WO2014165152A1 - Système et appareil d'agrégation et de partage de messages électroniques - Google Patents

Système et appareil d'agrégation et de partage de messages électroniques Download PDF

Info

Publication number
WO2014165152A1
WO2014165152A1 PCT/US2014/024568 US2014024568W WO2014165152A1 WO 2014165152 A1 WO2014165152 A1 WO 2014165152A1 US 2014024568 W US2014024568 W US 2014024568W WO 2014165152 A1 WO2014165152 A1 WO 2014165152A1
Authority
WO
WIPO (PCT)
Prior art keywords
subscriber
message
voicemail
server
recipient
Prior art date
Application number
PCT/US2014/024568
Other languages
English (en)
Inventor
J. Stephen BURNETT
Paul Wilkinson Dent
Lawrence D. ZIRBEL
Original Assignee
Burnett J Stephen
Paul Wilkinson Dent
Zirbel Lawrence D
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/796,990 external-priority patent/US20140270115A1/en
Priority claimed from US14/201,807 external-priority patent/US20150256679A1/en
Application filed by Burnett J Stephen, Paul Wilkinson Dent, Zirbel Lawrence D filed Critical Burnett J Stephen
Publication of WO2014165152A1 publication Critical patent/WO2014165152A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Definitions

  • the present invention relates to electronic messaging systems and in particular to voice messaging systems such as voicemail.
  • Voicemail services are commonly provided to a telephone subscriber by a landline or cellphone carrier licenced to provide telecommunications services by a national telecommunications authority, and in those cases the digital voice messages are stored on computer systems located at the carrier's premises. Messages may be offered for storage when a call to a subscriber goes unanswered, or when a second subscriber dials directly into the voice mailbox of a first subscriber to leave a message without ringing the first subscriber's phone. Older technology of answering machines which can be located at the subscriber's premises still exists, the machines switching on automatically when the phone is not answered after a certain number of rings and then answering the call and prompting the caller to leave a recorded voicemail message.
  • a subscriber accesses voicemail systems in a number of ways. In the case of subscriber-owned answering equipment as just described in the previous paragraph, he simply presses the replay button. Some, but not all, answering machines allow remote access whereby a user can dial in from another phone and command replay by entering a code on the telephone keypad.
  • a person may have a number of telephones and therefore voicemail systems by which he can be reached; for example:
  • One or more cellphones e.g. a personal cellphone and a business cellphone
  • voicemail servers provide electronic signals on the telephone line to indicate the presence of voicemail messages; however, these signals are not necessarily standardized or published, and are likely to be different between different carriers, or non-existent. For example, it cannot easily be assumed that such voicemail signals, if any, are the same or even known for a telephone located in Mexico or Canada as opposed to the US, but yet it is still conceivable that a subscriber in the US could wish to listen to voicemails left on a phone number in one of those countries.
  • a subscriber's service provider of both his landline service and his cellphone service is the same carrier, then that carrier has sufficient knowledge of the operation of both of his systems and sufficient access to them to modify them if necessary to develop a new voicemail system offering voicemail aggregation across all of a user's mobile or fixed subscriptions provided by that same carrier.
  • Systems provided by certain carriers indeed exist to aggregate voicemails from a landline number and a cellphone number, and to make them accessible via the Internet to a fixed computer such as a PC or a mobile computer such as a smartphone. However, there is usually an additional subscription charge for such a service, and it is not possible to aggregate voicemails across different service providers.
  • One method for posting voicemails described in the art is for the user to subscribe to such a new voicemail service, and empower the new voicemail service to post voicemail messages to social media on his behalf.
  • One problem with this method is that there is then little control by the user over where on a particular social site the message will be posted. If the user terminal is a smartphone, it has a small screen that makes it inconvenient to have two webpages open at the same time, one to a social site and another to a voicemail server. Moreover, if the user terminal is a Plain Ordinary Telephone, then it does not display webpages at all.
  • voice messaging systems provide some kind of guarantee that only the recipients to whom messages are addressed will receive and be able to listen to the messages.
  • the development of such a delivery guarantee that functions when some or all message recipients are off line requires improvements over current art which will be described herein.
  • a voicemail aggregation service and apparatus has the ability to aggregate voicemail messages left on substantially any existing voicemail system for any phone belonging to and designated by a subscriber to the service, including phones having subscriptions for service with different carriers.
  • a voicemail program resembling an e-mail program is provided to allow the creation of voicemails using a Personal Computer, SmartPhone, Tablet or any other such suitable subscriber-related computing device that may become available, and to address and deliver the created voicemails to other subscribers indicated by either phone numbers or e-mail addresses or newly-created voicemail addresses which could be of either form.
  • the apparatus comprises a server computer connected to the internet and, if necessary, to phone lines, in such a way that it can be accessed by subscribers to the service to compose, retrieve, save, delete or share voicemails or other messages, the server computer in turn being able to access the subscriber's existing voicemail systems either by phone or internet connection, as appropriate.
  • the server stores voicemails and other messages in a scrambled form that only intended receipients can unscramble, thus avoiding the server becoming a high security risk.
  • a security system To ensure that voicemail messages transmitted from the sender to be stored on a server and then subsequently transmitted from the server to one or more recipients may only be received by the intended recipients, a security system is described.
  • Each registered subscriber generates and stores in his computer a set of random numbers and scrambles them to obtain a bit pattern called a Token.
  • the Tokens are transmitted to the voicemail server in advance of being needed so that they are available to be used even when the subscriber is offline.
  • the server maintains a number of such Tokens per registered subscriber corresponding to the number of as yet unreceived messages for which the subscriber has requested server memory space, each Token being intended to be used once for each message transmitted or received in the particular manner described herein.
  • the inventive server parses the complete voicemail replay from that system automatically into individual messages, when the voicemail system itself does not provide such a facility, and stores the individual messages as separate, annotated files in a suitable audio file format such as .WAV.
  • the subscriber may then log into the inventive apparatus to view all voicemails that have been aggregated together from all his voicemail services, including those provided by different, unrelated telephone companies, and the subscriber may retrieve a hyperlink to any of the aggregated voicemails selected by him.
  • a second aspect of the invention comprises inventive software (an "App") that may be downloaded from the inventive server to the subscriber's smartphone or computer, the inventive App providing a convenient man-machine interface by which the user may, in one implementation, click on a displayed symbol to select the message, a link to which to insert into an e-mail or post to a social site, the App then performing automatically the steps of retrieving the active link IP-address byte string from the voicemail server and embedding it where designated.
  • inventive software an "App”
  • inventive App providing a convenient man-machine interface by which the user may, in one implementation, click on a displayed symbol to select the message, a link to which to insert into an e-mail or post to a social site, the App then performing automatically the steps of retrieving the active link IP-address byte string from the voicemail server and embedding it where designated.
  • the user may select an option from a dropdown list provided by the editor to insert a hyperlink to a voicemail, the App then performing automatically the steps of displaying a selection of voicemails in a pop- up window, noting the voicemail selected by the user, closing the pop-up window and then retrieving the hyperlink string from the inventive voicemail aggregation server and embedding it where designated.
  • a man-machine interface may be provided that enables the user to instruct the inventive server to make quality-enhancing edits to stored audio files in order to improve intelligibility, such as the ability to partially rewind and replay a section, change the volume or frequency response, or process out background noise using any suitable noise reduction algorithm.
  • a novel piece of hardware is also described, comprising an internet-attached answering machine which facilities the task of collecting voicemails in otherwise intractable cases where no voicemail service from the telephone carrier is available.
  • Figure 1 illustrates a simplified sequence of voice prompts that occurs in accessing a conventional wireline voicemail service
  • FIG. 2 is a block diagram of an inventive server architecture for performing message retrieval from unrelated message systems.
  • Figure 3 shows the information flow for posting a voicemail to social media.
  • Figure 4 shows a web-appliance for untrapping voicemails
  • Figure 5 shows a screenshot of a man-machine interface for Voicemail Express
  • Figure 6 shows message origination operations at a subscriber terminal
  • Figure 7 shows message reception operations at a subscriber terminal
  • Figure 8 shows a recipient-specific message header
  • Figure 9 shows a possible pseudorandom number generator
  • Figure 10 shows a possible scrambling unit
  • An "App” means an Application Program which can be selected to be installed by a mobile phone user on his mobile phone after manufacture, for example by downloading it from the Internet.
  • An App may be free, or might be provided upon payment of a nominal sum of money by credit card or online payment service such as PayPal.
  • the term "App” is also used herein to apply to such programs intended for fixed computers such as Personal Computers (PCs) or portable computers such as laptops, IPADs or Tablets.
  • An "OS” or operating system means the lowest level or core software provided on a user terminal such as a PC or smartphone, one purpose of which is to provide a level of abstraction to mask hardware differences between different devices from higher level software.
  • the OS usually provides a number of reasonably well documented APIs or Application Program Interfaces that another programmer of higher level software can use without being concerned about hardware differences between different devices.
  • a "server” is a computer or bank of computers connected to the Internet, the purpose of which is to transmit digital data over the Internet simultaneously to multiple user terminals that are browsing the internet, the data representing webpages, movies, sounds, text or any other form of information that can be represented digitally.
  • the webpages may be fixed or dynamically composed depending on the application and depending on the intended user destination.
  • a “carrier” or “service provider” means an entity licensed by the FCC in the US or equivalent organization in a foreign country to provide telecommunications services, typically telephone services, to the public in that country in return for payment.
  • Voicemail system or “Voicemail service” means an arrangement associated with a telephone number to record calls received when a call to the number goes unanswered.
  • Call forwarding means an arrangement associated with a telephone number to redirect a call to a different, predetermined telephone if calls to the number go unanswered.
  • Social Media or “Social Sites” refers to any website which a user might log into or visit to exchange messages with others having like interests. E-mail services may be considered to fall within the definition of "Social Media”. Facebook, Linked In, Myspace and suchlike websites are examples of "Social Sites"
  • a "hyperlink” means an Internet address (IP address) that directs a web-browser to data stored on the same or a remote computer which is accessible over the Internet.
  • IP address Internet address
  • a hyperlink may be identified to a reader by a visible, human-meaningful text string while having a hidden, computer-meaningful web address string.
  • “Skype” refers to a well known brand of Voice-over-Internet services which allows telephone calls to be placed via a digital internet connection rather than an analog telephone line. The calls are converted between analog and digital at the Skype caller's location, transmitted digitally over the Internet to a Skype concentrator local to the area of the called number, and then converted between digital and analog once more for delivery over the local analog telephone network if the called subscriber is not also a Skype user.
  • an inventive voicemail aggregation device will be described fwith the aid of figures 2 and 4, for aggregating vociemails from different, unrelated vociemail systems, and which may have adapters configured to interface with every voicemail system designated by a registered subscriber, even when those voicemail systems are provided by different carriers.
  • the inventive voicemail aggregation device collects voicemails left on any of the subscriber's voicemail systems for any of his designated telephones, even when those telephones are served by different carriers, or, in the absence of a telephone having a voicemail service, the inventive voicemail aggregation device can perform collection of a voicemail itself by having unanswered calls forwarded to it, or, if the device is co-located and associated to the telephone, may forward the voicemail message to another device for storage, optionally after temporarily recording and storing it itself. It may be appreciated that devices that communicate digital information may incorporate buffer memories of any size to bridge timing differences between the operation of one device and the operation of another.
  • data received by one device corresponding to a digitized voicemail message may be substantially immediately forwarded to another device, while at the other extreme an entire voicemail message may be recorded in buffer memory before forwarding to another device.
  • buffer size is not material to the invention, and is selected based on timing considerations.
  • a second aspect of the invention comprises an App which may be downloaded to a mobile phone, fixed PC, Tablet, I PAD, laptop or any other suitable fixed, portable or mobile user terminal, the inventive App providing a convenient Man-Machine-Interface by which the user can cause the combination of his terminal and the inventive voicemail device to perform a variety of useful functions, such as displaying all voicemails received and selecting to listen to, save, delete or share them.
  • a third aspect of the invention comprises using the inventive App and the inventive voicemail aggregation device to post on Social Media a hyperlink to a selected message left by a second party for the first party (the subscriber) and which is stored on the inventive voicemail aggregation device such that, upon another internet user (a third party) reading the post and clicking on the hyperlink, the message is transmitted and played or displayed to the third party.
  • a device which presents webpages over the internet simultaneously to many web-browsers is commonly called a "server".
  • One implementation of the invention comprises using such a server, which can be established by a party other than a telephone service provider to provide an inventive voicemail aggregation service to registered users.
  • a fourth aspect of the invention comprises displaying advertisements in a pop-up window on the third party's user terminal when the third party clicks on the hyperlink posted on the social medium.
  • a fifth aspect of the invention comprises using the inventive App to compose voice messages with or without the use of a telephone, to address those messages to one or more recipients designated either by a telephone number, e-mail address or other form of address, to scramble the composed messages using a randomn key and futhermore to scramble the key in a recipient-specific way using a recipient-specific Token such that the message will only be readable by the intended recipients.
  • the invention may comprise in the first aspect an internet server having adapters, which are described further later with the aid of figure 2, and which are configured to interface with every voicemail system used by a subscriber, including voicemail systems provided by different, unrelated telephone service providers.
  • the following description is an example of the functions performed by such an adapter in an exemplary case.
  • Figure 1 shows the typical flow diagram for navigating through a voicemail retrieval system using voice prompts.
  • Voicemail systems belonging to different operators may exhibit a different flow, but the example used is based on a simplified form of the voicemail provided for landline phones by ATT, which was formerly established by Bell South.
  • the invention aims automatically to perform the actions that would be performed by a human subscriber to navigate through the state diagram of figure 1.
  • this action may be performed by using a computer program or "App" installed on a computer or smartphone belonging to the subscriber.
  • App When installed, such an App picks up software hooks to the keyboard and display Application Program Interfaces (API's) provided by the Operating System (OS) and gets access to all the communications APIs likewise.
  • API's Application Program Interfaces
  • OS Operating System
  • the subscriber delegates this action to be performed by the inventive server by providing it with the credentials necessary to log into his voicemail systems.
  • the use of one implementation or the other may be selected on a per- subscriber and per voicemail system basis depending on which is most suitable for his voicemail systems or personal preferences.
  • the App upon the user clicking on a "Get voicemail" Icon, the App starts executing at step 100.
  • a timer can be set to determine a periodic polling for new voicemails.
  • the voicemailbox in question is for the mobile phone on which the App is installed, the mobile phone may receive an alert when a new voicemail is available, the alert being intercepted by the App and causing it to take the desired action, thus obviating the need for periodic polling.
  • the App has a predetermined method to use to access each voicemail service. In the example under discussion, this might be to place a call to a prestored number.
  • the number to be called is 919 918 2095.
  • the smartphone other user terminal or server thus rings this prestored number in step 100.
  • the calling device waits for an answer in step 110.
  • cellphone and other phone systems provide specific signalling to indicate when a call is answered. If the call is not answered within a timeout period, transition is made to step 115 which clears down the call, then in step 117 the number of retries is counted, and a return to step 100 to try the call again is made if the number of retries is within a preset limit.
  • step 120 a voice recognition algorithm listens for a prompt to enter the subscriber's phone number associated with the voicemail system. For simplicity, a number of steps that may be needed at sign-on have been omitted from this exemplary voicemail flow diagram.
  • step 130 the subscriber's prestored phone number is issued by DTMF tone signaling or its digital equivalent.
  • step 160 two possible outcomes can be anticipated; either the password is deemed invalid at step 160 with consequent backtracking through step 167, or else the password is accepted, in which case the voicemail system will either announce that there are no messages, or that there are a certain number of messages.
  • the voice recognizer correlates for both possibilities and if the "no message" announcement is detected at step 190, the call is cleared down at step 200 and the algorithm stops. On the other hand, if the voice recognizer detects the announcement that there are messages, this preferably merely triggers recording in memory of everything from that point until a termination criterion is detected, for reasons outlined below.
  • the termination criterion might be the voicemail system clearing down the call upon receiving no further instructions.
  • the user is relieved of having to enter the 10-digit number of the voicemail system; is relieved of having to enter his own 10-digit phone number, and is relieved of having to enter his password for the voicemail system.
  • the user may be required to press a key indicating when he has understood the end of a voicemail message to have been reached or a new voicemail message to have begun.
  • Enlisting user support to mark the beginning or end of voicemail messages in this way has been described in the prior art for the purposes of assisting a speech-to-text conversion of a voicemail message. In the present invention however, it would be used to assist in parsing the voicemail replay into individual messages for the purposes of causing each to be stored, still in digital audio form, in a separate file in memory.
  • the goal of the offline processing of the entire replay recorded from a voicemail system is to partition the whole recording into individual messages, extract the time and date of receipt announced for each, and store each message in a file in association with its time and date.
  • the calling party may also be identifiable.
  • the above is the function performed by one type of inventive adapter designed to navigate an existing voice-prompt voicemail system, when no other interface is available.
  • Deleting messages that have already been recorded by the inventive voicemail aggregation server is desirable to avoid them being processed again upon a subsequent access to the voicemail system.
  • voicemails already replayed and stored could be deleted the next time the invention accesses the voicemail box, after having processed the original recording offline to properly decode the number of voicemails and having parsed the replay into individual messages.
  • three options have been disclosed above for deleting voicemails from the carrier's voicemail system after recording them on the inventive voicemail aggregation server. Different carriers' systems may work more efficiently with one deletion method than with another. The selection of which method to use would be
  • the exemplary voicemail system follows right on by announcing the next message similarly, if there is one. Voice recognition would attempt to extract the number of the message, verifying that it is sequentially one higher than the previous message, and the time and date of the message, verifying that it is later than an earlier message.
  • the check for sequential message numbers and date/times provides a way to recognize mischievous attempts to fool the machine by sending a voicemail which is the recording of the output of another voicemail system replay. This in turn could contain a message which was the replay of another voicemail system replay, and so on ad infinitum.
  • the audio stream of such a message would comprise valid system announcements but would exhibit out of sequence message numbers and non-sequential dates/times. If a message with a given number is detected twice in the audio stream, then the machine must determine which was the message and which was the message within a message, and the date./times can provide the clue to correct parsing. How much effort need be spent on making a system immune to such mischief is however debatable, but has been considered because the envisaged inventive server specifically provides the facility to forward messages from one voicemail system to another.
  • the cumulative metric is an indication of the reliability with which the prompt was detected. This is compared against the reliability of all other possible prompts and that which has the greatest reliability is used to initiate an instance of the subsequent action to be carried out. Several instances of the same subsequent action may be initiated at different times and accumulation of metrics continues from the previous value. A path which was initiated too early may fail to exhibit a high continued metric accumulation and will thus be overridden by a path that was initiated at a more optimum instant.
  • Syntactically constrained voice recognition is also known and developed in the art, in which sequences of words are limited to grammatically allowed sequences.
  • voice recognizers may contain "silence" of indefinite length as one of the allowed audio segments or "words”, so that gaps between words are recognized and correctly handled.
  • the user can require a remote server belonging to a voicemail aggregation service constructed according to the teachings herein, and on which he is a registered subscriber, to perform the polling for new voicemails.
  • the server performs this function for a large subscriber base, with the result that bottlenecks can arise. For example, if the server were to place calls to voicemail systems by wireline, and the users had requested polling every 5 minutes, and it took 1 minute to determine that there were no new voicemails (which would be the case most often), then the number of telephone lines required would be 1 /5th the number of subscribers, which is excessive. Fortunately, calls to landline numbers can be placed over the internet, using for example Skype.
  • Skype-type systems have placed concentrators in each dialing code area which are connected to the I nternet at one end and to the local telephone system at the other.
  • a call can be directed over the I nternet using Voice-Over-IP to a concentrator in the local area of a called number in order to bypass the long distance part of the telephone system.
  • the inventive voicemail aggregation server may comprise multiple instances of Skype-like software running simultaneously to allow a large number of simultaneous calls to landline voicemail system numbers without incurring the cost of long distance calls.
  • Such a multi-number, Voice- over-I P system is sometimes known as an Asterisk Server.
  • an Asterisk server can be used to receive the forwarded calls.
  • the inventive voicemail aggregation server periodically polls other operators' voicemail systems, the Asterisk Server is being used to initiate multiple calls.
  • Skype-like VoIP software or voice recognition do not need to be duplicated in computer memory to provide several operational instances executing simultaneously, providing that the software is re-entrant and that each instance has its own data segment and stack segment.
  • an Asterisk Server can be used both to initiate polling calls to any phone system's voicemail number while simultaneously receiving forwarded calls from the same or a different phone system.
  • the inventive server activates an adapter to access a subscriber's Voicemail system and navigates through it, it preferably merely records the entire replay and then parses it into individual messages by offline processing, exactly as in the previously described first implementation where the smartphone participated in collecting the voicemail replay.
  • Some voicemail systems may provide better ways to access voicemails than via a dial-up number.
  • an Internet-capable smartphone or PC visit the web page of certain carriers, enter a user ID such as a telephone number and a password, and view voicemails for numbers provided by that carrier on line, and select which to replay.
  • a smartphone may display voicemails that have been received on the voicemail systems of different carriers; however, in this prior art the user had to manually place a call to the voicemail system of each carrier to listen to a voicemail left on that carrier's voicemail system, and the voicemail was still "trapped within the phone system".
  • a more efficient voicemail retrieval system may be implemented If a documented digital interface exists with the voicemail server belonging to a particular telephone service provider, or for which the operation has been deduced though reverse engineering by a skilled and determined hacker.
  • Such a digital interface may be web-accessible and may provide voicemail header information such as the number of and identity of each voicemail, as well as separately selectable access to each voicemail, thus eliminating the need to use a voice recognizer for parsing voicemail replays for that system.
  • each voicemail system requires a particular, customized adapter to retrieve voicemails from it, based on the availability to 3rd parties such as the current inventors of documented or reverse-engineered interfaces to the voicemail system.
  • Each adapter may have a corresponding section of software code in the inventive App that is downloaded and installed on a registered user's terminal and with which it may collaborate to perform the operations described above and herein below.
  • the registered user may wish to retrieve voicemails using different terminals, for example using a mobile phone sometimes, a PC sometimes or a Plain Ordinary Telephone (POT) at other times.
  • the inventive voicemail aggregation server provides the greatest functionality to the user when accessed by an intelligent terminal, but may also, using the Asterisk type server mentioned above, provide multi-line dial-in access for POTs with reduced functionality.
  • the inventive server can include a third type of adapter that implements a multi-number, Voice-Over-IP telephone terminal that records calls that go unanswered. While this could be used for all telephone systems, the subscriber would not then necessarily know by which telephone number a caller had attempted to reach him. This may be solved by having a different forwarding number for each of the subscriber's telephones.
  • the inventive server can then aggregate the voicemails from all such forwarding numbers, as all the forwarding numbers are implemented on an Asterisk server within or co-located with the voicemail aggregation device and commonly developed and owned.
  • the voicemail aggregation device can associate the forwarding numbers to the subscriber's various telephone numbers for display to the subscriber.
  • the choice of forwarding unanswered calls to the inventive server or enabling the inventive server to pull calls from one of the subscriber's existing voicemail services is however left by the invention to the subscriber to decide.
  • the current invention may be implemented by a party other than an existing telephone service provider however, and by performing collection of voicemails across all carriers to the inventive voicemail aggregation server, allows the user to visit a single web page provided by the inventive server to view, select, listen to, pause, fast-forward, partially rewind, replay, quality-enhance, delete or share all voicemails.
  • access to the inventive server may be offered under a licence agreement by any existing carrier to that carrier'sd subscrtibers to enable them to access the voicemail systems of other carriers on which they are subscribers, thus overcoming those limitations of the prior art.
  • the inventive server can permit the user to sort the list of voicemails for display by any or all of
  • the inventive server provides the facility for the user to share any voicemail with others by posting a hyperlink to it on any suitable internet medium, such as by embedding the hyperlink in an e-mail, or posting it on Facebook or other social site or "blog", using a simple man-machine interface.
  • the server Upon logging in to the inventive voicemail aggregation server using a suitable user terminal such as a PC, the server will deliver a webpage to the web browser of the subscriber's terminal which is composed individually for each subscriber to display his messages.
  • One man-machine-interface for posting a hyperlink to a selected voicemail in an e-mail or to a social site or blog can be to drag and drop the symbol, icon or text string displayed for a voicemail in the list to an edit box that is already open for message composition. While this can be convenient when using a large-screen terminal such as a PC, it is not so convenient to have two web pages open simultaneously on a small-screen smartphone.
  • scenario (A) a prior art proposal is to pre-load the voicemail server with Facebook login credentials, so that when the user is looking at his voicemails, he can select an option to "post to Facebook" and the server automatically performs the task of posting a voicemail.
  • the disadvantage of this prior art is that the user has no choice over where it goes.
  • Facebook nomenclature as an example, there is a location on a user's Facebook page called "user status" that the prior art may have envisaged as being the default location to which the voicemail server would post a voicemail. However, that might not be where the subscriber intends.
  • Scenario (B) the subscriber is already logged into a selected social site and is positioned at an ad-hoc selected location on a selected webpage, such as reading another friend's wall, or composing a reply to a selected message, when he decides to post the voicemail link to that location.
  • the user has thus already selected where a hyperlink to the voicemail should be inserted and it remains to select the voicemail in question.
  • this is done by providing an editor which has an "insert" option that, when selected, opens a dropdown box with "voicemail" as one of the options.
  • a new window opens temporarily to display the list of candidate messages, which would be obtained by accessing the inventive voicemail aggregation server, if the list is not already downloaded to the user terminal.
  • a hyperlink to it on the server is solicited from the server, generated by the server, transmitted by the server to the user terminal, and inserted by the editor in the designated place in the message being composed, the voicemail selection window then closing to avoid obscuring the user's original message composition task, which may be on a small smartphone screen.
  • the current invention uses the user terminal to effect the transmission of the message with the embedded voicemail link to the selected social website, in contrast to using the voicemail server to communicate directly with social site to perform the posting, with the attendant disadvantages outlined above.
  • the editor upon selecting the option to insert a hyperlink to a voicemail within the editor, invokes the inventive App to communicate with the voicemail aggregation server as necessary to temporarily display a list of voicemails to the user, the selection of one of which causes a hyperlink to the selected message to be solicited from the server and inserted by the editor at the place already opened by the user and where the composing cursor was last positioned.
  • the composing cursor usually a blinking bar or square in the current character position of a message under composition, is different than the mouse cursor, which may be independently moved to select "Insert" from the editor toolbar without changing the position of the composition cursor in the message.
  • a hyperlink comprises plain text bytes that are visible to a human reader as well as hidden bytes that describe the IP address of the link and which are only intended for computer use.
  • the visible text bytes may be:
  • the words "Mary's birthday greeting" of the hyperlink would usually appear in blue and be underlined to indicate to the reader that this is a clickable link.
  • the invisible part of the link directs the web browser of a person clicking on the link to a pre-prepared computer object on the voicemail server which is downloaded to the terminal of the user who clicked on the link, and who is not necessarily either the user who posted the link or the subscriber who left the voicemail, but more usually is a third party.
  • the downloaded computer object may be a program written in html or javascript or any other language or mixture of languages which is executed for example by a java virtual machine on the user terminal to perform any one of a number of actions in addition to playing the voicemail audio file through a media player.
  • One of the actions for example can be to verify that the link was clicked within the same web page to which it was originally posted as a method of restricting the audience to the originally intended subset.
  • the current webpage on which the link was clicked may be retrieved by the App using one of the browser APIs provided by the OS.
  • the inventive App may convey information to the voicemail aggregation server in addition to the hyperlink string to facilitate this
  • the location where it will be embedded may be sent to the server as well as an indication of the selected voicemail, so that the server can generate a site-specific hyperlink.
  • the inventive server stores both the human-readable text entered by the subscriber and the non-human-meaningful data it generates for the link to be posted.
  • the owner of the voicemail aggregation registration may at any time edit the human-readable text that identifies a message by logging into the voicemail aggregation server and performing an edit function on this item in his tabulated message list.
  • Another action which can be performed at a third party's terminal upon clicking a hyperlink can be to open a pop-up window to display a prestored picture (mugshot) of the message originator, also downloaded from the server.
  • mugshot a prestored picture of the message originator
  • Yet another action that can be performed at a third party's terminal upon clicking the voicemail hyperlink is to open a pop- up box that displays an advertisement while the voicemail message is replaying.
  • the window may close automatically upon the voicemail message terminating, or alternatively manually closing the window may terminate the replay of the voicemail message.
  • a 3rd party other than a telephone carrier may implement a basic voicemail aggregation and sharing service free of charge to many registered users, the service being paid for by advertising revenue.
  • the advertising aspect of such a service may be characterized as displaying advertisements to a third party who clicks on a hyperlink to a voicemail left by a second party for a first party on any of the voicemail services to which the first party is a subscriber and which was shared in a post to a social site by the first party.
  • the inventive voicemail aggregation and sharing server also allows a previously shared voicemail to be retracted. If a message had already been posted to a site such as Facebook for example, the registered user of the voicemail aggregation and sharing service can be presented with a display of the sites to which he had already posted each message, and upon clicking on a site associated with a voicemail, the option "Retract from (site name)", can be offered. By generating separate hyperlinks for each site to which a message is posted, it is possible to retract from one site while leaving the message accessible on another site. For example, the message could be retracted from being accessed by a multitude of friends on Facebook while being left accessible in an e-mail to a particular friend.
  • the computer method by which this may be achieved may be alikened to "double indirect addressing".
  • the hyperlink would first direct the browser to a site-specific link in the inventive voicemail aggregation server.
  • the site-specific link would contain the actual address to the voicemail file on the sever.
  • the site-specific link can be replaced by a link to a page which says, in text or voice 'This message has been deleted (or retracted)"
  • the inventive server does not post the audio file, or even a link to the audio file, but rather a link to a link to the audio file, which can be unique for each destination if desired, it is possible to retract an already posted message by having the server replace the target pointed to by the link with something other than the original message.
  • the message is still stored in the server however, but that particular link no longer points to it.
  • the link to the same message posted on other media, such as embedded in an e-mail can however remain, as it can be a unique link for each possible posting destination. Knowing the site to which a message has been posted can also enable the server to deliver site-specific advertisements to a third party clicking on the hyperlink.
  • the information flow for posting a voicemail link is shown in figure 3.
  • User terminal 101 0
  • inventive voicemail aggregation and sharing server 300
  • social site server 1000
  • Communications between these devices are illustrated by jagged arrows for simplicity, but it may be understood that such communications may take place over a variety of communications networks, including the I nternet, to which access may be achieved by landline, cable, satellite, WiFi point or cellular mobile
  • communications network as examples. It may be seen that there are no direct communications between the voicemail server and the social site.
  • the user may have already logged in to social site (1 000) by providing login credentials as part of the user terminal to social site server communications 1013.
  • the user may also have navigated to a webpage on the social site and may be engaged in composing a message at a selected location on the webpage by use of an editor.
  • the user terminal may transmit a request (1020) for a list of voicemails stored on server (300), if such a list is not already to hand and up-to-date.
  • Server (300) replies by sending the list (1 021 ) which is received at the user terminal and displayed in a pop-up box.
  • the user then clicks on a voicemail displayed in the pop-up box, which causes the user terminal to transmit a request (1011 ) to server (300) bearing an indication of the selected voicemail and optionally an indication of the social site location on which it shall be posted.
  • the latter indication is not a limiting element of the invention but is interesting due to the ability of sever (300) then to generate site-specific hyperlinks to a selected voicemail for the purposes of implementing the site-specific retraction feature described above.
  • the server (300) then transmits the generated hyperlink string in communication (1012) to the user terminal.
  • the editor that is open for composing the message to be posted then inserts the hyperlink in the message where indicated by the composition cursor.
  • the user Upon completion of the message composition , the user causes the completed message bearing the hyperlink to the selected voicemail to be transmitted to the social site as part of user-terminal to social-site communications (1013).
  • Social Site (1000) thereafter displays the message in such a way that 3rd parties may click on the hyperlink to listen to the voicemail.
  • the hyperlink directs the web-browser to the indicated address on server (300) which is a pointer to a computer object that will deliver the voicemail to a media player linked to the web browser and also deliver one or more advertisements or other pictures and text for display while the voicemail is being replayed.
  • scenario A at registration and at any time thereafter, the user would have the option to indicate to the App stored in the user terminal, or to the server (300), or both, the different ways in which he could envision sharing the message, but would not need to perform the step of providing the voicemail aggregation server with login credentials to Social Sites. Instead, the login credentials are stored in the user terminal and made accessible to the inventive App which communicates with the voicemail aggregation server as just described for scenario B. The App is thus aware of the selected site for posting and uses the logon credentials to cause the user terminal to access the site to post the selected message with an embedded hyperlink provided by the server.
  • scenario A may transmit the request for voicemail list 1021 to voicemail aggregation server (300) before logging into social site server (1000).
  • the user selects the option to post a selected voicemail to social site (1000) from the options provided by the voicemail list display page, which can include save, delete, post to Facebook etc.
  • the user terminal transmits substantially the same request (1011) for hyperlink to the server as for Scenario B, indicating the selected voicemail and optionally the social site selected for posting.
  • the server (300) then returns substantially the same hyperlink in communication (1012) for scenario A as it would have done for scenario B.
  • the user terminal logs in to social site server (1000) using the credentials stored in user terminal (1010) and posts the hyperlink to the social site server at a predetermined webpage location for that site, for example, in the case of Facebook, to the user's "status" edit box.
  • social site login credentials need never be provided by user terminal (1010) to server (300), simplifying the procedure for registering with server (300) and avoiding storing private information in a place where a security breach could cause its loss.
  • the recipient is directed to the inventive server upon clicking on the link. That initiates the downloading of a computer software object that will be executed by the target platform's web browser to further download the audio file which will be played on some suitable player such as Windows Media Player, as invoked by the target platform's browser.
  • the downloaded computer software object may provide the inventive server the opportunity to deliver revenue-generating advertisements in an unobtrusive pop-up box, or in the text section of the browser window, which provides a source of revenue that allows subscriptions to the inventive voicemail aggregation service to be kept to a minimum value or even zero. Further revenue opportunities for the provision of more advanced service options are identifiable by reference to the feature list that can be offered by the inventive system, which is reproduced below.
  • the Voice Mail Aggregation System will aggregate voice mail from diverse repositories into a central warehouse.
  • the system is comprised of 4 components:
  • Voice Mail management system organizes and provides access, security and searching
  • the Voice Mail Aggregation System will provide a comprehensive feature set to subscribers including:
  • Personal (Free)-Subscriptions include aggregated voice mail for single subscriber. Unlimited number of messages stored for 12 months. Allows posting to social media [0227]
  • Family (Free)-Subscriptions allow aggregated voice mail up to 6 family members to function as a group and includes parental security features to manage messaging, review, retrain or block messaging. Unlimited number of messages stored for 12 months. Allows posting to social media
  • Gold subscription upgrade (Paid)- Allows the other three basic subscriptions to be upgraded to provide for unlimited voice mail storage duration and enhanced management features. No Ads.
  • Another feature that can be provided on the inventive voicemail aggregation server is to allow each registered user to store a list of contacts.
  • this is a remote storage facility for contact information that is often stored in a mobile phone's memory.
  • a fast way for the user to load the contact information to the server is thus simply to select an offered option to upload his contact list from his mobile phone to his personal area on the inventive server.
  • a hierarchical privacy paradigm can be implemented as on Facebook, but with regard to telephone contact information, namely, the user may designate that a specific contact may be viewed only by his "friends", or only by his "close friends" , by everybody or by nobody.
  • the server may provide web access to registered users to search for people by name or telephone number.
  • Figure 2 shows a simplified block diagram of the inventive server (300). It shall be understood that boxes identified by numerals can represent hardware modules, software modules or a combination of hardware and software.
  • Servers are standalone computers than run continuously without human intervention to provide a function to remote user terminals via the Internet. As such, they do not necessarily have keyboards and displays, except as may be needed for maintenance or updating.
  • a server may have many times the processing power of a typical home PC and in particular may have very high capacity communications interfaces.
  • a server may also comprise an array of many such processors interlinked to achieve the desired capacity.
  • a key feature of the inventive server (300) is the use of adapters (301A,301 B....301 E), which are primarily implemented in software, but which may also employ hardware interfaces.
  • Each adapter is configured to interface with one known voicemail system.
  • one adapter may interface with and be programmed to navigate through a landline telephone voicemail system such as the ATM ike system used herein as an example of a voice prompt system, and therefore may have a wireline telephone interface.
  • a landline telephone voicemail system such as the ATM ike system used herein as an example of a voice prompt system
  • it may have a VoIP interface with Skype-like software for performing the same function via the Internet.
  • Different Landline telephone service providers will likely require different adapters to navigate their respective voice-prompt systems.
  • a Verizon adapter for example, there could be a Verizon adapter, an ATT adapter, a Time-Warner adapter, a T-mobile adapter, an adapter to a subscriber owned answering machine or an adapter that enlisted the support of a user's mobile phone to retrieve voicemails from any system.
  • Time Warner delivers telephone services by cable, along with TV and Internet service, the subscriber is reached by dialing a regular landline number.
  • Adapters configured to automatically pull voicemails from existing voicemail services without participation by the user or user terminal were denoted above as "the second implementation", while adapters that enlisted the help of the user terminal were denoted above as "the first implementation”.
  • Another type of adapter is one which communicates with a subscriber's smartphone via the Internet, to enlist the support of the smartphone in collecting voicemails, as was denoted "the first implementation" above. It is helpful to offload parts of this operation to the multiplicity of subscribers' smartphones, thus relieving the server of some call initiation load.
  • the inventive server comprises "App” store (302) which stores software, adapted to different makes of cellphone if necessary, that is downloaded over the Internet to the subscriber's cellphone upon registration. "Apps” may also be stored that are adapted to run on a user's PC, Laptop, I pad or Tablet.
  • One advantage of enlisting the support of the user terminal in aggregating voicemails is that, when the user terminal is switched on and registers with a network, it may receive notifications that new voicemails are available, thus obviating the need for periodic polling.
  • the inventive App on the user terminal can intercept these notifications and either automatically pull the voicemail from the voicemail system and simultaneously or later, after storing it, transmit the stored message to the voicemail aggregation server, or else, via operation of the App, merely pass the notification to the voicemail aggregation server to cause it to retrieve the message, thus obviating the need for the server to perform polling of that voicemail system and reducing the airtime minutes used by a mobile phone.
  • Voicemail message server (303) is a software module that implements the user features outlined in the above specification for the service, generating all web pages that can be publicly or privately accessed, all active links thereon, performs storage of voicemails and delivery of advertisements when active links are clicked.
  • the offline processing described above to partition voicemail replays into individual messages may logically be performed by each adapter, as it is likely that the algorithm will be somewhat different for different telephone carriers, due to their use of different voice prompts and voicemail system state diagrams.
  • the voicemail server can be caused by a subscriber to perform various voice quality enhancement processes upon a stored digital voice message file. For example, the following processes could be invoked:
  • Internet communications interface (304) is a high capacity Internet
  • communications interface that allows the establishment of very many simultaneous connections of different types, including delivering web pages to browsers, communicating with Skype-like local concentrators, downloading Apps to smartphones or PCs and collecting digital voice recordings from voicemail systems to be processed in an appropriate adapter. It may also communicate via the Internet with a central Ad server such as provided by Google.
  • Another type of adapter can provide interfaces with different answering machines, if that is the method the user has elected to receive voicemails at a location served by a landline or cable service.
  • the invention contemplates solving the problem by offering the user a new hardware product to replace his old answering machine, which is also a feature of the current invention.
  • Web appliances may communicate one to the other, providing their IP addresses are known to eachother and they are equipped with suitable software to communicate.
  • one or more web-appliance answering machines associated with different telephone numbers belonging to the same or different subscribers can communicate with eachother or with a server web-appliance to jointly implement a voicemail message aggregation function for a subscriber or group of subscribers.
  • This implementation of an inventive voicemail aggregation apparatus may be regarded as a distributed, rather than centralized solution.
  • the inventive web-appliance answering machine product can be provided with an Ethernet or WiFi connection to the modem and pass on one or more Ethernet connections to computers, wireless routers or other appliances by performing a router function itself.
  • it can have a wireline interface to a telephone jack, and software to automatically answer a telephone call that is not answered after a predetermined number of rings.
  • the envisaged web appliance answering machine would only need connection to a telephone jack and would internally contain the filter necessary to separate DSL signals from telephone voiceband signals and loop-disconnect signalling signals.
  • This device is activated upon detecting ringing, and when the call is not answered after a predetermined number of rings, may issue a pre-recorded greeting and voice prompt to the caller to leave a message.
  • the message may be stored locally prior to forwarding it to the inventive voicemail aggregation server, or else it may forward it simultaneously over the web, using DSL for example, thus collecting voicemails from the wireline and forwarding them directly over the Internet to the inventive server (300), being effectively a remote extension of one of the adapters (301 ), e.g adapter 301 E.
  • the voicemails so collected are retrievable using the user's PC or smartphone by logging into the appropriate web page provided by inventive server (300), or alternatively by dialling a number using a Plain Ordinary Telephone..
  • An advantage of such an answering machine device is that it may capture any signalling from the telephone carrier that is provided only to the subscriber's telephone outlet, such as caller identification. It may be realized that such a function can also be provided by a PC having a telephone jack, as was common in the days of dial-up modems, and having the usual functions that were available for dial-up modem use such as ring detection, autoanswer and programmable signal processing of the received voiceband signal. In the voicemail application the signal processing would be performed to record the voicemail rather than to decode a modem signal.
  • a DSL or cable modem or both can be combined with the answering machine functionality, a WiFi access point, an Ethernet router and a wired or cordless telephone handset to provide a home appliance with multiple functionality in a single unit, replacing the multiplicity of separate units used today, each requiring their own wall transformers for power and own cable to a telephone jack or cables to interconnect them.
  • a product as described in the previous paragraph can in its simplest form be an electronic unit having only a connection to a telephone jack.
  • the telephone jack allows both voiceband signals and normal telephone signalling as well as DSL signals to be communicated to or from the networks.
  • a call received on the telephone line which is still unanswered after a predetermined number of rings is directed to voicemail.
  • Either the inventive product issues a pre-recorded greeting and records the voicemail before passing it to an associated voicemail aggregation server over the internet using the DSL signals, or else it communicates in real time with the voicemail aggregation server using DSL, the voicemail server issuing the prerecorded greeting and receiving the voicemail for recording immediately afterwards, the inventive product merely acting as a relay.
  • Figure 4 shows the internal elements of this simplest form of web-appliance answering machine, which only connects to a telephone jack.
  • the power supply circuit PSU (860) can comprise a small battery that is trickle charged by drawing only a milliamp or so from the 48 volt telephone line supply as well as the greater current that is required to be drawn to signal the off-hook condition when making or receiving a call.
  • the device is used more often, for providing a computer with DSL service for example, it may require a wall transformer to power PSU 860.
  • PSU 860 provides all the voltages necessary to power loop disconnect interface (830) as well as the other elements.
  • DSL filter (810) is a band-dividing filter that separates the telephone audio and loop disconnect signalling from the much higher frequency DSL signals.
  • the separated DSL signals are passed between the DSL modem (820) and the filter.
  • the DSL modem decodes received DSL signals to provide digital data from the internet to processor (850).
  • digital data for transmission to the internet is output from processor (850) to modem (820) for conversion to DSL signals. Since it is not possible to connect two DSL modems to the same telephone line, if the subscriber desires DSL internet access for a computer, web-appliance (800) can conveniently also provide an ethernet interface (870) for connection to a PC for example. Alternatively it can connect to a WiFi base station, which, in a more advanced web- appliance, could be built into appliance (800) to provide higher functionality.
  • Loop disconnect interface (830) may include a hybrid transformer or electronic hybrid to separate incoming and outcoming audio signals that exist on the same 2- wire line. Loop disconnect interface (830) also includes ringing detection and a circuit to draw the required off- hook current during a call. Processor (85) controls the off- hook current to signal on/off hook and maybe also pulse dialling. More usually however, such devices employ tone dialling using DTMF tone pairs. Processor (850) receives a ringing indication from the ringing detector and counts the number of rings. When the call goes unanswered after a predetermined number of rings, the processor issues a voice greeting to the caller inviting the caller to leave a message.
  • the voice greeting may be prestored in digital form in processor memory (850) or else may be fetched in real time from a remote server via the internet using the DSL connection simultaneously.
  • the digitally encoded greeting is then output though Digital To Analog converter (840) to the outgoing audio line of loop disconnect interface (830). If the caller leaves a voice message, the incoming audio from loop-disconnect interface (830) is digitized by A to D converter (840) and passed to processor (650) where is may be stored locally in memory, or passed to a remote server or other web-appliance via the internet using DSL modem (820), or stored or buffered temporarily in memory (850) before passing to a remote device.
  • voicemails are stored locally, a user may access the voicemails using any computer or smartphone. If the computer is connected to ethernet interface (870), no internet access is necessary, the web-appliance (800) having its own IP address by which the user's PC can access a webpage showing the stored Voicemail list. Moreover, the user's computer can access via the internet any other web-appliance (800) that he is authorized to access, in order to see voicemails received on another telephone number located elsewhere. There is no clear limit to the number of telephones, voicemails to which can be aggregated in this way.
  • web- appliance (800) would be configured to present both a public and a private interface with the internet. It may be realized that, providing web-access to information stored in web-appliance (800) is effectively affording it some of the characteristics of a web-server, except that its capacity to handle multiple-simultaneous accesses by a large number of users is more limited than a typical web-server, due to the limited data rate provided by DSL, or by a cable modem, whichever is used.
  • One web-appliance which may be another single-subscriber web-appliance
  • the master unit may collect and store all voicemails received at all slave units thereby acting as a voicemail aggregation device.
  • the master unit can be accessed wirelessly by a smartphone for example. Even when there is no master unit and all units store their own voicemails, a smartphone App can be provided that pulls up the information from all such web-appliances belonging to the subscriber in a single display, by accessing each over the internet using their unique IP addresses.. The smartphone user may then click on any voicemail to download it from the relevant web-appliance (800)
  • a second mode of operation of web-appliance (800) instructions can be received over the internet via DSL to cause the unit to place a telephone call using the analog telephone line.
  • a matching App on a mobile phone, PC or other suitable user terminal a user who is remote from home can effectively use his terminal to make a call from his home phone line , or even remotely answer a call to his home phone line without the delay of call forwarding.
  • Such a device can also be considered to be a remotely located part of one type of adapter for voicemail collection, the remaining part being located at the inventive voicemail aggregation server's site as in the arrangement of figure 2.
  • the inventive voicemail aggregation server is also considered to be a web appliance.
  • any web appliance with a suitably programmable processor can be configured to implement a voicemail aggregation and sharing server according to this invention as just outlined .
  • a Personal Computer with an Internet interface and if necessary an interface with a telephone network, which can be of the conventional loop- disconnect form or can be a Voice-over-IP telephone interface, both of these providing signalling signals indicative of ringing or of a telephone being taken off hook, can be programmed to aggregate voicemails from various telephones, including telephones having voicemail services provided by different, unrelated carriers.
  • the inventive web- appliance answering machine (800) can be configured to be capable of performing the same function.
  • Either the web-appliance answering machine or a personal computer can be networked over the Internet with other similar devices owned by the same subscriber or different cooperating subscribers to aggregate voicemails from the associated telephones and make them available for display, replay, deletion or sharing via a social site.
  • inventive voicemail aggregation and sharing server and service can be implemented entirely on subscriber-owned equipment by installing software configured to implement the invention.
  • web-appliance answering machines 800
  • personal Computers with inventive software installed
  • the foregoing description concentrates on voicemails that originate from a telephone communicating in a telephone system, but which may be listened to on either a similar telephone or a suitable computing device belonging to the subscriber and configured to access the inventive voicemail server.
  • the subscriber's computing device e.g. a P.C.
  • a PC can be equipped with a microphone, such as a USB microphone, for picking up a user's voice which is then digitized within the PC.
  • PC's have included for decades a digital voice recorder such as that found in Windows XP under
  • the software program is best described at a high level with reference to a screenshot of the man-machine interface as illustrated in figure 5.
  • the resemblance of the screenshot to the e-mail program Microsoft Outlook Express is no accident. This is not so much plagiarism as the desire to minimize the effort needed by users to familiarize themselves with a new piece of software; thus keeping buttons that perform functions for voicemail in the same relative locations as those that perform similar functions for e-mail helps the user to learn to use the software quickly.
  • Many software programs these days allow the user to choose which toolbars or buttons are displayed and where on the screen they are located relative to eachother.
  • Figure 5 is adapoted to a voice-messaging requirement, and other screens can be envisaged for other types of message, notably text or video.
  • An overall screen can be provided inviting the user to specify whether he wants to peruse all types of message or only text types, only voice types, or only videomail types, and likewsie when he wishes to compose a messgae he can invited to select type, so that the appropriate message display or composition screen can be presented.
  • to compose a videomail it would be appropriate to display on the screen an image of the camera output to assure the susbcriber that he was correctly aiming the camera.
  • the top toolbar has buttons that allow the user to select to save or retrieve a received or sent message on his computer in a different place than the voicemail Inbox or Sent box.
  • the Edit button allows the user to select to edit a received voicemail or just-composed voicemail which is in the Pending folder.
  • the editing functions that can be provided have been described above and can include volume adjustments, volume levelling, tone controls, noise rejection and so forth.
  • the View button allows the screen layout to be modified and also allows subsets of the messages only to be selected for display, such as messages received in a range of date/time intervals or from a particular source or class of sources, such as from telephone numbers only or from E-mail address only or messages only from people already in the Address Book, or messages only from family, messages only from business contacts or messages only from business contacts connected with a specific business or project.
  • the Message button has the same selection as in the toolbar below plus filtering functions that allow the blocking of unwanted sources or voicemail spam, which is sure to arise if and when voicemail messaging becomes as ubiquitous as e-mail or Text messaging.
  • the second top toolbar contains the controls that allow creation of new voicemails, replying to a voicemail, replying to a group, forwarding a voicemail or deleting a voicemail.
  • Destination addresses can be telephone numbers anywhere in the world or e-mail addresses anywhere in the world, or the recipient's ID for a registered subscriber on the inventive voicemail server which will be sent in a header accompanying a transmitted voicemail to the IP address of the inventive server.
  • Messages can be received by an already-registered subscriber from another already-registered subscriber using the inventive system and replies can be made likewsie. Messages can also be received by a registered subscriber from an unregistered subscriber if the regisstered subscriber has elected to have messages from other messaging systems aggregated to the inventive system. The unregistered subscriber sends such a message by any existing messaging system.
  • Voice messages may be sent from an already registered subscriber to an unregistered subscriber's e-mail address or telephone number, where they may appear, in the latter case, as voicemails on the unregistered subscriber's voicemail service.
  • a voice message is sent from an already registered subscriber to an unregistered subscriber's e- mail address, and the unregistered subscriber opens the e-mail, a link will be found, clicking on which will open a webpage provided by the inventive server that contains script to open a pop- ip window which will display text or images such as ads while simultaneously playing the voicemail through the recipient terminal's audio system.
  • This script may also contain code to generate a security toekns for the as-yet unregistered subscriber and invite him to at least partially register so that he may receive securely delivered voicemails in the future.
  • Electing to at least partially register will install the security application on the unregistered subscriber's terminal, create an account for him on the inventive server, and cause the unregistered subscriber to become a registered subscriber.
  • the newly registered subscriber can choose during this process whether to have the inventive server aggregate messages from one or more of his existing messaging systems, or not.
  • the leftmost button in the second top toolbar is selected to create a new voicemail for sending.
  • the installed system microphone is activated and a pop- up voice recorder control box appears having an oscilloscope display or bar display of the audio to give the user an indication of volume level and message duration.
  • the recording control box also has fill-in boxes for the recipient or recipients. Recording may be stopped and started by a mouse button and terminated when complete. The recorded message ready for sending will then be visible in the Pending box and may be selected to be listened to and edited until the sender is satisfied.
  • the Inbox displays received message soucres which may be telephone numbers, e-mails, or merely the names of previous contacts, the addresses of whom are already saved in the Address Book.
  • the messages displayed may be sorted in ascending or descending date/time order or may be filtered using the functions already described for the View button.
  • Messages composed in the above way may be stored on the server in their scrambled form in a common message store, i.e. a message store that is not recipient dependent.
  • the security indications that indicate to each recipient how to descramble the message are recipient-specific and are stored in a receipient-specific storage area akin to an In-Box.
  • the recipient-specific information which is much less voluminous than an entire voicemail, is downlaoded first from the server to his terminal so that he very quickly gets a display of new voicemails, and only when he clicks to listen to one of them is the appropriate file in common storage then downloaded to provide the actual voice message bits.
  • This recipient-specific information forms a header for each voicemail, which will be decribed in more detail below.
  • Each registered subscriber of the system is allocated more or less memory for storing voicemail messages that are yet-to-be received, or that he has not yet downloaded to his own computer, or which he wishes to remain on the server for the purposes of making them accessible to third parties by posting links to them on social media.
  • Messages addressed to multiple recipients may be stored only once in a common, i.e. non-recipient-specific area of storage, but the number of messages of storage for which a registered subscriber has subscribed (if more than a default number) is still useful for the server to estimate the dimension of the common storage area.
  • the amount of memory, or number of stored voicemails a particular subscriber is permitted to have before his voicemail box cries "full" may depend on the type or level of subscription.
  • Each subscriber's computer or terminal (k) is caused to generate and store in it's own memory a list of 2048-bit random numbers Rki corresponding to the permitted maximum number 'm' of stored voicemails on the server for subscriber 'k'. Each random number is then used to generate a scrambled random number Tki, called a Token above, by the following equation:
  • Tki MOD p2 [ P1 ]
  • a first prime number P1 is raised to the power of the random number Rki and the result reduced modulo a second prime number P2 to obtain the Token Tki.
  • All quantities are of the same order of wordlength as Rki, namely 2048 bits.
  • a sender (j) desires to send a voicemail to a recipient (k)
  • the sender's terminal then performs the operation indicated in figure 6 to produce the scrambled message, a value Tj to be included in the message header, and a scrambled token Kjk for each recipient, all of which are transmitted to the server.
  • Figure 6 illustrates the transmission delivery security operation provided for messages originated in the above way by the inventive voice message system.
  • Unit (2000) of figue 6 may be implemented in software, hardware, or a combination of both.
  • Random digital word generator (2001) produces a first and a second 2048-bit random number R1j and R2j respectively.
  • R1j is connected to message scrambler (2002) where it is used as the scrambling key to scramble the digital message using any suitable symmetric scrambling algorithm to produce the scrambled message output.
  • a symmetric scrambling algorithm is one in which the scrambing key and descrambling key are the same.
  • the algorithm does not have an error-extension property, whereby a single error in transmission/reception causes multiple errors after descrambling. For example, bitwise modulo-2 addition of a scrambling bitstream to the voice bitstream meets the no-error-extension property desired.
  • the scrambled message is transmitted to the server where it is stored in the common storage area referred to above, while the scrambled tokens Kjk are transmitted to the server and stored in the recipient-speciifc storage areas referred to above.
  • the word lengths of all quantities above, namely P1 ,P2, R1j, R2j, Tj, Mjk.Kjk and Tk are all typically 2048 bits (256 bytes).
  • the digitized message may be much longer depending on its duration and on the voice bitrate used. For example, a 3-minute message digitized at 16 kilosamples per second, using 16 bits per sample linear PCM, would be 46 megabits or 5.76 megabytes.
  • the data that recipient k needs to descramble message j comprise the scrambled Token, Kjk, the sender's security token Tj and an indicator of which of recipient's precalculated Tokens Tk was used. These data are contained in a recipient-specific header transmitted associated with the scrambled message.
  • the header for each recipient may be constructed by the sender or by the server. If the former, the server preferably tells the message originating terminal not only the values of Tk for each recipient but also which of the several precalculated and stored Tk's for each recipient was used, i.e. an index or other indicator of which of the Tki's was used for Tk.
  • the server contsructs the header, since it knows which of the Tk:s for each recipient were supplied, it can itself fill in this detail in each header. Yet another alternative is to include the actual of value of Tk in the header; in that case, the recipient will need to scan his local store of [R2k, Tk] pairs to find a match fot Tk during decoding.
  • the scrambled Tokens Kjk are stored in a recipient-specific area and linked to the location of the message in common storage.
  • the scrambled message may be retrieved from common storage and concatenated to the header that embodies, among other things, Tj from the output of unit (2000) of figure 6; the index i of the recipient's tokens Tki used ( or else Tk itself); and the scrambled token Kjk.
  • message header can include message source identification; date/time of origination stamps; an indication of the encoding sample rate and encoding algorithm used; the sample wordlength; the number of channels (e.g. mono or stereo), and CRC or sum check codes for the header and the message.
  • Header items which are not needed until a recipient clicks on a message to listen to it need not be communicated in the recipient-specicif header but may be communicated later in a message- specific header.
  • the message with its own header and the recipient-specific message header will be sent to any requesting recipient's terminal. It is an optional implementation detail whether the header is pre-constructed for each recipient at the sender's terminal and transmitted to and stored on the server in recipient-specific memory (i.e. an In-Box) or else constructed by the server from the data supplied by the sender's terminal and held thereon until needed.
  • recipient-specific memory i.e. an In-Box
  • Figure 7 illustrates message reception operations at the Terminal of recipient k.
  • Message decoder (3000) may be software or hardware implemented, or use a combination of both. Some functions are in common with unit (2000) of figure 6 and are thus labelled identically.
  • the message received from the server is decomposed by the header extraction unit (3002) to separate out the scrambled message bytes from the security indicators Kjk, Tj and I (or Tk).
  • the indicator i indicates which one of recipient k's Tk values was used to produce the recipient-specific scrambled token Kjk at the originating terminal.
  • the receiving terminal scans its R2k store (3001 ) containing [R2k, Tk] pairs to find the matching Tk, and hence R2k; otherwise the index i is used directly to look up the appropriate one of the R2k:s in store (3001 ).
  • the recovered R2k is combined with the message originator's token Tj extracted from the header in Diffie-Hellman operation (2004) to reconstruct the Mask Mjk.
  • Mjk is decombined from the Kjk recovered from the header in unit (2005) to obtain the descrambling key R1j, which is then used in message scrambler (2002) to descramble the message.
  • bitwise modulo-2 addition and subtraction are the same operation, so unit 2005 still performs addition as the decombining operation when bitwise modulo-2 combination is used.
  • message scrambler (2002) is the same operation for scrambling and descrambling when bitwise modulo 2 is used for scrambling.
  • the header items may already have been communicated to the subscriber terminal when it retrieved the list of new voicemails. In that case the scrambled voicemail itself, possibly with its own header of non-recipient-specific indicators, need only be transmitted to the subscriber when he selects a voicemail to listent to.
  • the choice of pre-transmitting only the receipient-specific headers for each message first, followed by the scrambled vociemails only when asked for, is not considered a limitation of the invention, but rather an optional implementation.
  • the file of scrambled digital voice bits may have a header of its own pre-pended.
  • This header may contain other , non-recipient -specific data, such as an indication of the type of speech digitization used including word lengths, sample rate, total message length, companding and number of channels, e.g. stereo versus mono and may contain the list of addressees, which is not recipient specific. Alternatively or additionally, the list of addressees may be sent in the recipient specific header, as it may be desired to display this in the message list before requesting download of any message. Examination of the recipient-specific header of figure 8 shows that the sender's terminal already has access to all of the informarion needed to construct it.
  • the sender constructs it and transmits to the server each of the recipient specific headers, or whether the server performs this function from the receipient-specific date items supplied by the sender to the server.
  • the Kjk and the recipients' Token indices (i) Havjng the server construct the headers has the small advantage that the volume of header transmission from the sender to the server is reduced by a factor just less than two when a large number of recipients is specified.
  • a system may implement both methods in dependence on the number of recipients, as an option
  • Header items and the message itself may have Cyclic Redundancy Error
  • CRCs Detection codes embedded in the respectivi headers to obviate attempted decoding of corrupt messages. If anything is received with an error detected by use of the CRC, retransmission may be requested. Repeated transmissions may be soft- or hard-combined to produce a cumulatively improving probability of success as has been described in the art of error-correction coding and decoding.
  • Figure 8 shows the layout of a typical recipient-specific message header.
  • the header of figure 8 begins with a 2-byte (16-bit) byte count for the header that allows for future addition of bytes into the "reserved field" as may be required for evolutionary purposes. For example, if a list of receipients was to be included in this header, it could be accommmodated in this reserved space.
  • the message length indicator indicates whether the reserved space is empty or contains data. The first byte of data in a non-empty reserved space can encode the type of extra data it contains.
  • the byte count allows for the correct location of the 16-bit cyclic redundancy check field at the end of the message, by which it can be verified that the header was received error-free. If the header is not received error-free, the terminal can re-request it from the server.
  • the 2-byte recipient's token index follows. It is not envisaged that more than 65536 Tokens would be active at any time and numbers in this range would be recycled over time moculo- 65536. Next comes the 4-byte Sender's ID on the server, the 4-byte Message ID on the server and the 256-byte Sender's security Token.
  • message originators can be defined by any of an e- mail address, a telephone number, a name or other method
  • the 4-byte sender ID merely encodes this along with a code that can be used by the terminal to access the actual ID format from the server for display on the terminal. Transmitting the header of figure 8 first ensures that the list of voicemails received is conveyed to the terminal rapidly. When the recipient then clicks on a displayed message to listen to it, the R1j will already be to hand to descramble it as soon as it arrives from the server.
  • a subscriber to the inventive voice-messaging system described herein first registers on the server for service the first time he accesses the server and receives an Application Software program which is downloaded from the server and stored on the subscriber's terminal.
  • the subscriber may also, upon registration, transmit to the server his login credentials for one or more voice mailboxes he has for his various telephones, including telephones served by different, unrelated service providers.
  • the App After initialization of the App, whenever the recipient's computer is switched on, the App informs the server that it is available, and the server transmits a list of new voicemails or other messages to the terminal which may be displayed visually to the subscriber.
  • an e-mail program such as Microsoft Outlook Express will download messages at that time and store them locally on the terminal. It is an optional implementation detail whether all new voicemails are downloaded at terminal start-up and whenever a new voicemail is received at the server, and the suscriber's App is running, or whether a voicemail is only downloaded when the subscriber first clicks on it in the displayed message list.
  • voicemails are voluminous in bitcount, it can be advantageous to send only the header infomation and to delay transmitting the actual voicebits until the user selects to listen to a specific message. This is even more advatageous in the case of video messages wheich can have even higher bitcount. In the case of short text messages, or of any message of less than a predtermined bitcount, it could be decided that the system will always send suhc short messages at the same time as their recipient-specific headers.
  • the server marks a downloaded message for deletion (for that subscriber) immediately after a confirmed successful download and descrambling operation or whether a grace period of a few days is provided before marking the message for deletion from the server after all recipients have read it. It is also possible for the subscriber to indicate to the server that the server should not delete the message by checking a box next to the displayed voicemail or other message to signal "mark as unread" to the server; then, despite having downloaded and listened to a voicemail, the voicemail will be retained on the server in scrambled form until further subscriber action.
  • the recipient specific information (Kjk, etc) is deleted from the subscriber-specific storage, but the message is retained in common storage until all recipients have deleted the corresponding recipient-specific data from their Inboxes.
  • the recipient's voicemail Application program After downloading a new voicemail or other message type, the recipient's voicemail Application program extracts the subscriber-specific Tokens Kjk and i (or Tki) and the message-specific Token , Tj , from the header. The value of i ( or Tki) is then used to locate the corresponding value that generated it, Rki , in the subscriber terminal's local memory. The recipient program then unscrambles the voicemail by computing the following equation:
  • R1j Kjk - MOD p2 [ Tj ] where "-" signifies the opposite of the "+” operation in box (2005) of unit (2000) in figure 6. That is, the message Token Tj is raised to the power of the recipient's locally stored random number Rki, and. the result is reduced modulo P2.This reproduces Mjk which is then de-combined with Kjk to produce the message scrambling key R1j, which may then be used in the reverse process to message scrambling (2002) to descramble the message. The descrambled message may then optionally be stored locally on the recipient's terminal if it is desired to avoid repeating the above descrambling operations every time the message is to be listened to.
  • R1j, Kjk etc then to be erased from memory - otherwise at least R1j would need to be retained, with Tj and Kjk possibly being retained on the server by marking the message as unread. If R1j is erased, then the scrambled message can never again be descrambled by that subscriber. Therefore an indication to the server that a message can be deleted is that all receipients have deleted their corresponding R1j:s.
  • the recipient who decides to publish it indicates via the tools provided in the Application program running on his terminal that he wishes to do so, in the manner previously described above.
  • a first optional method that the Application Program may then use to publish a previously scrambled message is to have first descrambled the message and returned it to the server in descrambled form where it will be stored without deleting the original scrambled message.
  • the server will return an HTML link to the stored message to the subscriber as previously described above.
  • the HTML link will then be embedded in a post on the social medium.
  • a person browsing the social medium and clicking on the link will be directed to the server; the server will respond by downloading code that orchestrates playing of the unscrambled voice message that will be streamed from the server as well as opeing a pop-up window for dispaying visual information.
  • the visual information could be any of: A mugshot of the voicemail originator; a progress bar; originator ID and date and time of origination and/or revenue generating advertisements. Because the voice message is audio, the display of visual informarion at the same time in a small pop-up window is not intrusive to the recipient's experience. It is thus believed that such advertisements will be more readily noticed than if the recipient's text-reading faculties were already occupied in reading a text message such as an e-mail.
  • a second method of publishing a message on social media is to descramble the message at the publishing recipient's terminal and then to return the descrambled message to the server to replace the original scrambled message. It is then necessary to edit all of the pertinent data stored in the multiple recipients' in-boxes to mark the message as already descrambled rather than scrambled. This is somewhat more complicated than the first method and has only the minor advantage of reducing message storage, without reducing any data transmission volume..
  • the server may implement the operations of figure 6 exactly as previously described for running unit (2000) on a susbcriber terminal. In this case however, only one Tk is input to unit (2000), being the next Tk in the list previously lodged by the intended recipient subscriber, and only a single corresponding Kjk is output along with the scrambled message.
  • the unscrambled message may then be deleted from the server along with all other intermediate values not needed by the recipient to decramble the message. In particular, the value of R1j and R2j and Mjk generated by the server are no longer needed and are deleted. Tj, the selection i of from the recipient's Tki and Kjk are retained as long as needed to ensure error-free transmission of the header of figure 8 to the recipient.
  • the forwarding subscriber's Application Program first descrambles the message as previously described. Values of Tk for the recipients to whom the message is to be forwarded are then solicited from the server. The Application Program then generates a random digital word using random word generator (2001 ) but replaces part R1j of the word with the R1j obtained during the descrambling operation, while retaining the new R2j. Using the new R2j and the Tk of the forwarded recipients, operations (2003,2004) then produce the value Tj and a value Kjk for each of the forwarded recipients.
  • the Tj an Kjk are then transmitted to the server to be utilized in constructing a new header for each of the forwarded recipients; alternatively, the new headers are constructed by the forwarding Application Program and sent to be stored on the server in the new recipients' In-boxes.
  • the same scrambled voice message already stored on the server may be used for the forwarded recipients as long as the appropriate new headers are used for each.
  • the forwarded message headers may optionally contain a date/time stamp in the reserved bytes field for the time at which the message was forwarded as well as the date/time stamp of the message origination.
  • Random digital word generator (2001 ) is required to produce blocks of 2048 bits, that is, 256 bytes, of unpredictable bits.
  • a PC generates a random number by taking snapshots of the X86's 64-bit CPU timer at various points in the program and using those values to seed a pseudo-random number generator. In this case, 32 snapshots of the CPU timer would yield 256 bytes of seed.
  • some message bits, or a digest of the message such as a CRC code or a SHA 256 hash of the message can be mixed in to the pseudo-random number generator as it is running.
  • a pseudorandom number generator that operates on an initial seed to generate a random number that are well known in the art.
  • a long linear feedback shift register implemented in software can be used.
  • the SHA256 hashing algorithm can be used to mix 32 bytes of the message with 32-bytes of 4 CPU timer snapshots to produce a 32-byte hash of those 64 bytes, which is then repeated 8 times using different CPU timer snapshots and/or message data to obtain 256 bytes of random output.
  • the first iteration of the SHA256 algorithm uses the SHA256 table of prime cube root data as the initial state while subsequent iterations use the previous hash.
  • the exact random number generation technique used is immaterial as long as it produces unpredictable output, and the method does not need to be identical in every user terminal.
  • the SHA256 algorithm is likely to be available due to its use in securing digital currency transactions such as bitcoin transactions. Moreover, for the same reason, hardware chips have been produced to vastly accelerate SHA256 operation, should many such operations be required at the inventive server. A suitable design is illustrated with the aid of figure 9.
  • exponentiation operations modulo P2 of sub-units may be carried out using any of the recursive software or hardware implementations based on
  • Karatsuba-Offman long multiplication or squaring as described in US patent number 7,113,593 to inventor Dent.et al and may use MMX SSE instructions or Graphics Processor Units (GPUs) having highly parallel integer arithmetic units to further increase speed.
  • GPUs Graphics Processor Units
  • the message scrambling sub-unit (2002) scrambles the message bits, bytes or words using the random number R1j.
  • R1j is used to seed a pseudorandom bitstream generator to produce a stream of pseudorandom bits, bytes or words that are preferably bit-wise modulo-2 added to the message bits.
  • bitwise modulo-2 addition also called Exclusive- OR, is that adding the same pseudorandom bits a second time undoes the scrambling.
  • the mixing stage of figure 10 comprises a starting state of eight, 32-bit words (2002-1 ) and produces a subsequent state (2002-2) also of 256 bits as follows:
  • the first three 32-bit words of the starting state (a,b,c) become the three subsequent state words (b,c,d) and likewise starting state words (e,f,g) become subsequent state (2002-2) words (f,g,h).
  • Stating state words (a,b,c) are also combined using the function Maj (2002-3) while a alone is operated on by the function ⁇ o (2002-5).
  • the outputs of the two functions Maj and ⁇ o and the output of adder 2002-12 are then added in 32-bit adder (2002-4) to produce subsequent state word a.
  • the values K(t) are constants which are the 32-bit fractional part of the cube roots of the first 64 prime integers, and are used cyclically.
  • the values W(t) are, for the first 64 values, the 64, 32-bit words of the 2048 bit random number R1j defined earlier. Subsequent values after the first 32 values of W(t) are defined by the recursion relation below:
  • W. a,(W. _) + W. _ + ⁇ (W. , J+W.
  • figure 10 derives a new subsequent state from a previous state for each new 32-bit word W(t) presented.
  • the very first starting state is initialized to the first 8 values of K(t).
  • the new starting state of each iteration is the 32-bit word-wise addition of the old starting state to the just-calculated ending state from the previous iteration.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Selon un premier aspect, la présente invention concerne un service de messagerie amélioré comprenant un serveur destiné à recevoir des messages d'un premier abonné adressés à un ou plusieurs seconds abonnés et à les stocker sous une forme embrouillée sur le serveur conjointement avec des jetons de sécurité spécifiques à chaque message et à chaque abonné destinataire afin de ne faciliter le désembrouillage que par les abonnés destinataires souhaités. Selon un second aspect, l'invention concerne un terminal d'abonné destiné à calculer au préalable des jetons de sécurité correspondant à chacun d'un nombre de messages restant à recevoir et à transmettre les jetons de sécurité à un serveur d'embrouillage de messages même lorsque le terminal d'abonné de réception est hors ligne. Un terminal constituant l'origine d'un nouveau message reçoit du serveur un jeton de sécurité calculé et stocké au préalable pour chacun d'un nombre de destinataires souhaités et les combine avec un jeton de sécurité généré localement pour former des informations d'en-tête comprises dans chaque nouveau message.
PCT/US2014/024568 2013-03-12 2014-03-12 Système et appareil d'agrégation et de partage de messages électroniques WO2014165152A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US13/796,990 US20140270115A1 (en) 2013-03-12 2013-03-12 Electronic Message Aggregation and Sharing System and Apparatus
US13/796,990 2013-03-12
US14/201,807 US20150256679A1 (en) 2014-03-08 2014-03-08 Electronic Message Aggregation and Sharing System and Apparatus
US14/201,807 2014-03-08

Publications (1)

Publication Number Publication Date
WO2014165152A1 true WO2014165152A1 (fr) 2014-10-09

Family

ID=51659082

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/024568 WO2014165152A1 (fr) 2013-03-12 2014-03-12 Système et appareil d'agrégation et de partage de messages électroniques

Country Status (1)

Country Link
WO (1) WO2014165152A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327511A (zh) * 2018-12-14 2020-06-23 北京京东尚科信息技术有限公司 即时通讯方法、系统、终端设备与存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080004046A1 (en) * 2004-08-14 2008-01-03 Mumick Inderpal S Methods for Identifying Messages and Communicating with Users of a Multimodal Message Service
US20090154667A1 (en) * 2007-12-13 2009-06-18 Verizon Data Services Llc Multiple visual voicemail mailboxes
US8107495B2 (en) * 2005-05-13 2012-01-31 Yahoo! Inc. Integrating access to audio messages and instant messaging with VOIP
US20130016832A1 (en) * 2011-07-15 2013-01-17 Fujitsu Semiconductor Limited Security device
US20130024787A1 (en) * 2006-06-27 2013-01-24 Confluence Commons, Inc. Peer-to-peer aggregation system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080004046A1 (en) * 2004-08-14 2008-01-03 Mumick Inderpal S Methods for Identifying Messages and Communicating with Users of a Multimodal Message Service
US8107495B2 (en) * 2005-05-13 2012-01-31 Yahoo! Inc. Integrating access to audio messages and instant messaging with VOIP
US20130024787A1 (en) * 2006-06-27 2013-01-24 Confluence Commons, Inc. Peer-to-peer aggregation system
US20090154667A1 (en) * 2007-12-13 2009-06-18 Verizon Data Services Llc Multiple visual voicemail mailboxes
US20130016832A1 (en) * 2011-07-15 2013-01-17 Fujitsu Semiconductor Limited Security device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327511A (zh) * 2018-12-14 2020-06-23 北京京东尚科信息技术有限公司 即时通讯方法、系统、终端设备与存储介质
CN111327511B (zh) * 2018-12-14 2022-04-12 北京京东尚科信息技术有限公司 即时通讯方法、系统、终端设备与存储介质

Similar Documents

Publication Publication Date Title
US20150256679A1 (en) Electronic Message Aggregation and Sharing System and Apparatus
US20140270115A1 (en) Electronic Message Aggregation and Sharing System and Apparatus
US8989713B2 (en) Selection of a link in a received message for speaking reply, which is converted into text form for delivery
US9288641B2 (en) Short message service (SMS) data transfer
US7606706B1 (en) System and method for storage and retrieval of personal communications in a broadband network
GB2445666A (en) Method of replying to an electronically received message
US8706912B2 (en) Unified LTE cloud system
US20080207233A1 (en) Method and System For Centralized Storage of Media and for Communication of Such Media Activated By Real-Time Messaging
CN1173260A (zh) 联合报文传送和长途通信系统
EP0662763A2 (fr) Boîte aux lettres électronique intégrée
JP2005045814A (ja) メッセージングサービスの受信箱内に寄託されたメッセージを投函するための方法及びシステム
WO2014165152A1 (fr) Système et appareil d'agrégation et de partage de messages électroniques
WO2007014568A1 (fr) Procede de transmission d'un message audio vers une adresse electronique quelconque a partir d'un terminal mobile
AU2012258326B2 (en) Method of replying to an electronically-received message
FR2965439A1 (fr) Procede permettant un echange d'informations de contexte au sein d'un groupe d'utilisateurs partageant un meme identifiant
KR101261229B1 (ko) 이동통신 단말기를 이용한 개인화된 컨텐츠 제공 서비스시스템 및 방법
WO2013128094A1 (fr) Procede et dispositif de mise a disposition d'au moins une donnee de communication
TW201106659A (en) Message notification system
EP2410723A1 (fr) Procédé et module d'enrichissement dynamique d'un message vocal
TW200531519A (en) A television image telephone service system used in an interactive television

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14778683

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14778683

Country of ref document: EP

Kind code of ref document: A1