en) 2012-05-15 2014-07-08 Apple Inc. Semantic search using a single-source semantic model
US10417037B2 (en) 2012-05-15 2019-09-17 Apple Inc. Systems and methods for integrating third party services with a digital assistant
WO2013185109A2 (en) 2012-06-08 2013-12-12 Apple Inc. Systems and methods for recognizing textual identifiers within a plurality of words
US9721563B2 (en) 2012-06-08 2017-08-01 Apple Inc. Name recognition system
US9495129B2 (en) 2012-06-29 2016-11-15 Apple Inc. Device, method, and user interface for voice-activated navigation and browsing of a document
WO2014011216A1 (en) 2012-07-13 2014-01-16 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US9576574B2 (en) 2012-09-10 2017-02-21 Apple Inc. Context-sensitive handling of interruptions by intelligent digital assistant
US9547647B2 (en) 2012-09-19 2017-01-17 Apple Inc. Voice-based media searching
US8935167B2 (en) 2012-09-25 2015-01-13 Apple Inc. Exemplar-based latent perceptual modeling for automatic speech recognition
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US9241314B2 (en) 2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
CN103077714B (en) * 2013-01-29 2015-07-08 华为终端有限公司 Information identification method and apparatus
DE112014000709B4 (en) 2013-02-07 2021-12-30 Apple Inc. METHOD AND DEVICE FOR OPERATING A VOICE TRIGGER FOR A DIGITAL ASSISTANT
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US9977779B2 (en) 2013-03-14 2018-05-22 Apple Inc. Automatic supplementation of word correction dictionaries
US10652394B2 (en) 2013-03-14 2020-05-12 Apple Inc. System and method for processing voicemail
US10572476B2 (en) 2013-03-14 2020-02-25 Apple Inc. Refining a search based on schedule items
US10642574B2 (en) 2013-03-14 2020-05-05 Apple Inc. Device, method, and graphical user interface for outputting captions
US9733821B2 (en) 2013-03-14 2017-08-15 Apple Inc. Voice control to diagnose inadvertent activation of accessibility features
US9368114B2 (en) 2013-03-14 2016-06-14 Apple Inc. Context-sensitive handling of interruptions
KR101857648B1 (en) 2013-03-15 2018-05-15 애플 인크. User training by intelligent digital assistant
US10748529B1 (en) 2013-03-15 2020-08-18 Apple Inc. Voice activated device for use with a voice-based digital assistant
WO2014144579A1 (en) 2013-03-15 2014-09-18 Apple Inc. System and method for updating an adaptive speech recognition model
AU2014233517B2 (en) 2013-03-15 2017-05-25 Apple Inc. Training an at least partial voice command system
US10078487B2 (en) 2013-03-15 2018-09-18 Apple Inc. Context-sensitive handling of interruptions
US9582608B2 (en) 2013-06-07 2017-02-28 Apple Inc. Unified ranking with entropy-weighted information for phrase-based semantic auto-completion
WO2014197334A2 (en) 2013-06-07 2014-12-11 Apple Inc. System and method for user-specified pronunciation of words for speech synthesis and recognition
WO2014197336A1 (en) 2013-06-07 2014-12-11 Apple Inc. System and method for detecting errors in interactions with a voice-based digital assistant
WO2014197335A1 (en) 2013-06-08 2014-12-11 Apple Inc. Interpreting and acting upon commands that involve sharing information with remote devices
EP3937002A1 (en) 2013-06-09 2022-01-12 Apple Inc. Device, method, and graphical user interface for enabling conversation persistence across two or more instances of a digital assistant
US10176167B2 (en) 2013-06-09 2019-01-08 Apple Inc. System and method for inferring user intent from speech inputs
AU2014278595B2 (en) 2013-06-13 2017-04-06 Apple Inc. System and method for emergency calls initiated by voice command
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
DE112014003653B4 (en) 2013-08-06 2024-04-18 Apple Inc. Automatically activate intelligent responses based on activities from remote devices
US10296160B2 (en) 2013-12-06 2019-05-21 Apple Inc. Method for extracting salient dialog usage from live data
US9620105B2 (en) 2014-05-15 2017-04-11 Apple Inc. Analyzing audio input for efficient speech and music recognition
US10592095B2 (en) 2014-05-23 2020-03-17 Apple Inc. Instantaneous speaking of content on touch devices
US9502031B2 (en) 2014-05-27 2016-11-22 Apple Inc. Method for supporting dynamic grammars in WFST-based ASR
US9715875B2 (en) 2014-05-30 2017-07-25 Apple Inc. Reducing the need for manual start/end-pointing and trigger phrases
US10078631B2 (en) 2014-05-30 2018-09-18 Apple Inc. Entropy-guided text prediction using combined word and character n-gram language models
US9842101B2 (en) 2014-05-30 2017-12-12 Apple Inc. Predictive conversion of language input
US10289433B2 (en) 2014-05-30 2019-05-14 Apple Inc. Domain specific language for encoding assistant dialog
US9785630B2 (en) 2014-05-30 2017-10-10 Apple Inc. Text prediction using combined word N-gram and unigram language models
US9430463B2 (en) 2014-05-30 2016-08-30 Apple Inc. Exemplar-based natural language processing
US9734193B2 (en) 2014-05-30 2017-08-15 Apple Inc. Determining domain salience ranking from ambiguous words in natural speech
TWI566107B (en) 2014-05-30 2017-01-11 蘋果公司 Method for processing a multi-part voice command, non-transitory computer readable storage medium and electronic device
US10170123B2 (en) 2014-05-30 2019-01-01 Apple Inc. Intelligent assistant for home automation
US9633004B2 (en) 2014-05-30 2017-04-25 Apple Inc. Better resolution when referencing to concepts
US9760559B2 (en) 2014-05-30 2017-09-12 Apple Inc. Predictive text input
US10659851B2 (en) 2014-06-30 2020-05-19 Apple Inc. Real-time digital assistant knowledge updates
US9338493B2 (en) 2014-06-30 2016-05-10 Apple Inc. Intelligent automated assistant for TV user interactions
US10446141B2 (en) 2014-08-28 2019-10-15 Apple Inc. Automatic speech recognition based on user feedback
US9818400B2 (en) 2014-09-11 2017-11-14 Apple Inc. Method and apparatus for discovering trending terms in speech requests
US10789041B2 (en) 2014-09-12 2020-09-29 Apple Inc. Dynamic thresholds for always listening speech trigger
US9668121B2 (en) 2014-09-30 2017-05-30 Apple Inc. Social reminders
US9646609B2 (en) 2014-09-30 2017-05-09 Apple Inc. Caching apparatus for serving phonetic pronunciations
US10127911B2 (en) 2014-09-30 2018-11-13 Apple Inc. Speaker identification and unsupervised speaker adaptation techniques
US10074360B2 (en) 2014-09-30 2018-09-11 Apple Inc. Providing an indication of the suitability of speech recognition
US9886432B2 (en) 2014-09-30 2018-02-06 Apple Inc. Parsimonious handling of word inflection via categorical stem + suffix N-gram language models
US10552013B2 (en) 2014-12-02 2020-02-04 Apple Inc. Data detection
US9711141B2 (en) 2014-12-09 2017-07-18 Apple Inc. Disambiguating heteronyms in speech synthesis
US20160182726A1 (en) * 2014-12-22 2016-06-23 Alcatel-Lucent Usa Inc. Automatic allocation of remote bridges and connection to host bridge
US20160262017A1 (en) * 2015-03-04 2016-09-08 Microsoft Technology Licensing, Llc Personal assistant authentication
US9865280B2 (en) 2015-03-06 2018-01-09 Apple Inc. Structured dictation using intelligent automated assistants
US10567477B2 (en) 2015-03-08 2020-02-18 Apple Inc. Virtual assistant continuity
US9721566B2 (en) 2015-03-08 2017-08-01 Apple Inc. Competing devices responding to voice triggers
US9886953B2 (en) 2015-03-08 2018-02-06 Apple Inc. Virtual assistant activation
US9899019B2 (en) 2015-03-18 2018-02-20 Apple Inc. Systems and methods for structured stem and suffix language models
US9842105B2 (en) 2015-04-16 2017-12-12 Apple Inc. Parsimonious continuous-space phrase representations for natural language processing
US9866741B2 (en) 2015-04-20 2018-01-09 Jesse L. Wobrock Speaker-dependent voice-activated camera system
US10083688B2 (en) 2015-05-27 2018-09-25 Apple Inc. Device voice control for selecting a displayed affordance
US10127220B2 (en) 2015-06-04 2018-11-13 Apple Inc. Language identification from short strings
US10101822B2 (en) 2015-06-05 2018-10-16 Apple Inc. Language input correction
US9578173B2 (en) 2015-06-05 2017-02-21 Apple Inc. Virtual assistant aided communication with 3rd party service in a communication session
US11025565B2 (en) 2015-06-07 2021-06-01 Apple Inc. Personalized prediction of responses for instant messaging
US10186254B2 (en) 2015-06-07 2019-01-22 Apple Inc. Context-based endpoint detection
US10255907B2 (en) 2015-06-07 2019-04-09 Apple Inc. Automatic accent detection using acoustic models
US10747498B2 (en) 2015-09-08 2020-08-18 Apple Inc. Zero latency digital assistant
US10671428B2 (en) 2015-09-08 2020-06-02 Apple Inc. Distributed personal assistant
US9697820B2 (en) 2015-09-24 2017-07-04 Apple Inc. Unit-selection text-to-speech synthesis using concatenation-sensitive neural networks
US10366158B2 (en) 2015-09-29 2019-07-30 Apple Inc. Efficient word encoding for recurrent neural network language models
US11010550B2 (en) 2015-09-29 2021-05-18 Apple Inc. Unified language modeling framework for word prediction, auto-completion and auto-correction
US11587559B2 (en) 2015-09-30 2023-02-21 Apple Inc. Intelligent device identification
US10691473B2 (en) 2015-11-06 2020-06-23 Apple Inc. Intelligent automated assistant in a messaging environment
US10049668B2 (en) 2015-12-02 2018-08-14 Apple Inc. Applying neural network language models to weighted finite state transducers for automatic speech recognition
US10223066B2 (en) 2015-12-23 2019-03-05 Apple Inc. Proactive assistance based on dialog communication between devices
US10446143B2 (en) 2016-03-14 2019-10-15 Apple Inc. Identification of voice inputs providing credentials
US9934775B2 (en) 2016-05-26 2018-04-03 Apple Inc. Unit-selection text-to-speech synthesis based on predicted concatenation parameters
US9972304B2 (en) 2016-06-03 2018-05-15 Apple Inc. Privacy preserving distributed evaluation framework for embedded personalized systems
US10249300B2 (en) 2016-06-06 2019-04-02 Apple Inc. Intelligent list reading
US10049663B2 (en) 2016-06-08 2018-08-14 Apple, Inc. Intelligent automated assistant for media exploration
DK179588B1 (en) 2016-06-09 2019-02-22 Apple Inc. Intelligent automated assistant in a home environment
US10586535B2 (en) 2016-06-10 2020-03-10 Apple Inc. Intelligent digital assistant in a multi-tasking environment
US10192552B2 (en) 2016-06-10 2019-01-29 Apple Inc. Digital assistant providing whispered speech
US10490187B2 (en) 2016-06-10 2019-11-26 Apple Inc. Digital assistant providing automated status report
US10509862B2 (en) 2016-06-10 2019-12-17 Apple Inc. Dynamic phrase expansion of language input
US10067938B2 (en) 2016-06-10 2018-09-04 Apple Inc. Multilingual word prediction
DK179049B1 (en) 2016-06-11 2017-09-18 Apple Inc Data driven natural language event detection and classification
DK179343B1 (en) 2016-06-11 2018-05-14 Apple Inc Intelligent task discovery
DK201670540A1 (en) 2016-06-11 2018-01-08 Apple Inc Application integration with a digital assistant
DK179415B1 (en) 2016-06-11 2018-06-14 Apple Inc Intelligent device arbitration and control
KR102575634B1 (en) * 2016-07-26 2023-09-06 삼성전자주식회사 Electronic device and method for operating the same
US10043516B2 (en) 2016-09-23 2018-08-07 Apple Inc. Intelligent automated assistant
US10593346B2 (en) 2016-12-22 2020-03-17 Apple Inc. Rank-reduced token representation for automatic speech recognition
DK201770439A1 (en) 2017-05-11 2018-12-13 Apple Inc. Offline personal assistant
DK179745B1 (en) 2017-05-12 2019-05-01 Apple Inc. SYNCHRONIZATION AND TASK DELEGATION OF A DIGITAL ASSISTANT
DK179496B1 (en) 2017-05-12 2019-01-15 Apple Inc. USER-SPECIFIC Acoustic Models
DK201770431A1 (en) 2017-05-15 2018-12-20 Apple Inc. Optimizing dialogue policy decisions for digital assistants using implicit feedback
DK201770432A1 (en) 2017-05-15 2018-12-21 Apple Inc. Hierarchical belief states for digital assistants
DK179560B1 (en) 2017-05-16 2019-02-18 Apple Inc. Far-field extension for digital assistant services
US10750000B1 (en) * 2019-01-28 2020-08-18 Blackberry Limited Opportunistic initiation of voice or video calls between smart speaker devices

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5500919A (en) * 1992-11-18 1996-03-19 Canon Information Systems, Inc. Graphics user interface for controlling text-to-speech conversion
US5873068A (en) * 1994-06-14 1999-02-16 New North Media Inc. Display based marketing message control system and method
US5873108A (en) * 1995-02-27 1999-02-16 Fuga Corporation Personal information manager information entry allowing for intermingling of items belonging to different categories within a single unified view
US5889516A (en) * 1994-04-19 1999-03-30 Orchid Systems, Inc. Trainable user interface translator
US6058415A (en) * 1997-07-24 2000-05-02 Intervoice Limited Partnership System and method for integration of communication systems with computer-based information systems
US6108696A (en) * 1997-11-14 2000-08-22 Online Anywhere Method and apparatus to connect a general purpose computer to a special purpose system
US6154465A (en) * 1998-10-06 2000-11-28 Vertical Networks, Inc. Systems and methods for multiple mode voice and data communications using intelligenty bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6259449B1 (en) * 1997-12-10 2001-07-10 Sony Corporation Integrated communication center
US20010018718A1 (en) * 1998-05-08 2001-08-30 Ludtke Harold Aaron Media manager for controlling autonomous media devices within a network environment and managing the flow and format of data between the devices
US6351771B1 (en) * 1997-11-10 2002-02-26 Nortel Networks Limited Distributed service network system capable of transparently converting data formats and selectively connecting to an appropriate bridge in accordance with clients characteristics identified during preliminary connections
US6456973B1 (en) * 1999-10-12 2002-09-24 International Business Machines Corp. Task automation user interface with text-to-speech output
US6477374B1 (en) * 1997-01-03 2002-11-05 Siemens Information And Communication Networks, Inc. Apparatus and method for calendar based call routing
US6499021B1 (en) * 1999-05-25 2002-12-24 Suhayya Abu-Hakima Apparatus and method for interpreting and intelligently managing electronic messages
US20030105821A1 (en) * 1999-01-11 2003-06-05 Niraj A. Shah Improved server and method for routing messages to achieve unified communications
US6650739B1 (en) * 1998-12-28 2003-11-18 Pitney Bowes Inc. Method of providing personal messaging using a virtual messaging assistant
US6658095B1 (en) * 2002-03-19 2003-12-02 Nortel Networks Limited Customized presence information delivery
US20050008003A1 (en) * 1999-10-08 2005-01-13 Ramey K. Scott Method, apparatus, and article of manufacture for web-enabling telephony devices
US20050128102A1 (en) * 1997-06-20 2005-06-16 American Calcar, Inc. Personal communication and positioning system
US20050267935A1 (en) * 1999-06-11 2005-12-01 Microsoft Corporation Data driven remote device control model with general programming interface-to-network messaging adaptor
US20060031364A1 (en) * 1999-03-09 2006-02-09 Michael Hamilton Message routing
US7177908B1 (en) * 1997-05-09 2007-02-13 Calumet Keweenaw Llc System and method for managing multimedia messaging platforms

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2807398B2 (en) * 1993-08-03 1998-10-08 和明 深道 Magnetoresistance effect material, method of manufacturing the same, and magnetoresistance element
US5563882A (en) * 1995-07-27 1996-10-08 At&T Process for converting a point-to-point multimedia call to a bridged multimedia call
US6081513A (en) * 1997-02-10 2000-06-27 At&T Corp. Providing multimedia conferencing services over a wide area network interconnecting nonguaranteed quality of services LANs
US6381321B1 (en) * 1998-05-04 2002-04-30 T-Netix, Inc. Telecommunication resource allocation system and method
US6671262B1 (en) * 1999-12-30 2003-12-30 At&T Corp. Conference server for automatic x-way call port expansion feature
US7003086B1 (en) * 2001-01-18 2006-02-21 Cisco Technology, Inc. Apparatus and method for allocating call resources during a conference call

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5500919A (en) * 1992-11-18 1996-03-19 Canon Information Systems, Inc. Graphics user interface for controlling text-to-speech conversion
US5889516A (en) * 1994-04-19 1999-03-30 Orchid Systems, Inc. Trainable user interface translator
US5873068A (en) * 1994-06-14 1999-02-16 New North Media Inc. Display based marketing message control system and method
US5873108A (en) * 1995-02-27 1999-02-16 Fuga Corporation Personal information manager information entry allowing for intermingling of items belonging to different categories within a single unified view
US6477374B1 (en) * 1997-01-03 2002-11-05 Siemens Information And Communication Networks, Inc. Apparatus and method for calendar based call routing
US7177908B1 (en) * 1997-05-09 2007-02-13 Calumet Keweenaw Llc System and method for managing multimedia messaging platforms
US20050128102A1 (en) * 1997-06-20 2005-06-16 American Calcar, Inc. Personal communication and positioning system
US6058415A (en) * 1997-07-24 2000-05-02 Intervoice Limited Partnership System and method for integration of communication systems with computer-based information systems
US6351771B1 (en) * 1997-11-10 2002-02-26 Nortel Networks Limited Distributed service network system capable of transparently converting data formats and selectively connecting to an appropriate bridge in accordance with clients characteristics identified during preliminary connections
US6108696A (en) * 1997-11-14 2000-08-22 Online Anywhere Method and apparatus to connect a general purpose computer to a special purpose system
US6259449B1 (en) * 1997-12-10 2001-07-10 Sony Corporation Integrated communication center
US20010018718A1 (en) * 1998-05-08 2001-08-30 Ludtke Harold Aaron Media manager for controlling autonomous media devices within a network environment and managing the flow and format of data between the devices
US6154465A (en) * 1998-10-06 2000-11-28 Vertical Networks, Inc. Systems and methods for multiple mode voice and data communications using intelligenty bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6650739B1 (en) * 1998-12-28 2003-11-18 Pitney Bowes Inc. Method of providing personal messaging using a virtual messaging assistant
US20030105821A1 (en) * 1999-01-11 2003-06-05 Niraj A. Shah Improved server and method for routing messages to achieve unified communications
US20060031364A1 (en) * 1999-03-09 2006-02-09 Michael Hamilton Message routing
US6499021B1 (en) * 1999-05-25 2002-12-24 Suhayya Abu-Hakima Apparatus and method for interpreting and intelligently managing electronic messages
US20050267935A1 (en) * 1999-06-11 2005-12-01 Microsoft Corporation Data driven remote device control model with general programming interface-to-network messaging adaptor
US20050008003A1 (en) * 1999-10-08 2005-01-13 Ramey K. Scott Method, apparatus, and article of manufacture for web-enabling telephony devices
US6456973B1 (en) * 1999-10-12 2002-09-24 International Business Machines Corp. Task automation user interface with text-to-speech output
US6658095B1 (en) * 2002-03-19 2003-12-02 Nortel Networks Limited Customized presence information delivery

Cited By (83)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030233555A1 (en) * 2000-03-09 2003-12-18 Yigal Shusteri Secure system for smartcard transactions
US20080310402A1 (en) * 2001-11-27 2008-12-18 Verizon Business Global Llc Communication systems and qsig communications methods
US8345711B2 (en) * 2001-11-27 2013-01-01 Verizon Business Global Llc Communication systems and QSIG communications methods
US20040203611A1 (en) * 2002-05-31 2004-10-14 Laporta Thomas F. Architecture and services for wireless data
US20040075675A1 (en) * 2002-10-17 2004-04-22 Tommi Raivisto Apparatus and method for accessing services via a mobile terminal
US20040255041A1 (en) * 2003-06-12 2004-12-16 Shih-Li Wen System and method for multimedia messages interchange between different communication interfaces
US9876793B2 (en) * 2003-12-30 2018-01-23 Entrust, Inc. Offline methods for authentication in a client/server authentication system
US20160191520A1 (en) * 2003-12-30 2016-06-30 Entrust, Inc. Offline methods for authentication in a client/server authentication system
EP1755305A1 (en) * 2005-08-17 2007-02-21 Alcatel Apparatus to administrate the joining of parallel multimedia sessions to principal multimedia sessions in a communication network
US20070050509A1 (en) * 2005-08-17 2007-03-01 Alcatel Device for managing the joining of parallel multimedia sessions to main multimedia sessions in a communication network
US10547745B2 (en) 2005-09-01 2020-01-28 Xtone, Inc. System and method for causing a voice application to be performed on a party's local drive
US11153425B2 (en) 2005-09-01 2021-10-19 Xtone, Inc. System and method for providing interactive services
US11909901B2 (en) 2005-09-01 2024-02-20 Xtone, Inc. System and method for displaying the history of a user's interaction with a voice application
US11876921B2 (en) 2005-09-01 2024-01-16 Xtone, Inc. Voice application network platform
US11785127B2 (en) 2005-09-01 2023-10-10 Xtone, Inc. Voice application network platform
US20100158215A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for announcing and routing incoming telephone calls using a distributed voice application execution system architecture
US20100161426A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for providing television programming recommendations and for automated tuning and recordation of television programs
US20100158230A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for performing certain actions based upon a dialed telephone number
US20100158208A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for connecting a user to business services
US20100158207A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for verifying the identity of a user by voiceprint analysis
US20100158219A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for interacting with a user via a variable volume and variable tone audio prompt
US20100158218A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for providing interactive services
US20100158217A1 (en) * 2005-09-01 2010-06-24 Vishal Dhawan System and method for placing telephone calls using a distributed voice application execution system architecture
US20100166161A1 (en) * 2005-09-01 2010-07-01 Vishal Dhawan System and methods for providing voice messaging services
US11778082B2 (en) 2005-09-01 2023-10-03 Xtone, Inc. Voice application network platform
US11743369B2 (en) 2005-09-01 2023-08-29 Xtone, Inc. Voice application network platform
US11706327B1 (en) 2005-09-01 2023-07-18 Xtone, Inc. Voice application network platform
US11657406B2 (en) 2005-09-01 2023-05-23 Xtone, Inc. System and method for causing messages to be delivered to users of a distributed voice application execution system
US8234119B2 (en) 2005-09-01 2012-07-31 Vishal Dhawan Voice application network platform
US11641420B2 (en) 2005-09-01 2023-05-02 Xtone, Inc. System and method for placing telephone calls using a distributed voice application execution system architecture
US11616872B1 (en) 2005-09-01 2023-03-28 Xtone, Inc. Voice application network platform
US11232461B2 (en) 2005-09-01 2022-01-25 Xtone, Inc. System and method for causing messages to be delivered to users of a distributed voice application execution system
US8401859B2 (en) 2005-09-01 2013-03-19 Vishal Dhawan Voice application network platform
US11233902B2 (en) 2005-09-01 2022-01-25 Xtone, Inc. System and method for placing telephone calls using a distributed voice application execution system architecture
US11102342B2 (en) 2005-09-01 2021-08-24 Xtone, Inc. System and method for displaying the history of a user's interaction with a voice application
US20070047719A1 (en) * 2005-09-01 2007-03-01 Vishal Dhawan Voice application network platform
US10367929B2 (en) 2005-09-01 2019-07-30 Xtone, Inc. System and method for connecting a user to business services
US8964960B2 (en) 2005-09-01 2015-02-24 Xtone Networks, Inc. System and method for interacting with a user via a variable volume and variable tone audio prompt
US10171673B2 (en) 2005-09-01 2019-01-01 Xtone, Inc. System and method for performing certain actions based upon a dialed telephone number
US9979806B2 (en) 2005-09-01 2018-05-22 Xtone, Inc. System and method for connecting a user to business services
US9799039B2 (en) 2005-09-01 2017-10-24 Xtone, Inc. System and method for providing television programming recommendations and for automated tuning and recordation of television programs
US9456068B2 (en) 2005-09-01 2016-09-27 Xtone, Inc. System and method for connecting a user to business services
US9253301B2 (en) 2005-09-01 2016-02-02 Xtone Networks, Inc. System and method for announcing and routing incoming telephone calls using a distributed voice application execution system architecture
US9313307B2 (en) 2005-09-01 2016-04-12 Xtone Networks, Inc. System and method for verifying the identity of a user by voiceprint analysis
US9426269B2 (en) 2005-09-01 2016-08-23 Xtone Networks, Inc. System and method for performing certain actions based upon a dialed telephone number
US20070189481A1 (en) * 2006-01-27 2007-08-16 Microsoft Corporation Telephone call routing
US7885395B2 (en) * 2006-01-27 2011-02-08 Microsoft Corporation Telephone call routing
US8452668B1 (en) 2006-03-02 2013-05-28 Convergys Customer Management Delaware Llc System for closed loop decisionmaking in an automated care system
US8379830B1 (en) 2006-05-22 2013-02-19 Convergys Customer Management Delaware Llc System and method for automated customer service with contingent live interaction
US9549065B1 (en) 2006-05-22 2017-01-17 Convergys Customer Management Delaware Llc System and method for automated customer service with contingent live interaction
US7809663B1 (en) 2006-05-22 2010-10-05 Convergys Cmg Utah, Inc. System and method for supporting the utilization of machine language
US8588394B2 (en) * 2006-09-22 2013-11-19 Sprint Communications Company L.P. Content switch for enhancing directory assistance
US20080084987A1 (en) * 2006-09-22 2008-04-10 Sprint Communications Company L.P. Content switch for enhancing directory assistance
US20080260169A1 (en) * 2006-11-06 2008-10-23 Plantronics, Inc. Headset Derived Real Time Presence And Communication Systems And Methods
US20080120101A1 (en) * 2006-11-16 2008-05-22 Cisco Technology, Inc. Conference question and answer management
US20120271643A1 (en) * 2006-12-19 2012-10-25 Nuance Communications, Inc. Inferring switching conditions for switching between modalities in a speech application environment extended for interactive text exchanges
US8874447B2 (en) * 2006-12-19 2014-10-28 Nuance Communications, Inc. Inferring switching conditions for switching between modalities in a speech application environment extended for interactive text exchanges
US20080195395A1 (en) * 2007-02-08 2008-08-14 Jonghae Kim System and method for telephonic voice and speech authentication
US9178972B2 (en) 2007-03-23 2015-11-03 At&T Mobility Ii Llc Systems and methods for remote deletion of contact information
US10200538B2 (en) 2007-03-23 2019-02-05 At&T Mobility Ii Llc Dynamic voicemail receptionist system
US20150201074A1 (en) * 2007-03-23 2015-07-16 At&T Mobility Ii Llc Dynamic Voicemail Receptionist System
US9350843B2 (en) * 2007-03-23 2016-05-24 At&T Mobility Ii Llc Dynamic voicemail receptionist system
US9800729B2 (en) 2007-03-23 2017-10-24 At&T Mobility Ii Llc Dynamic voicemail receptionist system
US9237231B2 (en) 2007-03-23 2016-01-12 At&T Mobility Ii Llc Providing a predictive response feature for messaging applications by analyzing the text of a message using text recognition logic
US9350842B2 (en) 2007-03-23 2016-05-24 At&T Mobility Ii Llc Dynamic voicemail receptionist system
US20090279676A1 (en) * 2007-10-23 2009-11-12 Nicholas Zazza Systems and methods for delivering computer implemented voicemails
US8817964B2 (en) 2008-02-11 2014-08-26 International Business Machines Corporation Telephonic voice authentication and display
US20090202060A1 (en) * 2008-02-11 2009-08-13 Kim Moon J Telephonic voice authentication and display
US10909538B2 (en) 2008-08-28 2021-02-02 Paypal, Inc. Voice phone-based method and system to authenticate users
US20150213453A1 (en) * 2008-08-28 2015-07-30 Ebay Inc. Voice phone-based method and system to authenticate users
US9818115B2 (en) * 2008-08-28 2017-11-14 Paypal, Inc. Voice phone-based method and system to authenticate users
US20110164537A1 (en) * 2008-09-29 2011-07-07 Yigang Cai Call response services in ims networks for businesses
US20100223494A1 (en) * 2008-12-17 2010-09-02 Tristan Barnum Degenhardt System and method for providing ip pbx service
US10187517B1 (en) * 2013-12-13 2019-01-22 West Corporation Reduction in network congestion
CN110622126A (en) * 2017-05-15 2019-12-27 谷歌有限责任公司 Providing access to user-controlled resources through automated assistant
US20190149348A1 (en) * 2017-11-15 2019-05-16 Eliahu Antopolsky Recording System with Personal Keys for Personal Meetings with Service Providers
US10733278B2 (en) * 2018-02-21 2020-08-04 Verizon Patent And Licensing Inc. System and method of retrieving and conveying sensitive information when using voice command devices
US11941095B2 (en) 2018-02-21 2024-03-26 Verizon Patent And Licensing Inc. System and method of retrieving and conveying sensitive information when using voice command devices
US11822695B2 (en) 2018-08-07 2023-11-21 Google Llc Assembling and evaluating automated assistant responses for privacy concerns
US20220083687A1 (en) 2018-08-07 2022-03-17 Google Llc Threshold-based assembly of remote automated assistant responses
US11966494B2 (en) 2018-08-07 2024-04-23 Google Llc Threshold-based assembly of remote automated assistant responses
US11574071B2 (en) 2020-07-28 2023-02-07 Bank Of America Corporation Reliability of information security controls for attack readiness
US12126750B2 (en) 2024-01-15 2024-10-22 Xtone, Inc. Voice application network platform

Also Published As

Publication number Publication date
US6895558B1 (en) 2005-05-17
US20080253549A1 (en) 2008-10-16
US8406399B2 (en) 2013-03-26

Similar Documents

Publication Publication Date Title
US6895558B1 (en) Multi-access mode electronic personal assistant
US6782413B1 (en) Distributed conference bridge
US7054819B1 (en) Voice print access to computer resources
US8625749B2 (en) Content sensitive do-not-disturb (DND) option for a communication system
US6690672B1 (en) Method and apparatus for placing an intelligent telephone call using an internet browser
US7274776B1 (en) Methods and systems for routing a call
US6477240B1 (en) Computer-implemented voice-based command structure for establishing outbound communication through a unified messaging system
US7289493B1 (en) System and method for providing location independent voice communications continuity through disasters
US9219820B2 (en) Method and apparatus for providing voice control for accessing teleconference services
US20020069060A1 (en) Method and system for automatically managing a voice-based communications systems
US7940913B2 (en) System and method for improved contact center services to disabled callers
US6502127B1 (en) Computer email with telephony support
JP2004531139A (en) System and method for receiving telephone calls via instant messaging
WO2005036798A2 (en) Switchboard for interactive voice response (ivr) services
US8606240B1 (en) Hybrid communications mailbox
US20020181691A1 (en) PBX remote telephone control system
US20070036298A1 (en) System and method for ensuring call privacy in a shared telephone environment
US8041023B1 (en) System and method of using a phone to access information in a call center
US8798035B1 (en) Controlled environment facility calling services using voice over internet protocol infrastructure
US6925162B1 (en) Method and system for negotiated call forwarding
US7519202B2 (en) System and method for secure bio-print and access methods
US20040196965A1 (en) Method and apparatus for using web services to provide telephony communications
EP1467545A1 (en) Remote access to user-defined features via the Internet
KR100570816B1 (en) Apparatus and Method for Call Processing in Computer Telephony Integration Program
KR20030003409A (en) Remote Private Branch Exchange System for IP Phone and Method for Group Call Service using it

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date: 20141014