US20050055433A1 - System and method for advanced rule creation and management within an integrated virtual workspace - Google Patents

System and method for advanced rule creation and management within an integrated virtual workspace Download PDF

Info

Publication number
US20050055433A1
US20050055433A1 US10/889,711 US88971104A US2005055433A1 US 20050055433 A1 US20050055433 A1 US 20050055433A1 US 88971104 A US88971104 A US 88971104A US 2005055433 A1 US2005055433 A1 US 2005055433A1
Authority
US
United States
Prior art keywords
conflict
rules
messages
outcome
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/889,711
Inventor
Boban Mathew
Thomas John
Dagny Evans
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CATALYSTWEB LLC
Original Assignee
Sonolink Communications Systems LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sonolink Communications Systems LLC filed Critical Sonolink Communications Systems LLC
Priority to US10/889,711 priority Critical patent/US20050055433A1/en
Assigned to SONOLINK COMMUNICATIONS SYSTEMS, LLC reassignment SONOLINK COMMUNICATIONS SYSTEMS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EVANS, DAGNY, MATHEW, BOBAN, JOHN, THOMAS
Publication of US20050055433A1 publication Critical patent/US20050055433A1/en
Assigned to CATALYSTWEB, LLC reassignment CATALYSTWEB, LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SONOLINK COMMUNICATIONS SYSTEMS, LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • This invention relates generally to the field of information management systems. More particularly, the invention relates to a system and method for creating and managing an advanced rule set within an integrated WorkSpace.
  • the number of legitimate messages received and sent in the course of a day averages roughly fifty.
  • the number of devices that individuals use for communications and messaging has also multiplied.
  • Such devices include computers, fax machines, wire-line phones, wireless phones, personal digital assistants (“PDAs”), and pagers, with each device typically handling a different type of message or method of communications.
  • PDAs personal digital assistants
  • unified communications solutions strive to consolidate different types of messages into a single platform. Many of these platforms allow for remote access and management of messages over the Public Switched Telephone Network (“PSTN”), the Internet, as well as other public and private voice and data networks. Increasingly, such solutions are also tied to communications systems themselves to allow both real-time and near-real-time communications. For example, many voicemail platforms enable users to use the call-back number of a voicemail sender to return a call during the course of retrieving a voicemail. Unified communications solutions, therefore, allow users to access and manage different types of messages from a single access point, regardless of the user's device of choice. These solutions also permit some limited communications (as opposed to retrieval and management of messages) from the same platform by interfacing with communications systems.
  • PSTN Public Switched Telephone Network
  • the Internet the Internet
  • voice and data networks Increasingly, such solutions are also tied to communications systems themselves to allow both real-time and near-real-time communications. For example, many voicemail platforms enable users to use the call-back number of
  • FIG. 1 illustrates various functional platforms employed in one embodiment of the invention.
  • FIG. 2 illustrates a WorkSpace enterprise environment according to one embodiment of the invention.
  • FIG. 3 illustrates a WorkSpace carrier environment according to one embodiment of the invention.
  • FIG. 4 illustrates a WorkSpace stand alone environment according to one embodiment of the invention.
  • FIG. 5 illustrates WorkSpace user access and information flows according to one embodiment of the invention.
  • FIG. 6 illustrates WorkSpace system hardware architecture employed in one embodiment of the invention.
  • FIG. 7 illustrates a WorkSpace system software architecture employed in one embodiment of the invention.
  • FIG. 8 illustrates WorkSpace meta document creation and transfer according to one embodiment of the invention.
  • FIG. 9 illustrates an example of user preferences related to message access/retrieval and corresponding message sets according to one embodiment of the invention.
  • FIG. 10 illustrates a method to resolve conflicts in message and document filtering/routing according to one embodiment of the invention.
  • FIG. 11 illustrates an exemplary sample distribution comprising evening home calls.
  • FIG. 12 illustrates a stylized triangular distribution of the evening home calls.
  • FIG. 13 illustrates an exemplary two-dimensional representation of a two-variable joint distribution.
  • FIG. 14 illustrates an exemplary generalized two-dimensional representation of a two-variable joint distribution.
  • FIG. 15 illustrates an exemplary mapping of conditions against resultant outcomes.
  • FIG. 16 illustrates an exemplary outcome space for rules as defined by acceptability thresholds.
  • FIG. 17 illustrates an exemplary degree of membership in a rule condition.
  • FIG. 18 illustrates an exemplary representation of perceived intrusiveness of calls to home phone.
  • FIG. 19 illustrates an exemplary joint mapping of condition (time of day) and outcome (intrusiveness) associated with calls to home phone.
  • FIG. 20 illustrates an exemplary joint mapping of condition (time of day) and outcome (intrusiveness) associated with voicemail messages.
  • FIG. 21 illustrates an exemplary representation of joint outcomes of two possible actions (call to home and voicemail).
  • FIG. 22 illustrates an exemplary outcome space for rules as defined by acceptability thresholds.
  • FIG. 23 illustrates a pseudo-address method for text messaging according to one embodiment of the invention.
  • FIG. 24 illustrates an exemplary pseudo-address method for instant messaging according to one embodiment of the invention.
  • references to “one embodiment” or “an embodiment” mean that the feature being referred to is included in at least one embodiment of the invention. Moreover, separate references to “one embodiment” in this description do not necessarily refer to the same embodiment; however, neither are such embodiments mutually exclusive, unless so stated, and except as will be readily apparent to those skilled in the art. Thus, the invention can include any variety of combinations and/or integrations of the embodiments described herein.
  • a system is described below that contains communications, message management, and document management functions as well as applications utilizing these functions. It is both a user portal and a tool that enables communications, message management, and document management.
  • This system will be referred to herein as the “WorkSpace” system.
  • the WorkSpace system contains a communications management platform 110 that links the rest of the system to communications equipment that are in turn connected to both public and private telephone and data networks 140 .
  • the communications management platform is integrated with a message management platform 120 that is connected to the same telephone and data networks 140 as well as to a document and database management platform 130 .
  • the document management platform could also be connected independently with telephone and data networks.
  • the term “platform” is used here to describe software code that performs communications, message management, and document management functions.
  • a WorkSpace system may also contain process- or situation-specific applications that incorporate defined communications, message management, and document management tasks.
  • the WorkSpace system acts as the entry point for the important tasks handled by many individuals during the course of a day: (1) communications; (2) message management; and (3) document management. As mentioned above, it may also act as a portal to applications that incorporate these three functions. For example, consider the communications and document requirements of a doctor. They may include transferring documents to colleagues as part of messages about patient care. An application in this context could include (a) transmittal of a prescription to a pharmacy along with (b) information on patient insurance from an insurance database on the doctor's computer and (c) transmittal of some lab results to a colleague along with a link to retrieve history of lab tests.
  • the prescription transmittal and the test result retrieval methods are examples of applications that may be enabled by and accessed through the WorkSpace system described herein.
  • WorkSpace software integrates its message management platform to communications systems such as Private Branch Exchanges (“PBX”s) and email servers that are in turn connected to communications networks. It also allows users (consistent with that user's privileges) to access and manage documents and databases on computer devices such as servers and mainframes. Beyond merely facilitating access to documents and databases, the WorkSpace system also allows for the creation of context-specific document creation, transfer, storage, and other document management functions by using the message management platform as an engine for these functions. It is especially powerful when both documents and messages are part of the same work process. The WorkSpace system, therefore, integrates communications, message management, and document management in a single system. It also allows the creation of different applications that incorporate these three functions.
  • PBX Private Branch Exchanges
  • FIG. 2 shows a typical enterprise environment in which a WorkSpace system is deployed.
  • the enterprise driven by its voice communications requirements, is connected to the PSTN 260 directly via Time Division Multiplexing (“TDM”) circuits such as T-1's and PRI's or analog phone lines.
  • TDM Time Division Multiplexing
  • the enterprise is indirectly connected to the PSTN through a carrier-grade hybrid telephony switch 255 used to connect an enterprise using packet-voice protocols such as Voice-over-Internet-Protocol (“VoIP”) for internal voice communications.
  • VoIP Voice-over-Internet-Protocol
  • Such hybrid telephony switches generally handle conversions from VoIP protocols to TDM protocols and are often connected to signaling networks such as the Signaling System 7 (“SS7”) network.
  • SS7 Signaling System 7
  • the first embodiment is typical in a circuit-switched environment while the second describes a VoIP environment.
  • An enterprise that chooses to handle the VoIP to TDM conversion itself rather than through a third-party service provider may also use a media gateway 230 that is either part of or connected to the enterprise's telephony switch 210 to perform the conversion.
  • the enterprise may be connected directly to the PSTN over TDM circuits but may also process some or all VoIP calls through the use of a media gateway 230 at the edge of its voice network.
  • PSTN-bound traffic is eventually processed through a hybrid telephony switch 245 which lies at the edge of the enterprise's data network 250 , but which may or may not be operated by a third-party service provider.
  • enterprise telephony switch devices 210 On the enterprise side, the connection from the PSTN 260 terminates on enterprise telephony switch devices 210 .
  • Such devices include digital PBX's, analog and digital key systems, and VoIP-capable PBX's. These are the devices that route calls to and from end user stations such as telephones and fax machines 200 . End-user-facing trunks or lines connect telephony switch devices to end user stations.
  • the design of the WorkSpace system allows connectivity to (a) the enterprise telephony network (regardless of the underlying transport protocols), (b) enterprise data servers or computers 235 , (c) other message management platforms used by the enterprise such as email servers 220 , and (d) additional WorkSpace systems 240 that may be required. It should be noted that separate data storage devices, message management platforms, and additional WorkSpace systems are optional, and are not required for complying with the underlying principles of the invention. They need to be deployed only if message and data volumes, higher levels of security, and/or user preferences for third-party message management solutions are relevant considerations. An enterprise or carrier would deploy routers and/or switches 225 to tie together the above described infrastructure.
  • a computer device 265 such as a personal computer or PDA tied to the data network of the enterprise, either through a private or a public data network.
  • a computer device 265 such as a personal computer or PDA tied to the data network of the enterprise, either through a private or a public data network.
  • users may also access the WorkSpace system through a telephone device connected either to the PSTN or the enterprise's voice network. Access through hybrid computer-telephone devices is also possible.
  • the WorkSpace system is deployed in a carrier environment.
  • This type of deployment illustrated in FIG. 3 , allows carriers to provide data management services along with communications and messaging services.
  • the WorkSpace system is connected to a carrier's local telephony switch 310 regardless of whether the switch was operating in circuit-switched or packet-based environments.
  • End users access the WorkSpace system through a telephone device 300 or a computer device 365 over a data network which may be either private or public.
  • telephone and fax devices would be connected to the carrier switch over trunks, lines, and data circuits.
  • carrier switches unlike enterprise switches, are generally connected to a signaling network such as the SS7 network.
  • SS7 network This allows carriers, unlike enterprises, to use Advanced Intelligent Network (“AIN”) functionalities of carrier-grade switches to pre-screen and direct calls using databases on the signaling network.
  • AIN Advanced Intelligent Network
  • these databases are attached to SS7 Signal Transfer Point (“STP”) switches.
  • STP Signal Transfer Point
  • pre-screening could also be enabled in the enterprise environment, it would require calls to be processed through the call and message management functions of a WorkSpace system. This means that additional circuits and ports would be required.
  • a carrier could avoid these requirements through the use of AIN features.
  • carriers may choose to deploy messaging platforms of different vendors 320 that are tied to WorkSpace systems over a data network. Additional data servers 335 could also be connected in the same manner. Carriers that want to retain their embedded TDM infrastructure but also support packet-voice traffic could deploy media gateways 330 to convert TDM traffic to the appropriate packet-voice protocol.
  • a hybrid telephony switch 345 would be required at the edge of the carrier's data network to allow for the conversion of packet-voice traffic to TDM format. This configuration would also permit carriers to migrate voice traffic from legacy TDM equipment to packet-voice equipment over time.
  • the WorkSpace system may also be deployed in a stand-alone configuration as shown in FIG. 4 .
  • the WorkSpace system 410 may be connected to the PSTN 450 via circuits such as T-1's, PRI's, or analog circuits.
  • devices such as telephones or faxes 400 or computer devices 455 that are used to access the various functionalities of a WorkSpace system.
  • a media gateway 425 may be attached to the WorkSpace system to enable TDM to packet-voice conversions.
  • a hybrid telephony switch 445 would be required to reconvert the packet-voice to TDM voice traffic.
  • Equipment such as third-party email servers 415 , additional document servers 430 , and additional WorkSpace systems 435 are optional. This optional equipment may be connected to the main WorkSpace system and to each other through a router or switch 420 . All data communications and document transfers would take place over data networks 440 .
  • the stand-alone configuration limits the extent of real-time communications because the switching functionalities of enterprise and carrier telephony switches would no longer be available. It does not, however, eliminate real-time communications altogether because the device could be connected to the PSTN either directly via PSTN-facing circuits or indirectly through a data network with a hybrid telephony switch 445 at its edge.
  • the stand-alone configuration may be more appropriate in environments where message management and data management functionalities were relatively more important than communications needs.
  • An example of such an environment is an offline group within a company responsible for customer correspondence and investigation of billing disputes.
  • the need for real-time communications may be minimal. Indeed, PSTN-facing trunks could be eliminated altogether and packet-voice traffic that is transported through a third party's hybrid telephony switch could ensure adequate real-time voice communications.
  • users may access WorkSpace system functions and applications in several ways including: over a telephone device, from a data network access device such as a personal computer, or through hybrid devices such as I-Mode phones, Blackberry handheld devices, and devices that access data sources through voice recognition schemes.
  • a data network access device such as a personal computer
  • hybrid devices such as I-Mode phones, Blackberry handheld devices, and devices that access data sources through voice recognition schemes.
  • users generally access the servers with devices 580 connected to the PSTN and/or the Internet.
  • access through other public and private voice and data networks is also possible.
  • Given the narrow bandwidth of the telephone and the generally imperfect user experience with accessing text over the telephone most users are unlikely to want long text messages or documents read to them over the telephone.
  • Such access to text messages or documents is technically feasible and can be easily be accommodated if desired by users through the use of third-party Text-To-Speech (“TTS”) engines.
  • TTS Text-To-Speech
  • Non-text documents such as spreadsheets and databases
  • non-text messages such as faxes
  • users access their summary characteristics (such as size, name, or document type) over the telephone and use such characteristics to transfer them and perform other limited management functions, as described herein.
  • One way to access a WorkSpace system is over a data network to which the user is connected via a broadband connection.
  • One particular user device is a hybrid telephone-computer device that communicates over both voice and data networks. This optimal access method allows fast and complete access to one's documents and messages in addition to convenient real-time communications.
  • Information (broadly defined) is either stored directly on or is sent to WorkSpace systems by individuals or systems over voice and data networks, both public and private. Examples of such information include voice calls, faxes, text messages, emails and documents.
  • incoming information is generated by voice-network-connected devices 560 , data-network-connected devices 555 , and data-network-connected data system devices 550 (grouped as 510 in FIG. 5 ).
  • voice-network-connected devices 560 incoming information is generated by voice-network-connected devices 560 , data-network-connected devices 555 , and data-network-connected data system devices 550 (grouped as 510 in FIG. 5 ).
  • voice-network-connected user devices 575 voice-network-connected user devices 570 , and data-network-connected data storage devices 565 (grouped as 520 in FIG. 5 ).
  • users may be notified of messages and documents that they have received based on notification criteria established in a WorkSpace system 530 , as described herein.
  • users When connected to either communications switching equipment or communications networks themselves, users may engage in real-time and other communications enabled by such equipment and networks.
  • FIG. 6 illustrates one embodiment of a WorkSpace computer system 651 , which may perform the functions of a web server, an email server, a server for the storage of messages, and a server for the storage of documents and/or databases.
  • a similar computer system either attached to system 651 with a telephone network interface or within system 651 itself, with TTS and speech recognition programs may be used to read text messages to users and to implement a voice response unit.
  • the computer system 651 contains a central processing unit (CPU) 652 , memories 653 and an interconnect bus 654 .
  • the CPU 652 may contain a single microprocessor (e.g. an x86 microprocessor), or it may contain a plurality of microprocessors for configuring the computer system 651 as a multi-processor system.
  • the memories 653 include a main memory, such as a dynamic random access memory (DRAM), as well as a read only memory, such as a PROM, an EPROM, a FLASH-EPROM, or the like.
  • the system 651 also includes mass storage devices 655 such as various disk drives and tape drives.
  • the main memory typically includes dynamic random access memory and high-speed cache memory. In operation, the main memory stores at least portions of instructions and data for execution by the CPU 652 .
  • the mass storage may include one or more magnetic disk or tape drives or optical disk drives, for storing data and instructions for use by CPU 652 .
  • at least one mass storage system 655 in the form of a disk drive or tape drive stores the operating system and application software as well as data, such as received and sent messages and documents.
  • the mass storage system 655 within the computer system 651 may also include one or more drives for various portable media, such as a floppy disk, a compact disc read only memory (CD-ROM), or an integrated circuit non-volatile memory adapter (i.e. PC-MCIA adapter) to input and output data and code to and from the computer system 651 .
  • mass storage devices for received and sent messages and documents and parts of the application software may be outside computer system 651 .
  • the computer system 651 also includes one or more input/output interfaces for communications, shown by way of example as an interface 659 for voice-grade communications via a voice communications network.
  • the interface 659 may be a modem, channel bank, digital signal processor card with ports, fax cards, or any other appropriate voice-grade communications device, for digital and analog communications of various types via a voice communications network.
  • the physical communication links may be optical, wired, or wireless (e.g., via satellite or cellular network).
  • the computer system 651 may further include appropriate input/output ports 656 for interconnection with data networks or devices connected over a common data network.
  • the input/output ports 656 may be a modem, an Ethernet card or any other appropriate data communications device.
  • the interface 656 preferably provides a relatively high-speed link to a data network or to the Internet.
  • the physical communication link may be optical, wired, or wireless (e.g., via satellite or cellular network).
  • the computer system may comprise a mainframe or other type of host computer system capable of web-based communications via a data network or the Internet.
  • the input/output ports may include a display and keyboard serving as the administrative or user interface.
  • the server type system could also include a port for connection to a printer.
  • the input/output ports are one of the main access points for users into the computer system 651 as well as the point of interconnection with other WorkSpace systems and related computer devices.
  • Each computer system 651 runs a variety of application programs and stores data, enabling one or more interactions via the communications interfaces or the input/output ports to implement the desired processing for the WorkSpace service or the processing of requests for related services.
  • One or more such applications enable the delivery of web pages and/or the generation of email and other messages supported by WorkSpace.
  • the computer system 651 may run other programs and/or host other web-based or email based services. As such, the computer system 651 need not sit idle while waiting for WorkSpace service related functions.
  • the system 651 may be implemented as a single computer system or as a distributed system having multiple appearances at different nodes on the Internet.
  • the components contained in the computer system 651 are those typically found in general purpose computer systems used as servers, workstations, personal computers, network terminals, and the like. In fact, these components are intended to represent a broad category of such computer components that are well known in the art. The underlying principles of the invention are not limited to any particular computer system architecture.
  • all or portions of the executable code or database for any or all of these software elements may reside in physical media or be carried by electromagnetic media.
  • the various data components as well as WorkSpace system files relating to the performance of the WorkSpace software developed by the processing also may reside in or be transported via a variety of different media.
  • Physical media include the memory of the computer system 651 , such as various semiconductor memories, tape drives, disc drives and the like of general-purpose computer systems. All or portions of the software may at times be communicated through the Internet or various other telecommunications networks. Such communications, for example, may be to load the software from another computer (not shown) into the web server or into another network element.
  • other type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links.
  • Non-volatile media include, for example, optical or magnetic disks, such as any of the storage devices in the system of FIG. 6 .
  • Volatile media include dynamic memory, such as main memory.
  • Transmission media include coaxial cables, copper wire, fiber optics, and also the wires that comprise a bus within a computer system. Transmission media can also take the form of electric or electromagnetic signals, or acoustic or light waves such as those generated during radio frequency (RF) and infrared (IR) data communications.
  • RF radio frequency
  • IR infrared
  • Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave transporting data or instructions, or any other medium from which a computer can read.
  • Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a processor for execution.
  • code for implementing the described operations may be in the form of computer instructions in any form (e.g., source code, object code, interpreted code, etc.) stored in or carried by any computer- or machine-readable medium.
  • the software consists of executable code that performs various functions contained within various modules. It also consists of various databases that are essential to the performance of the executable software code.
  • modules of the software support the following functionalities, among others: System Access, Security and Administration 701 , Real Time Communications 702 , Non-Real-Time Communications 703 , Communications, Message, and Document Filtering 704 , Media Conversion 705 , Communications, Message, and Document Routing 706 , Message and Document Storage 707 , Message Access and Management 708 , Document Access and Management 709 , Account Management 710 , Search and Retrieval of Documents and Messages, including security functions 711 (both internal and external to a WorkSpace system).
  • security functions 711 both internal and external to a WorkSpace system.
  • the software is designed to work on a Linux operating system but could be readily extended to work with other operating systems such as Unix and Windows.
  • Linux operating system
  • other operating systems such as Unix and Windows.
  • the underlying principles are not limited to any particular software or hardware implementation.
  • the WorkSpace system provides a portal comprised of three main work functions of individuals today. These functions consist of (1) communications across various media, (2) management of different types of messages, and (3) management of documents and databases. Each of these functions in turn includes numerous sub-functions.
  • the software contains code to control access and security to the system. The software code is also designed to work with other mechanisms for managing access to computer devices and data storage devices that may have been developed by others. Interfaces to third-party communications systems such as telephony switching systems and email servers to handle more complex communications is also an integral part of the WorkSpace system. By embodying the ability to interface with communications systems and by utilizing its core message management technology to manage documents, WorkSpace goes beyond the mere unified communications and group work technologies that are commonplace today.
  • WorkSpace system may be particularly suitable for an enterprise environment
  • the ability to access WorkSpace systems over the Internet enables the creation of personal WorkSpace services that can be offered by hosting and communications service providers. It integrates communications, message management, and document management functions in a single system. It is especially well suited to work with user devices that are capable of both voice and data communications. Two examples of these devices include hybrid hand-held phone-computer devices and stationary computer user devices enabled for real-time communications.
  • accessing the WorkSpace system is similar to accessing well-publicized Internet or Web portals. While such portals typically have web-based applications such as looking up stock quotes or news along with web-enabled functions such as online shopping and online dating, one embodiment of the WorkSpace portal is more specifically geared towards work-related functions of communications, message management, and document management.
  • the WorkSpace portal is accessible either over the public Internet or through a private data network and allows only authorized users to access the system.
  • basic functions as well as applications built upon these functions are made available to the user. In its most basic form, a user can access various message types, communicate or send messages across multiple media, and access documents made available to the user.
  • the WorkSpace system is designed to accommodate more complex combinations of these functions that are customized for specific individuals or processes. These combinations are essentially custom-developed applications available to users who access them through the WorkSpace portal.
  • a message (voicemail or email) sent by a customer requesting an order or a completed order form (fax or Internet-based form) to purchase a product or service.
  • the voicemail and fax would come to the WorkSpace system through voice-network connected user devices 560 and the email would come from a data-network connected user device 555 , typically a computer tied to an email server.
  • the Internet-based form would be stored on a data-network connected data storage device 550 that the user would access over the Internet, complete, and then forward to the WorkSpace system.
  • Many fulfillment processes for customer orders require multiple tasks involving multiple individuals and queues.
  • the message management platform could either attach the message to or embed it within the company's order form.
  • a call may be generated to the customer, either indirectly through the message if the message contained a call-back number, or directly through the communications interface of the WorkSpace system.
  • Communications software within the WorkSpace system would allow such communications as long as WorkSpace systems are connected to communications switching and routing equipment either directly or indirectly through communications networks.
  • the first fulfillment person may attach a voice file to the order form to clarify any special instructions with their own call-back number for the benefit of the person handling the next task or queue. This approach also allows the customer to find out by telephone or over the Internet the particular status of their order which is easily identified by the task or queue.
  • the user essentially accesses the WorkSpace system through a voice-network connected or data-network connected user device 580 such as a telephone or a computer.
  • An extension of this approach is to have a voice recognition algorithm convert the customer's initial phone order onto an order form with the voice message still attached to the order form and available for validation by a fulfillment person.
  • a voice recognition algorithm converts the customer's initial phone order onto an order form with the voice message still attached to the order form and available for validation by a fulfillment person.
  • This type of order process is prescription call-ins to pharmacies by physicians. If this were the application contained with one embodiment of a WorkSpace system, voice recognition software embedded within the system would complete the prescription order form within a certain degree of certainty. The attached voice message would be available for validation of the order but filling out the order would be at least partially completed.
  • Another example of a process where message management and document management functions are integrated involves sorting documents based on the sender's characteristics or the document's characteristics to a pre-specified location.
  • the ANI or the DNIS associated with a telephone call would determine where the file would be placed.
  • a nationwide pharmacy chain could assign unique 8XX numbers for each pharmacy location.
  • the voice messages could then be sent to and stored in mailboxes specific to a pharmacy location.
  • the voicemail could be attached to or embedded within a prescription order form and sent to a specific document location for the pharmacy. This involves specific routing and forwarding instructions 520 that would send the document to a data-network connected data storage device 565 that is accessible by pharmacy staff over voice or data networks.
  • characteristics of documents and messages may determine where they are stored or sent (based on user instructions). For example, the type of document attached to a message or otherwise sent to a user could also determine where the document is stored. A user may wish to store all spreadsheet files that they received in a specified location. Another user may specify that both messages and documents from different sources be stored together or sent to the same location. Similar instructions may also be dictated by work processes as opposed to users. Context-specific applications for such routing and forwarding 520 could easily be developed through the core message and document management software within the WorkSpace system.
  • a final example of integrated document and message management functions involves individuals accessing documents based on certain summary characteristics and requesting over the telephone that these documents by sent to designated recipient locations (e.g., fax machine or email address). For example, an individual may request that a paper titled “Voice-over-IP White Paper” in one of their directories be sent to their boss's email address or to the fax number of a hotel where a colleague is staying. Even documents that are external to a specific WorkSpace system could be accessed and managed in a similar fashion. Security for access to external documents, however, would be an added consideration.
  • Document management is perhaps the most critical application that is tied to communications and message management.
  • third-applications that work on or with generally used computer operating systems could also be easily integrated with the WorkSpace system through its web server functionality. This capability also facilitates integration with third-party data management applications.
  • integration of third-party applications within a WorkSpace system takes the form of a “platform” 150 within the WorkSpace portal. Users may determine the choice of applications to be integrated in the WorkSpace portal. Such integration is possible in WorkSpace enterprise environments 270 , carrier environments 370 , and stand-alone environments 470 . Examples of third-party applications that may be integrated within a WorkSpace system and incorporated in a WorkSpace portal include applications that provide real-time stock quotes for a brokerage firm or breaking news information (online wire service) for a media company.
  • Routing rules specify what to do with a particular message or document. Where should a message be sent and how? Where should a document be stored? Filtering rules on the other hand make a determination about message or document characteristics. For example, is a message or document from someone who is a friend? What is the nature of a message or document if the sender is also a work colleague? This is important because users may specify different rules for messages and documents from different groups of senders.
  • the above distinction between filtering and routing is somewhat arbitrary. For example, the time of receipt is both a characteristic of the message or document as well as a possible condition for its routing. The distinction, however, is analytically useful.
  • routing rules and filtering rules are inevitable, especially as message and document types and rule-triggering conditions multiply.
  • the question then is how to resolve them.
  • One answer is never allowing users to specify conflicting rules. While appealing, this solution requires the system to anticipate all conflicts and for the user to isolate easily the source(s) of all conflicts. These requirements make the use of routing and filtering rules less appealing.
  • One embodiment of the WorkSpace system employs the following solution. “Small” conflicts should be resolved intelligently by the system while only “large” conflicts should require user intervention or default resolution scheme.
  • “Small” conflicts should be resolved intelligently by the system while only “large” conflicts should require user intervention or default resolution scheme.
  • a user who specifies that calls to their office phone from “friends” between 5 p.m. and 7 p.m. be routed to their home phone. They may also specify a second rule that specifies that phone calls from “work colleagues” between 6:30 p.m. and 8 p.m. be routed to their cell phone.
  • rules are first converted to mappings between multi-dimensional real number spaces. Each variable in each condition is then mapped to a part of the real number line and associated with a statistical distribution centered at a numerical value (real number). Similarly, outcomes in each rule are mapped to a statistical distribution. Conditions associated with each rule are mapped to a multi-dimensional region made up of the regions for each individual variable. In each specific sample of variable values, an approximate outcome of the rules is computed using a resolution method. This is illustrated in FIG. 15 . The outcome is then compared with outcomes prescribed by the rules to determine the amount of conflict present in the rules in that specific situation.
  • the method determines a solution that approximates user-supplied instructions on the disposition of each message. For large conflicts as determined by a user- or system-specified parameter, the method informs the user of the specific rules that cause large conflicts. The method updates the degree of large conflicts while the user adds and removes rules.
  • One embodiment of the WorkSpace system detects and resolves message and document routing and filtering rule conflicts using the following method, outlined in the flowchart of FIG. 10 :
  • Users of the WorkSpace system are likely to specify rules to route, store and otherwise handle messages, including those created by telephone, fax, voicemail, email, and short messaging systems. They may also provide rules to route, store and otherwise handle documents. These rules apply to a combination of time and space constraints. The rules instruct underlying transmission, retrieval, and storage systems to manage these messages and documents based on those rules that apply at any particular time and location.
  • Each rule describes a specific set of actions corresponding to a specific time and space location. Individually, each rule is assumed to provide non-contradictory information about the disposition of any applicable message or document. However, when creating a rule, it is difficult for users to determine if one rule may conflict with another. Consequently users may create rules that instruct the underlying system to perform conflicting actions. Indeed, the likelihood of such conflicts is so great that one may safely assume that they will arise with most users.
  • the method described herein overcomes this limitation of rule systems for disposition of messages and documents in message and document management systems. It applies to management rules where conditions for the application of each rule are based on a location in space and time. It applies to the management of a variety of messages and documents that arrive at a particular location (i.e., communications or data storage device, in a particular format, within a specific time period).
  • the method determines a disposition of each message or document according to an approximate evaluation of all possible actions. In situations where such an action would vary significantly from the prescribed outcome, the method determines that rule conflicts are too large to provide a reasonable approximate outcome and instructs the user to avoid such conflicts in their rules for managing messages and documents.
  • Filtering rules may apply to the outward characteristics of messages and documents, but may also apply to the content of the messages and documents. These rules decide on the disposition of a piece of information on the basis of conditions that involve variables in time and space, including an information space. Filtering rules may be interpreted as involving mappings between multi-dimensional spaces of real numbers. When users create filtering rules, they may create conflicts between these rules. The method described here resolves between these conflicts to produce approximate actions. The method also advises users on filtering rules that may create large conflicts. Under such advice, users may tune filtering rules to lower the level of conflict between rules.
  • Communications and data management systems offer users a variety of devices and methods for exchanging messages and managing documents. While most communications and document management systems were designed with a view of creating and delivering messages and documents using similar devices and platforms, the proliferation of devices and methods of communication and data management have created the need to deliver messages and documents created on one device to a variety of target devices or locations. Therefore, messages and documents sent to a device may be routed to a different device and location based on preferences selected by the user. These preferences are often expressed in terms of rules.
  • Rules consist of conditions and consequences. Conditions usually involve statements that contain variables. When the variables in a condition fall within specific ranges of values, the rule is applicable (or said to “fire”). A rule also contains one or more consequences. Consequences consist of specific actions. When a rule fires, the actions listed among the consequences should be carried out by the system that utilizes the rules. Rules in a message and document management system generally determine how messages and documents should be handled under specific conditions involving time and space. Here space is generally described in terms of locations and devices and time is described as time periods.
  • a rule may be statements such as “If I get a phone call on my office phone between 5 p.m. and 10 p.m., and if the phone call is from a friend, then forward that call to my home phone.”
  • the variables in the conditional part of the rule include: (a) a time period between 5 p.m. and 10 p.m.; (b) a device that may be considered as location, i.e., office phone; and (c) an originator that may be considered as another “location,” namely a friend.
  • the consequence in this rule involves: (d) a location, i.e., home phone; (e) an action on the home phone, i.e. ring the phone to get immediate attention; and (f) an implicit specification that the time period involved is the same as the time period in the condition.
  • rules are defined by the provider of a service. For example, a telephone service provider may activate a “call waiting” tone to a user already using a phone—the determination of when to supply this tone is made by rules created by the provider. With some systems, however, users have the ability to create rules that personalize or customize the way messages are delivered.
  • the method described here generally applies to situations involving rules created by users. Unlike rules created by careful analysis, users tend to create a variety of rules in an ad-hoc manner. These rules are interpreted in a strict manner by message and document management systems. Due to unintended interplay between rules, the behavior of a message or document management system may not conform to a user's expectations.
  • Rules are often evaluated based on hard boundary values. For example, a rule that specifies calls to be routed to a home phone number starting at 5 p.m. would not apply at 4:59 p.m. As a result, a user may not get a call that came in at some boundary value as illustrated above even though that value was close to the time a rule would have applied.
  • Rules are generally interpreted in a linear order. For example an older rule that calls should be forwarded starting at 5 p.m. will need to be removed to activate a new rule that says calls should be forwarded after 6 p.m. Often users have difficulty understanding such interplays in rule execution order. The result is that the older rule (that the user may have forgotten) overrides the newer rule that was recently created by the user to address specific needs.
  • a rule may conflict with another rule when interpreted in a strict way. For example there may be a rule to send calls to the office from 8 a.m. to 5 p.m. and another to send them to the home phone after 4 p.m. Rule systems generally do not interpret what needs to be done from 4 p.m. to 5 p.m. Here again users have trouble understanding the interactions of various rules.
  • rule boundaries do not cover a specific situation, a rule system may do nothing. For example, there may be a rule covering the time period from 8 a.m. to 5 p.m. to send calls to the office, another starting at 6 p.m. to send calls to the home phone. But there is no interpretation of what to do at 5:02 p.m. and at 5:58 p.m. even though there are reasonable solutions in both situations.
  • One embodiment of the method also tries to consider multiple conditions using a method that can be adapted to different approximate reasoning methods.
  • a form of reasoning related to fuzzy logic is used as the approximate reasoning component.
  • the method described here differs from other methods in one key respect—in managing messages and documents, the method described here is aware of whether the conflicts it deals with are too large. Hence the method is able to determine whether an approximate conclusion is reasonable and therefore alert the user that the conflicts may be too large to be overcome by a selected approximate reasoning method.
  • Filters are message and document management screening devices that attempt to select messages and documents from a pool of all available messages and documents. Filters accomplish this task by evaluating properties of messages and documents. The properties considered by filters for managing messages and documents include time and space characteristics. Filters generally involve properties of messages and documents but may also be related to their content.
  • Filtering rules then are instructions on how filters should be applied. These rules contain a set of conditions and a set of actions. The conditions and actions may involve a number of variables. When variables within the condition of a filtering rule are within certain ranges of values, the filter applies, or fires. As a result, variables in the action part of the rule are set to specific values. These values eventually translate to some actual actions in terms of the disposition of a message or document.
  • Filtering rules are generally applied to messages and documents where content may be assessed.
  • a filtering rule may be “If an Excel file arrives from work colleagues as an email attachment, detach the file and place in the ‘Work Excel’ file folder. Otherwise, do not detach.”
  • Another filtering rule may be “If an email arrives with a subject line that mostly consists of nonsensical words, and if the sender is not in my list of contacts, then send the email to my trash folder.”
  • the degree to which the subject line is made up of meaningful words is assessed as a real number value.
  • whether the sender is in my list of contacts may also be assessed as a numerical value, i.e., a real number.
  • the action may also be considered as a numerical value associated with the degree to which the user may pay attention to the incoming message or document.
  • filtering rules may be interpreted as mappings between multiple dimensional real number spaces.
  • Filtering rules are created by users or service provider organizations. Service providers usually filter only messages that are generally accepted to be promotional “junk” mail since it is hard for them to determine the value of each type of content. Individual users or organizations of users may create filtering rules to try to reduce the number of messages they need to consider.
  • a filtering rule may specify an ad-hoc numerical value for a filtering action. For example a rule may specify that if a message contains three occurrences of the word “price” that it should be considered as junk. However there may be other evidence along with this word (such as that this is in direct reply to a message sent by the user) that may indicate that this message should get immediate attention.
  • Filtering rules are also generally applied in the order in which they are given. This produces unintended results since earlier rules have precedence, a fact that may not be clear to users especially if the earlier rules are “legacy” rules. In this case, the conflict is that older rules should be given greater weight in an overall estimation of a filter's decision.
  • Rules may be directly in conflict. This frequently happens when merging rules created in different situations such as work-time filtering rules combined with personal-time filtering rules.
  • Filtering rules often do not cover all situations. This leads to further conflicts as users try to create rules without sufficient consideration of potential conflicts. This is often a problem for example in unsolicited email filtering (including rules created by service providers).
  • a vector space is an N-dimensional space; a two-dimensional space is illustrated in FIG. 13 . Each dimension of such a space consists of data values in that dimension. The data values generally are close to each other while some may be further from the majority of values. This is illustrated in FIG. 11 .
  • a cluster is illustrated in FIG. 13 and FIG.
  • a cluster is the set of points that looks like a shaded region.
  • the darkest parts of the shaded region include the majority of points in the cluster; there are fewer points in the less densely shaded parts.
  • Mappings between clusters are illustrated in FIG. 15 where each of the curves lines going from left to right indicates a mapping.
  • a mapping associates points representing variables in the conditional (“if”) part of the rule with variables in the consequence part of the same rule. When there are multiple rules, there will be a corresponding number of mappings.
  • a set of rules applied to a set of clusters fire in response to conditions in the rule. This is evaluated using an approximate reasoning system that may be related to fuzzy logic or neural networks. The resulting conclusions are compared to clusters of outcomes. If the distance is too great, the rules involved in this outcome are shown to the user to determine whether some of them may be adjusted or removed.
  • FIGS. 16 and 22 illustrate this distance with circles. Values falling within the circle are within the expected distance of a centroid, the center of gravity of the two-dimensional region. This process can be continued until outcomes are close to one of the outcome clusters.
  • the method described here is different from other approaches to filtering rules in the way conflicts are removed based on whether conflicts are large or small based on user- or system-specified criteria.
  • the method includes an iterative refinement procedure that adjusts rules until conflicts are within user-specified bounds. A flow chart of this iterative procedure is illustrated in FIG. 10 .
  • Step 1 of the method corresponds to the numbered steps shown in FIG. 10 .
  • the variables in Step 1 of the method are those that appear within rules.
  • the rules here may be related to filtering and routing of both messages and documents.
  • the variables are converted to numerical (real number) values that correspond to the degree of membership in a representative set. This can be done using a possibility value as in fuzzy logic that can be derived from a probability value associated with a statistical distribution.
  • a variable that represents the time that a solicitation phone call arrives at a home phone. Most of these phone calls may arrive around 7 p.m., but other calls may arrive as early as 4 p.m. and as late as 10 p.m. There may be a few calls before 4 p.m. and after 10 p.m. In this case, the probability of a phone call at home may be derived from a distribution of the frequency of such calls. It may be pictured as a normal distribution as shown in FIG. 11 .
  • the method can determine a degree of membership of a variable “solicitation phone call arrives at home” based on this distribution by picking the value of the triangular profile at each point.
  • the values may be set so that the value at 7 p.m. is 1, and the values before 4 p.m. or after 10 p.m. are zero.
  • Step 2 of FIG. 10 we consider several of these variables simultaneously. Each of these variables has distributions. Considering these distributions as degrees of membership we can consider the joint distribution of several variables. If we consider only two variables, such a distribution involving two variables may be pictured as a shaded grid as shown in FIG. 13 , where the shading is darker in some places and lighter in some other places. The darkest shading represents the region where both variables have the highest possible values.
  • each rule says that the darkest region of the grid is mapped to a value for each variable in the action part of the rule. If the values of the variables do not fall within the darkest region, then the rule does not apply according to conventional rule-based procedures. But in approximate reasoning, the rule may still apply when values are outside of the darkest region of the values of the variables. The values may not be distributed near the center of space, but may be centered on another part of the two dimensional space as pictured in FIG. 14 .
  • Step 3 of the procedure in FIG. 10 we determine the list of regions of space. In the two dimensional case pictured above, this means we perform steps 3, 4 and 5 for each small square region within the large grid shown above. For Step 3 , for each such region, we evaluate rules that may involve the pictured variables. Assuming that the outcomes consist of two variables also, this means that each rule maps regions in the condition space, as pictured above to a similar outcome space. In FIG. 15 , the outcomes or consequences are shown on the right side and the conditions are shown on the left side.
  • Each rule is a mapping; the resolved value is not exactly the value predicted by any of the rules individually.
  • the resolved value is also not necessarily at equal distance from all the outcomes of rules.
  • the outcome square is closest to Rule 1 in the outcome space, indicating the greater influence of the rule that fires with the greatest strength.
  • Step 4 we consider the distance between the outcome value represented by the outcome square and the values predicted by each of the rules. Since the outcome square is not exactly the value predicted by any of the rules, this outcome is in some conflict with each of the rules pictured here.
  • Step 5 we consider whether conflict between rules is too great.
  • the regions in FIG. 15 may be considered as points in two-dimensional space.
  • One of the squares within the grid shown may be a square of some size with center at a point such as (x2, y2) considered in the formula above.
  • the distance is computed as shown using the centers of the square regions; then compared to the distance from each of the rule outcomes and the outcome square. This distance can be considered as a circle centered at the center of the square representing the outcome for each rule. This is shown in FIG. 16 .
  • Step 6 we note that Rule 1 and Rule 2 are in conflict but the outcome is not in great conflict with the rules. But at Step 7 , we will have to either remove Rule 3, or adjust the conditions in that so that the circle around the outcome of Rule 3 reaches the outcome square (within the defined threshold) computed with the newly formulated rule.
  • the process of refining rules continues iteratively until the rule set does not produce large conflicts on all regions we consider. This process may be guided by a user, but it also may be automated if we allow for the algorithm to adjust the values of conditions and consequences so that distances found at Step 5 are not too great.
  • the user may choose to increase or decrease the threshold associated with Step 5 . If the threshold is increased in this example, then the circle surrounding the square representing Rule 3 outcome (1630) will increase in diameter—it may increase to touch the black square. If the threshold is decreased, then the circles shown will decrease in diameter and the circle surrounding the square representing Rule 2 ( 1620 ) may also not touch the black square. Then the conflict with Rule 2 will also be considered too great and Step 7 will also need to adjust or remove Rule 2.
  • One embodiment of the method will consider more than two variables in general, hence the squares shown here will be “cubes” in N-dimensional space and the circles will be “spheres” in N-dimensional space.
  • the condition space shown on the left in the previous figure may be N-dimensional while the outcome space may be M-dimensional and N and M may not be the same.
  • the methods described here can be described in greater detail in terms of an implementation using specific mappings of variables to numerical values and specific approximate reasoning method.
  • One preferred approximate reasoning method is based on fuzzy logic.
  • the application of the method to filtering differs from the application to routing only in terms of the mapping of variables to numerical values—the conflict resolution method is the same in both applications.
  • Bill is a member of both “Friends” and “Work Colleagues” groups. Jane has specified two rules for call routing.
  • fuzzy logic The application of fuzzy logic to the specific call routing situation here may be new. In conventional logic, a statement is either considered as completely true or completely false.
  • Fuzzy logic considers a statement in terms of whether something belongs to a set. Then also, using conventional logic we could take the view that an object is either in the set or not in the set. In fuzzy logic a real-valued function is considered that assigns a value to the membership in a set in terms of the degree of membership of an object in a set.
  • the standard fuzzy logic deduction step involves two stages.
  • the first stage is a minimization (the second stage is not quite a maximization problem).
  • the first stage involves examining the degree of membership of the variables in the conditional part of a rule, and minimizing over these to take the smallest degree of membership.
  • the second step involves combining the degrees of membership of each consequent variable and creating a discrete value by combining contributions from multiple rules.
  • the discrete value can be computed using various methods. The most common method involves finding the x-coordinate of the centroid of the regions of support from all the rules.
  • Rule 2 in the same way.
  • the condition in the rule is treated the same way as in Rule 1 except for a change in the triangular function.
  • the consequence, in this case voicemail may be placed on the same x-axis as the consequence in Rule 1, by considering the intrusiveness of voicemail (let us assume this voicemail is without notification, so that it is not very intrusive.)
  • the triangular function here may be something that starts high at NL and comes down in value by the time it reaches ZE (this is based on the thinking that most people consider voicemail to be not intrusive at all but nobody considers it even slightly intrusive.)
  • each of the lines (A, B, C) indicate points (at the other end of the line as indicated by the arrow head) that are possible values for the centroid of the two regions.
  • the different values may be obtained based on the exact shape of the two triangles, for instance the two triangles may overlap somewhat.
  • centroid value we compute the discrete value of the x-axis of the centroid point. Based on that value we decide on the appropriate action.
  • centroid is A, then the x-axis value is reasonably close to the conclusion that voicemail is appropriate. So we send the message to voice mail.
  • centroid is C
  • action of sending the call to the home phone is appropriate.
  • the conflict resolution method has a parameter that may be set by the user or the administrator.
  • This parameter is the maximum allowable distance of an obtained solution from the centroids of each of the participating consequent regions.
  • the distance is simply the distance of the centroid of the combined regions from the centroids of the individual participating regions. FIG. 22 illustrates this situation.
  • points 1 and 2 indicate the centroids of the consequent regions associated with Rules 1 and 2 respectively.
  • the two circles centered at these points indicate the maximum allowable distance for a solution to be from the points 1 or 2 .
  • solution B is not acceptable to either Rule 1 or Rule 2.
  • the other solutions are acceptable according to the designated distance.
  • the conflict resolution algorithm will consider whether the centroid that is obtained is too far from the centroid of the region within any of the triangles. If the distance indicated by the circle radius is smaller, either A or C could also indicate a conflict. Distance in this case will be a simple two-dimensional distance. In more complex cases the N-dimensional regions replace the triangles illustrated here. In this case, the distance may be the N-dimensional Euclidean distance between points.
  • One embodiment of the conflict resolution method works during the time that rules are created. Consider the interaction where Jane creates rules. Initially there are no rules. Jane creates Rule 1. There is no possible conflict with anything else since this is the first rule.
  • FIG. 22 illustrates this distance by circles from the two centers “1” and “2”, the points within the each of the circles are within the distance of the corresponding centroids.
  • An administrator may set the maximum allowable distance but it can also be a parameter that is adjustable by the user.
  • the user may change the rules in many ways as shown below. If the user adjusts rules using 1, 2, 3 or 4 below, then the conflict detection will be run again. This process continues until all conflicts are resolved.
  • Jane can be shown different times of conflict and can choose to deactivate Rule 1 or Rule 2 during these times of conflict. In general this means that Jane selects sets of rules to apply at different times based on our report of conflict periods.
  • the system can choose to interpret conflicting situations arbitrarily (for example, we can pick the first rule that applied and use that as the only rule, or it can pick the nearest shaded region to the actual centroid).
  • the rules and their functional forms may be influenced by data on what sort of calls are likely to occur at what time.
  • the rules are subject to cultural interpretation, for example the level of intrusiveness of different access methods may vary based on demographic characteristics.
  • One embodiment of the WorkSpace system allows the application of the rule conflict resolution algorithm described above to all message and document management functions and to all types of messages and documents.
  • the user may specify their rules online and in a more limited context choose their rule-set over a telephone device.
  • the WorkSpace system therefore, allows users to specify rules to access, send, forward, and otherwise manage both messages and documents. It also permits users to specify rules for notification of messages and documents.
  • the WorkSpace system also allows users to specify different rules for all message types that can be into an integrated message/document management platform such as the WorkSpace system.
  • Such message types include voicemail, email, text messages and pages but the functionality of specifying rules is easily extended into all message types that can be integrated into a unified messaging platform. The same is true of the different types of documents and databases that can be managed by the unified platform.
  • Documents often comprise sub-documents that may be of different types.
  • a mortgage application may consist of copies of tax documents (possibly a PDF file), an application form (possibly a word-processing file), and a spreadsheet listing an individual's assets against which the mortgage is obtained.
  • an applicant may wish to include a personal cover letter or note along with application to explain certain irregularities in their application.
  • the mortgage company may want to deliver to the applicant closing documents that may also consist of different types of sub-documents.
  • Many transactions involve documents of different types that must be delivered to different parties to a transaction. Such documents today are sent as multiple attachments to an electronic message, or as stored documents on a storage disk, or more commonly, printed out and mailed to the relevant party to the transaction.
  • FIG. 8 illustrates one embodiment of a GUI used to create and transfer a “meta document.”
  • the interface allows the end user to compose a personal note or letter 810 that is typically attached to a set of documents that are transferred. It also allows the user to place various types of documents 820 in sequence within the “meta document” itself. Such documents could be different types and sizes and organized in the sequence chosen by the user. The only requirement is that these documents be stored in locations that are connected to or otherwise accessible from the user's WorkSpace system.
  • the documents may be on the user's computer, on a network shared document storage device, or even a third-party location. In this regard, this requirement is similar to the “browse” function used to attach documents to electronic mail. Security and access would be the main considerations as to whether documents could be placed within the “meta document” GUI.
  • the first option involves the transfer of the “meta document” to a secure Internet accessible data storage area where a password specific to the document transfer is needed to pick up the document.
  • the sender of the message may receive this automatically generated password as soon as the document is sent. If so desired, the sender may also request that the system provide the password to the recipient. For security or convenience reasons, however, the sender may prefer to provide the password information to the recipient verbally or through some other means of communication. Once the recipient accesses the file and downloads it successfully, the sender may receive an electronic receipt notification.
  • the foregoing process effectively replaces the overnight mail delivery of documents. The same process, of course, may be clearly used for the transfer of a single document without the creation of a “meta document.”
  • the sender may send the “meta document” as an electronic mail attachment or even have it faxed (text documents only) to a designated fax number location.
  • Other delivery methods enabled by WorkSpace message management software may also be used for the delivery of such documents, depending on the size of the document and urgency. It is the combination of a “meta document” creation method combined with a delivery method that is part of an integrated message/document management system that is advantageous.
  • One embodiment of the WorkSpace system provides users the option to specify whether they want to manage only once their voicemails and other messages. Thus, a user who specifies that they do not want to double manage their voicemail messages would not have available to them a voicemail that was previously accessed over the Internet and deleted. This is accomplished by a set of instructions within WorkSpace message management software to remove a message from the telephone accessible message storage area once it has been deleted from the Internet accessible area.
  • Each message has a unique name based on the recipient, type of message and time of arrival of the initial message. In various file directories, the names that identify these characteristics are retained, though the locations will have different names.
  • the action is carried out by a centralized manager of message storage. This message may be relayed by the centralized storage manager to subsidiary storage areas to remove all instances of the uniquely identified message. Each manager of a storage area then identifies the message within its storage area to delete such identified messages.
  • the WorkSpace system therefore, provides a method for users to handle only once equivalent messages that are stored in or sent to different locations.
  • the method consists of a distributed federated system of task agents that are distributed autonomous communicating processes.
  • the WorkSpace system is organized as a collection of independently operating program units. Each of these program units operate using their own share of computer processing time and memory and can run regardless of whether other units of the program are operating. Each such program unit is called an “Agent.” Even though the agents can run as autonomously, i.e., as independent programs, they can also respond to messages they receive through a message sending medium. Internet sockets are often used to pass messages between agents, but other methods of message passing may also be used.
  • agents are autonomous communicating processes that independently operate programs that exchange messages to coordinate their activities. When an agent receives a message it can choose to act on the message by responding to it, performing a task requested in the message or the agent can choose to ask other agents to do this or other related tasks.
  • Agents that perform tasks are called “Task Agents.” Some agents in WorkSpace mainly perform the work of coordinating the tasks of other agents. Such agents are generally considered as “Manager Agents.” Manager agents are arranged in a hierarchical fashion, with some manager agents coordinating the management activities of other manager agents. This model of management is generally called a “Federated System of Agents.”
  • the federated system is a way of organizing communications between agents. Messages between agents are sent through manager agents so that manager agents may decide the best way to perform the activities associated with the agent.
  • WorkSpace agents are independent programs that may be executed as separate programs on separate computers. Typically several of these agents, i.e. independent programs, are executed on the same computer, but they can also be organized, according to their function, on separate computers. Since parts of WorkSpace may operate on different computers, WorkSpace may be considered as a distributed program. For example, agents handling Fax services may reside on one computer while agents handling Web services may reside on a separate computer. The agents that are on different computers can work together as if they are on the same computer by exchanging messages that relate to performing tasks. For example when a Fax message arrives at the Fax server, an agent on the Fax server will inform its manager agent on the same fax server, which will then inform the manager agent on the Web server computer.
  • This information will tell a Web server task agent to update the web pages of the user who just received the fax, even though the Web server computer never received the fax.
  • a web server agent will, through a system of managers, ask an agent on the Fax server to retrieve the fax and to send it to the user's web page.
  • a system of these agents accomplishes distributed message management of equivalent messages through the coordination of multiple management tasks, one task for each location where the message is stored or sent.
  • a main task manager that coordinates all task agents.
  • the main task manager is informed that the particular task was performed. This, in turn, initiates a series of instructions to manage the same message across the system as specified by the user.
  • the system of agents resembles a corporation with many departments to perform individual tasks. Managers within a corporation coordinate the tasks and direct tasks towards appropriate departments or individuals.
  • the entire WorkSpace system is organized as a system of agents where agents resemble individual employees and the system as a whole resembles a corporation.
  • This system of agents is created based on a computer program and is generally not based on any database. It may however be configured, using configuration scripts common in computer applications, to create an appropriate collection of agents based on the needs for each installation. For example a large installation may have a few dozen agents handling email requests while a small installation may have only one such email handling agent.
  • Management agents created as part of this program determine where messages have to be sent for each task.
  • the overall structure of this system of agents does not change depending on each user. However depending on each user, the messages that are sent between agents and the task agents that are activated change. The actual messages that are sent between agents that participate in the task are decided by the manager agents. The decisions are made by manager agents using rules that are programmed into the manager agents. To draw on the analogy of a corporation, the corporation's structure does not change based on each individual customer, but the activities done on behalf of each customer may involve a unique set of interactions and activities.
  • the sets of messages that are accessible by telephone, over the Internet, or through other means need not be identical and these sets can be specified by a user to reflect their preferences or habits. This is accomplished either by maintaining separate message locations corresponding to each access method or marking each message to be made accessible over particular access methods. For example, a user may only want to access voicemail from work colleagues and friends over the telephone but have all voicemail available over the Internet. When messages are made available in different access areas, their status could be mirrored in each of these areas through the method described earlier. Thus, a voicemail that has been deleted over the telephone would also be among deleted voicemails in the message storage area accessible over the Internet. As illustrated earlier, it is also possible that some users may not wish to have such equivalence. If so, the main manager would not issue instructions to maintain equivalence. Alternatively, a user may want equivalence in only two locations but not in a third location. In this case, only a subset of instructions would issue.
  • FIG. 9 illustrates a set of voicemail messages for a user who wants to access only work voicemail by telephone, has all voicemail from family forwarded to their personal email, and requests that only non-work, non-family voicemail be accessible over the Internet.
  • Online specification of personal messaging preferences is not new. Online specification of preferences for all message and document types managed by an integrated message/document management system is new.
  • One embodiment of the WorkSpace system allows users and administrators to specify online preferences with respect to all message and document types. Users may specify how much or how little of the message or document characteristics they wish to access over the telephone or view online. For example, a user may not want to know over the telephone whether they have received faxes. Alternatively, they may want to know over the telephone whether they have received email from work colleagues or a text message from a particular individual. Users may also specify not only what messages and documents they access but also how they access them. For example, a user may want to listen to voicemail from family first and the remaining voicemails chronologically.
  • a user's specific set of preferences comprise a subset of the user's profile that determines the particular set of feature/functionalities that are activated for the user.
  • IVR Interactive Voice Response
  • the announcements and prompts are generally fixed and do not take into account the underlying information that is to be conveyed or the user's usage patterns. This is especially true of announcements and prompts in the course of retrieving messages and information about documents over a telephone.
  • One embodiment of the WorkSpace system implements a heuristic learning approach to this problem. For example, with the WorkSpace system, users will not hear prompts that apply to faxes if they do not have faxes. This saves time and the absence of fax prompts is itself informative.
  • menus that have not been used in a while could be made hidden from the user while still available for use. This is different than simply “hiding” the options and associated prompts and announcements from the user in a fixed manner as many messaging platforms do. Rather, it is the usage of menus and choices within menus along with the presence or absence of relevant information that will passively activate the “hiding” of menus and choices. In one embodiment, different “hiding” rules are specified for different menus and even for choices within menus.
  • distribution lists in messaging systems within a common medium is commonplace.
  • voicemail distribution lists and email distribution lists enabled by voicemail platforms and email servers.
  • Such distributions lists may be defined by users or pre-defined for users.
  • Such distribution lists do not take into account the messaging preferences of message recipients.
  • Some individuals rely on voicemails while others check their emails frequently.
  • Yet others constantly engage in text messaging or two-way paging.
  • One embodiment of the WorkSpace system allows users to create distribution lists that are cross-media. For example, a user may know that their boss checks their voicemail often but seldom checks their email. By contrast, their secretary may check emails frequently but voicemail infrequently.
  • That user wants to send a voice message to both parties reflecting the two recipients' preferred messaging media, they could create a distribution list that contains their boss's voicemail box number and the secretary's email address. A voicemail could be created by the user and sent to both of these destinations. The voicemail would go directly to the boss's voicemail box and to the secretary in the form of a sound file attached to an email. Given different messaging habits, the ability to create a single document but send it to different device types in different formats through the use of a single multi-media distribution list increases the probability that the recipient will actually receive and listen to messages sent by a user.
  • IM instant messaging
  • text messaging such as over wireless phones and pagers
  • Users may wish to limit the individuals with whom they communicate through these methods because of the invasive and pervasive nature of such communications. They are invasive because they intrude into an individual's privacy in a written and recorded form. They are pervasive because one can easily guess what another's text address is and certainly one's online presence is easily detected by others. While ignoring text messages and blocking instant messages are possible ways of controlling “near-real-time” communications, a more polite form that enables such communications only with those you choose may be preferred by many. This can be accomplished through the use of “double-blind” or “pseudo-address” method.
  • a user could publish the text messaging address of username.txt@ company.com while the true address is username.txt@carrier1.com 2310 .
  • the user could specify their preferences to allow text messages from only certain individuals or numbers or groups of individuals 2320 to reach their true text messaging address.
  • they could create a polite personalized response such as “User Name Is Not Able to Receive Text Messages at This Time” or alternatively direct all “unwanted” text messages to a message storage area 2340 .
  • a secondary benefit of this approach is the ability of users to switch to another text messaging provider with a new text messaging address username.txt@carrier2.com 2350 without having to republish their company-name-based text messaging address.
  • Embodiments of the invention may include various steps as set forth above.
  • the steps may be embodied in machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps.
  • these steps may be performed by specific hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.
  • Elements of the present invention may also be provided as a machine-readable medium for storing the machine-executable instructions.
  • the machine-readable medium may include, but is not limited to, flash memory, optical disks, CD-ROMs, DVD ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, propagation media or other type of machine-readable media suitable for storing electronic instructions.
  • the present invention may be downloaded as a computer program which may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).

Abstract

A conflict detection and resolution system and method are described for detecting and resolving conflicts between filtering and/or routing rules within an integrated messaging/document management system. One embodiment of the method comprises evaluating a plurality of rules for routing, filtering and/or storing messages and/or documents to determine whether a conflict exists between two or more of the plurality of rules; detecting a conflict between two or more of the plurality of rules; determining a severity level associated with the detected conflict; and identifying a resolution to the conflict resolution if the severity level associated with the conflict is below a predetermined threshold value.

Description

    PRIORITY
  • The present application claims priority from a U.S. provisional application entitled “Integrated Message and Document Management”, Application No. 60/486,166, filed Jul. 11, 2003.
  • BACKGROUND
  • 1. Field of the Invention
  • This invention relates generally to the field of information management systems. More particularly, the invention relates to a system and method for creating and managing an advanced rule set within an integrated WorkSpace.
  • 2. Description of the Related Art
  • The average individual accesses and manages a surprisingly large number of messages and documents every day. In a typical business environment, the number of legitimate messages received and sent in the course of a day averages roughly fifty. These include emails, faxes, voice messages, voice calls, text messages, and instant messages. The number of devices that individuals use for communications and messaging has also multiplied. Such devices include computers, fax machines, wire-line phones, wireless phones, personal digital assistants (“PDAs”), and pagers, with each device typically handling a different type of message or method of communications. Most individuals today manage their messages across different media and, more importantly, over multiple types of devices.
  • Simultaneous with the proliferation of messages and messaging devices, the penetration of personal computers and servers in homes and offices has also risen sharply. The average individual accesses, creates, modifies, saves, and otherwise manages a large number of documents every day. This number is even larger when documents are broadly defined to include private and work-related databases as well. To complicate matters, documents are often transferred among individuals as stand-alone messages such as faxes, as attachments to electronic messages, as information embedded within messages, and as data files with attached messages.
  • To help manage the complexity of multi-media messaging over numerous devices, unified communications solutions strive to consolidate different types of messages into a single platform. Many of these platforms allow for remote access and management of messages over the Public Switched Telephone Network (“PSTN”), the Internet, as well as other public and private voice and data networks. Increasingly, such solutions are also tied to communications systems themselves to allow both real-time and near-real-time communications. For example, many voicemail platforms enable users to use the call-back number of a voicemail sender to return a call during the course of retrieving a voicemail. Unified communications solutions, therefore, allow users to access and manage different types of messages from a single access point, regardless of the user's device of choice. These solutions also permit some limited communications (as opposed to retrieval and management of messages) from the same platform by interfacing with communications systems.
  • In the area of document and data management, solutions have generally taken the form of remote access to data storage devices that house documents and databases and the sharing of data on such devices based on a user's security level. The management of documents and data, however, has traditionally been viewed as a problem quite distinct from communications and the management of messages. Differences between data management solutions and communications/message management solutions, however, are becoming blurred as communications and message management solutions increasingly enable document access and transfer. Nevertheless, data management solutions and communications/message management solutions today remain, for the most part, quite separate.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which:
  • FIG. 1 illustrates various functional platforms employed in one embodiment of the invention.
  • FIG. 2 illustrates a WorkSpace enterprise environment according to one embodiment of the invention.
  • FIG. 3 illustrates a WorkSpace carrier environment according to one embodiment of the invention.
  • FIG. 4 illustrates a WorkSpace stand alone environment according to one embodiment of the invention.
  • FIG. 5 illustrates WorkSpace user access and information flows according to one embodiment of the invention.
  • FIG. 6 illustrates WorkSpace system hardware architecture employed in one embodiment of the invention.
  • FIG. 7 illustrates a WorkSpace system software architecture employed in one embodiment of the invention.
  • FIG. 8 illustrates WorkSpace meta document creation and transfer according to one embodiment of the invention.
  • FIG. 9 illustrates an example of user preferences related to message access/retrieval and corresponding message sets according to one embodiment of the invention.
  • FIG. 10 illustrates a method to resolve conflicts in message and document filtering/routing according to one embodiment of the invention.
  • FIG. 11 illustrates an exemplary sample distribution comprising evening home calls.
  • FIG. 12 illustrates a stylized triangular distribution of the evening home calls.
  • FIG. 13 illustrates an exemplary two-dimensional representation of a two-variable joint distribution.
  • FIG. 14 illustrates an exemplary generalized two-dimensional representation of a two-variable joint distribution.
  • FIG. 15 illustrates an exemplary mapping of conditions against resultant outcomes.
  • FIG. 16 illustrates an exemplary outcome space for rules as defined by acceptability thresholds.
  • FIG. 17 illustrates an exemplary degree of membership in a rule condition.
  • FIG. 18 illustrates an exemplary representation of perceived intrusiveness of calls to home phone.
  • FIG. 19 illustrates an exemplary joint mapping of condition (time of day) and outcome (intrusiveness) associated with calls to home phone.
  • FIG. 20 illustrates an exemplary joint mapping of condition (time of day) and outcome (intrusiveness) associated with voicemail messages.
  • FIG. 21 illustrates an exemplary representation of joint outcomes of two possible actions (call to home and voicemail).
  • FIG. 22 illustrates an exemplary outcome space for rules as defined by acceptability thresholds.
  • FIG. 23 illustrates a pseudo-address method for text messaging according to one embodiment of the invention.
  • FIG. 24 illustrates an exemplary pseudo-address method for instant messaging according to one embodiment of the invention.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • Described below is a system and method for implementing and managing an advanced rule set within an integrated WorkSpace. Throughout the description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. In other instances, well-known structures and devices are shown in block diagram form to avoid obscuring the underlying principles of the present invention.
  • Note that in this detailed description, references to “one embodiment” or “an embodiment” mean that the feature being referred to is included in at least one embodiment of the invention. Moreover, separate references to “one embodiment” in this description do not necessarily refer to the same embodiment; however, neither are such embodiments mutually exclusive, unless so stated, and except as will be readily apparent to those skilled in the art. Thus, the invention can include any variety of combinations and/or integrations of the embodiments described herein.
  • Introduction
  • A system is described below that contains communications, message management, and document management functions as well as applications utilizing these functions. It is both a user portal and a tool that enables communications, message management, and document management. This system will be referred to herein as the “WorkSpace” system. As shown in FIG. 1, the WorkSpace system contains a communications management platform 110 that links the rest of the system to communications equipment that are in turn connected to both public and private telephone and data networks 140. The communications management platform is integrated with a message management platform 120 that is connected to the same telephone and data networks 140 as well as to a document and database management platform 130. The document management platform could also be connected independently with telephone and data networks. The term “platform” is used here to describe software code that performs communications, message management, and document management functions. Finally, although not shown explicitly, a WorkSpace system may also contain process- or situation-specific applications that incorporate defined communications, message management, and document management tasks.
  • As a portal, the WorkSpace system acts as the entry point for the important tasks handled by many individuals during the course of a day: (1) communications; (2) message management; and (3) document management. As mentioned above, it may also act as a portal to applications that incorporate these three functions. For example, consider the communications and document requirements of a doctor. They may include transferring documents to colleagues as part of messages about patient care. An application in this context could include (a) transmittal of a prescription to a pharmacy along with (b) information on patient insurance from an insurance database on the doctor's computer and (c) transmittal of some lab results to a colleague along with a link to retrieve history of lab tests. The prescription transmittal and the test result retrieval methods are examples of applications that may be enabled by and accessed through the WorkSpace system described herein.
  • In one embodiment, WorkSpace software integrates its message management platform to communications systems such as Private Branch Exchanges (“PBX”s) and email servers that are in turn connected to communications networks. It also allows users (consistent with that user's privileges) to access and manage documents and databases on computer devices such as servers and mainframes. Beyond merely facilitating access to documents and databases, the WorkSpace system also allows for the creation of context-specific document creation, transfer, storage, and other document management functions by using the message management platform as an engine for these functions. It is especially powerful when both documents and messages are part of the same work process. The WorkSpace system, therefore, integrates communications, message management, and document management in a single system. It also allows the creation of different applications that incorporate these three functions.
  • An Exemplary Enterprise Environment
  • FIG. 2 shows a typical enterprise environment in which a WorkSpace system is deployed. In one embodiment, the enterprise, driven by its voice communications requirements, is connected to the PSTN 260 directly via Time Division Multiplexing (“TDM”) circuits such as T-1's and PRI's or analog phone lines. In an additional embodiment, the enterprise is indirectly connected to the PSTN through a carrier-grade hybrid telephony switch 255 used to connect an enterprise using packet-voice protocols such as Voice-over-Internet-Protocol (“VoIP”) for internal voice communications. Such hybrid telephony switches generally handle conversions from VoIP protocols to TDM protocols and are often connected to signaling networks such as the Signaling System 7 (“SS7”) network.
  • The first embodiment is typical in a circuit-switched environment while the second describes a VoIP environment. An enterprise that chooses to handle the VoIP to TDM conversion itself rather than through a third-party service provider may also use a media gateway 230 that is either part of or connected to the enterprise's telephony switch 210 to perform the conversion. In yet another embodiment, the enterprise may be connected directly to the PSTN over TDM circuits but may also process some or all VoIP calls through the use of a media gateway 230 at the edge of its voice network. In this example, PSTN-bound traffic is eventually processed through a hybrid telephony switch 245 which lies at the edge of the enterprise's data network 250, but which may or may not be operated by a third-party service provider.
  • On the enterprise side, the connection from the PSTN 260 terminates on enterprise telephony switch devices 210. Such devices include digital PBX's, analog and digital key systems, and VoIP-capable PBX's. These are the devices that route calls to and from end user stations such as telephones and fax machines 200. End-user-facing trunks or lines connect telephony switch devices to end user stations.
  • The design of the WorkSpace system allows connectivity to (a) the enterprise telephony network (regardless of the underlying transport protocols), (b) enterprise data servers or computers 235, (c) other message management platforms used by the enterprise such as email servers 220, and (d) additional WorkSpace systems 240 that may be required. It should be noted that separate data storage devices, message management platforms, and additional WorkSpace systems are optional, and are not required for complying with the underlying principles of the invention. They need to be deployed only if message and data volumes, higher levels of security, and/or user preferences for third-party message management solutions are relevant considerations. An enterprise or carrier would deploy routers and/or switches 225 to tie together the above described infrastructure. Users typically access the WorkSpace system over a computer device 265 such as a personal computer or PDA tied to the data network of the enterprise, either through a private or a public data network. For message management purposes and a few limited document management purposes, users may also access the WorkSpace system through a telephone device connected either to the PSTN or the enterprise's voice network. Access through hybrid computer-telephone devices is also possible.
  • An Exemplary Carrier Environment
  • In one embodiment of the invention, the WorkSpace system is deployed in a carrier environment. This type of deployment, illustrated in FIG. 3, allows carriers to provide data management services along with communications and messaging services. As shown in FIG. 3, the WorkSpace system is connected to a carrier's local telephony switch 310 regardless of whether the switch was operating in circuit-switched or packet-based environments. End users access the WorkSpace system through a telephone device 300 or a computer device 365 over a data network which may be either private or public. As in the enterprise environment, telephone and fax devices would be connected to the carrier switch over trunks, lines, and data circuits.
  • One main difference between the enterprise and carrier environments is that carrier switches, unlike enterprise switches, are generally connected to a signaling network such as the SS7 network. This allows carriers, unlike enterprises, to use Advanced Intelligent Network (“AIN”) functionalities of carrier-grade switches to pre-screen and direct calls using databases on the signaling network. Generally, these databases are attached to SS7 Signal Transfer Point (“STP”) switches. Although such pre-screening could also be enabled in the enterprise environment, it would require calls to be processed through the call and message management functions of a WorkSpace system. This means that additional circuits and ports would be required. A carrier could avoid these requirements through the use of AIN features.
  • As in the enterprise environment, carriers may choose to deploy messaging platforms of different vendors 320 that are tied to WorkSpace systems over a data network. Additional data servers 335 could also be connected in the same manner. Carriers that want to retain their embedded TDM infrastructure but also support packet-voice traffic could deploy media gateways 330 to convert TDM traffic to the appropriate packet-voice protocol. A hybrid telephony switch 345 would be required at the edge of the carrier's data network to allow for the conversion of packet-voice traffic to TDM format. This configuration would also permit carriers to migrate voice traffic from legacy TDM equipment to packet-voice equipment over time.
  • Stand Alone Network Environment
  • The WorkSpace system may also be deployed in a stand-alone configuration as shown in FIG. 4. In this configuration, the WorkSpace system 410 may be connected to the PSTN 450 via circuits such as T-1's, PRI's, or analog circuits. On the customer end are devices such as telephones or faxes 400 or computer devices 455 that are used to access the various functionalities of a WorkSpace system. If desired, a media gateway 425 may be attached to the WorkSpace system to enable TDM to packet-voice conversions. Of course, a hybrid telephony switch 445 would be required to reconvert the packet-voice to TDM voice traffic. Equipment such as third-party email servers 415, additional document servers 430, and additional WorkSpace systems 435 are optional. This optional equipment may be connected to the main WorkSpace system and to each other through a router or switch 420. All data communications and document transfers would take place over data networks 440.
  • The stand-alone configuration limits the extent of real-time communications because the switching functionalities of enterprise and carrier telephony switches would no longer be available. It does not, however, eliminate real-time communications altogether because the device could be connected to the PSTN either directly via PSTN-facing circuits or indirectly through a data network with a hybrid telephony switch 445 at its edge.
  • The stand-alone configuration may be more appropriate in environments where message management and data management functionalities were relatively more important than communications needs. An example of such an environment is an offline group within a company responsible for customer correspondence and investigation of billing disputes. In such an environment, the need for real-time communications may be minimal. Indeed, PSTN-facing trunks could be eliminated altogether and packet-voice traffic that is transported through a third party's hybrid telephony switch could ensure adequate real-time voice communications.
  • User Access and Information Flows
  • In one embodiment, users may access WorkSpace system functions and applications in several ways including: over a telephone device, from a data network access device such as a personal computer, or through hybrid devices such as I-Mode phones, Blackberry handheld devices, and devices that access data sources through voice recognition schemes. As shown in FIG. 5, users generally access the servers with devices 580 connected to the PSTN and/or the Internet. Of course, access through other public and private voice and data networks is also possible. Given the narrow bandwidth of the telephone and the generally imperfect user experience with accessing text over the telephone, most users are unlikely to want long text messages or documents read to them over the telephone. Such access to text messages or documents is technically feasible and can be easily be accommodated if desired by users through the use of third-party Text-To-Speech (“TTS”) engines. Non-text documents (such as spreadsheets and databases) and non-text messages (such as faxes) may be accessed over a narrow-band telephone device but they may not be susceptible to meaningful manipulation or management. In one embodiment of the invention, for such documents and messages, users access their summary characteristics (such as size, name, or document type) over the telephone and use such characteristics to transfer them and perform other limited management functions, as described herein.
  • One way to access a WorkSpace system is over a data network to which the user is connected via a broadband connection. One particular user device is a hybrid telephone-computer device that communicates over both voice and data networks. This optimal access method allows fast and complete access to one's documents and messages in addition to convenient real-time communications.
  • Information (broadly defined) is either stored directly on or is sent to WorkSpace systems by individuals or systems over voice and data networks, both public and private. Examples of such information include voice calls, faxes, text messages, emails and documents. As shown in FIG. 5, incoming information is generated by voice-network-connected devices 560, data-network-connected devices 555, and data-network-connected data system devices 550 (grouped as 510 in FIG. 5). Based on the preferences and the settings of the user, the information is processed by the WorkSpace system and routed to voice-network-connected user devices 575, data-network-connected user devices 570, and data-network-connected data storage devices 565 (grouped as 520 in FIG. 5). In addition, users may be notified of messages and documents that they have received based on notification criteria established in a WorkSpace system 530, as described herein. When connected to either communications switching equipment or communications networks themselves, users may engage in real-time and other communications enabled by such equipment and networks.
  • An Exemplary System Hardware
  • FIG. 6 illustrates one embodiment of a WorkSpace computer system 651, which may perform the functions of a web server, an email server, a server for the storage of messages, and a server for the storage of documents and/or databases. A similar computer system, either attached to system 651 with a telephone network interface or within system 651 itself, with TTS and speech recognition programs may be used to read text messages to users and to implement a voice response unit.
  • The computer system 651 contains a central processing unit (CPU) 652, memories 653 and an interconnect bus 654. The CPU 652 may contain a single microprocessor (e.g. an x86 microprocessor), or it may contain a plurality of microprocessors for configuring the computer system 651 as a multi-processor system. The memories 653 include a main memory, such as a dynamic random access memory (DRAM), as well as a read only memory, such as a PROM, an EPROM, a FLASH-EPROM, or the like. The system 651 also includes mass storage devices 655 such as various disk drives and tape drives. The main memory typically includes dynamic random access memory and high-speed cache memory. In operation, the main memory stores at least portions of instructions and data for execution by the CPU 652.
  • The mass storage may include one or more magnetic disk or tape drives or optical disk drives, for storing data and instructions for use by CPU 652. For an enterprise-based WorkSpace system, for example, at least one mass storage system 655 in the form of a disk drive or tape drive, stores the operating system and application software as well as data, such as received and sent messages and documents. The mass storage system 655 within the computer system 651 may also include one or more drives for various portable media, such as a floppy disk, a compact disc read only memory (CD-ROM), or an integrated circuit non-volatile memory adapter (i.e. PC-MCIA adapter) to input and output data and code to and from the computer system 651. It should be noted that mass storage devices for received and sent messages and documents and parts of the application software may be outside computer system 651.
  • The computer system 651 also includes one or more input/output interfaces for communications, shown by way of example as an interface 659 for voice-grade communications via a voice communications network. The interface 659 may be a modem, channel bank, digital signal processor card with ports, fax cards, or any other appropriate voice-grade communications device, for digital and analog communications of various types via a voice communications network. The physical communication links may be optical, wired, or wireless (e.g., via satellite or cellular network).
  • The computer system 651 may further include appropriate input/output ports 656 for interconnection with data networks or devices connected over a common data network. The input/output ports 656 may be a modem, an Ethernet card or any other appropriate data communications device. To provide the WorkSpace service to a large number of customers, the interface 656 preferably provides a relatively high-speed link to a data network or to the Internet. The physical communication link may be optical, wired, or wireless (e.g., via satellite or cellular network). Alternatively, the computer system may comprise a mainframe or other type of host computer system capable of web-based communications via a data network or the Internet. The input/output ports may include a display and keyboard serving as the administrative or user interface. Although not shown, the server type system could also include a port for connection to a printer. The input/output ports are one of the main access points for users into the computer system 651 as well as the point of interconnection with other WorkSpace systems and related computer devices.
  • Each computer system 651 runs a variety of application programs and stores data, enabling one or more interactions via the communications interfaces or the input/output ports to implement the desired processing for the WorkSpace service or the processing of requests for related services. One or more such applications enable the delivery of web pages and/or the generation of email and other messages supported by WorkSpace. Those skilled in the art will recognize that the computer system 651 may run other programs and/or host other web-based or email based services. As such, the computer system 651 need not sit idle while waiting for WorkSpace service related functions. Also, the system 651 may be implemented as a single computer system or as a distributed system having multiple appearances at different nodes on the Internet.
  • The components contained in the computer system 651 are those typically found in general purpose computer systems used as servers, workstations, personal computers, network terminals, and the like. In fact, these components are intended to represent a broad category of such computer components that are well known in the art. The underlying principles of the invention are not limited to any particular computer system architecture.
  • Exemplary System Software and Data
  • Many concepts discussed herein relate to the software elements, such as the executable code and/or the various databases containing information essential for proper working of the executable code, and other software used to implement the different functions in each of the software modules identified in FIG. 7. These functions may reside on the same physical system or on different physical systems that are linked by local or wide area communications networks. However communications among WorkSpace systems and computer systems serving as storage systems for messages, documents and databases preferably are private and/or appropriately secured.
  • At different times, all or portions of the executable code or database for any or all of these software elements may reside in physical media or be carried by electromagnetic media. The various data components as well as WorkSpace system files relating to the performance of the WorkSpace software developed by the processing also may reside in or be transported via a variety of different media. Physical media include the memory of the computer system 651, such as various semiconductor memories, tape drives, disc drives and the like of general-purpose computer systems. All or portions of the software may at times be communicated through the Internet or various other telecommunications networks. Such communications, for example, may be to load the software from another computer (not shown) into the web server or into another network element. Thus, other type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links.
  • The term “computer-readable medium” as used herein refers to any medium that participates in providing instructions to a processor for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as any of the storage devices in the system of FIG. 6. Volatile media include dynamic memory, such as main memory. Transmission media include coaxial cables, copper wire, fiber optics, and also the wires that comprise a bus within a computer system. Transmission media can also take the form of electric or electromagnetic signals, or acoustic or light waves such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave transporting data or instructions, or any other medium from which a computer can read. Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a processor for execution. Additionally, code for implementing the described operations may be in the form of computer instructions in any form (e.g., source code, object code, interpreted code, etc.) stored in or carried by any computer- or machine-readable medium.
  • Thus, some of the concepts discussed herein relate to functionalities embedded within and processes enabled by WorkSpace software. The software consists of executable code that performs various functions contained within various modules. It also consists of various databases that are essential to the performance of the executable software code. Returning for FIG. 7, modules of the software support the following functionalities, among others: System Access, Security and Administration 701, Real Time Communications 702, Non-Real-Time Communications 703, Communications, Message, and Document Filtering 704, Media Conversion 705, Communications, Message, and Document Routing 706, Message and Document Storage 707, Message Access and Management 708, Document Access and Management 709, Account Management 710, Search and Retrieval of Documents and Messages, including security functions 711 (both internal and external to a WorkSpace system). A variety of different WorkSpace system features provided by these modules 701-711 are set forth below.
  • In one embodiment, the software is designed to work on a Linux operating system but could be readily extended to work with other operating systems such as Unix and Windows. Of course, as mentioned above, the underlying principles are not limited to any particular software or hardware implementation.
  • Workspace Portal
  • In one embodiment, the WorkSpace system provides a portal comprised of three main work functions of individuals today. These functions consist of (1) communications across various media, (2) management of different types of messages, and (3) management of documents and databases. Each of these functions in turn includes numerous sub-functions. The software contains code to control access and security to the system. The software code is also designed to work with other mechanisms for managing access to computer devices and data storage devices that may have been developed by others. Interfaces to third-party communications systems such as telephony switching systems and email servers to handle more complex communications is also an integral part of the WorkSpace system. By embodying the ability to interface with communications systems and by utilizing its core message management technology to manage documents, WorkSpace goes beyond the mere unified communications and group work technologies that are commonplace today.
  • While the WorkSpace system may be particularly suitable for an enterprise environment, the ability to access WorkSpace systems over the Internet enables the creation of personal WorkSpace services that can be offered by hosting and communications service providers. It integrates communications, message management, and document management functions in a single system. It is especially well suited to work with user devices that are capable of both voice and data communications. Two examples of these devices include hybrid hand-held phone-computer devices and stationary computer user devices enabled for real-time communications.
  • In one embodiment of the invention, accessing the WorkSpace system is similar to accessing well-publicized Internet or Web portals. While such portals typically have web-based applications such as looking up stock quotes or news along with web-enabled functions such as online shopping and online dating, one embodiment of the WorkSpace portal is more specifically geared towards work-related functions of communications, message management, and document management. The WorkSpace portal is accessible either over the public Internet or through a private data network and allows only authorized users to access the system. Once within the system through the WorkSpace portal, basic functions as well as applications built upon these functions are made available to the user. In its most basic form, a user can access various message types, communicate or send messages across multiple media, and access documents made available to the user. The WorkSpace system, however, is designed to accommodate more complex combinations of these functions that are customized for specific individuals or processes. These combinations are essentially custom-developed applications available to users who access them through the WorkSpace portal.
  • Integrated Document and Message Management
  • While the message management functionality of the WorkSpace system is valuable by itself, the system utilizes message management as a tool to make more efficient work processes that require both document management/transfer capabilities as well as message management/communications capabilities. Many such processes are handled today as two separate sub-processes and often by two separate applications one to handle message management and communications and another to handle the management of documents and data. These processes generally involve multiple tasks and/or queues.
  • By way of example, consider a message (voicemail or email) sent by a customer requesting an order or a completed order form (fax or Internet-based form) to purchase a product or service. In FIG. 5, the voicemail and fax would come to the WorkSpace system through voice-network connected user devices 560 and the email would come from a data-network connected user device 555, typically a computer tied to an email server. The Internet-based form would be stored on a data-network connected data storage device 550 that the user would access over the Internet, complete, and then forward to the WorkSpace system. Many fulfillment processes for customer orders require multiple tasks involving multiple individuals and queues. As a first step, the message management platform could either attach the message to or embed it within the company's order form. It could then be sent automatically to a queue requiring the first fulfillment task. These two steps would result from software instructions within the WorkSpace system. This is but one example of applications that incorporate message management and document functions. Since the message itself is now part of the order form, the fulfillment person could even review the message if they want to confirm certain details from the customer's message.
  • Furthermore, in one embodiment, a call may be generated to the customer, either indirectly through the message if the message contained a call-back number, or directly through the communications interface of the WorkSpace system. Communications software within the WorkSpace system would allow such communications as long as WorkSpace systems are connected to communications switching and routing equipment either directly or indirectly through communications networks. The first fulfillment person may attach a voice file to the order form to clarify any special instructions with their own call-back number for the benefit of the person handling the next task or queue. This approach also allows the customer to find out by telephone or over the Internet the particular status of their order which is easily identified by the task or queue. The user essentially accesses the WorkSpace system through a voice-network connected or data-network connected user device 580 such as a telephone or a computer. An extension of this approach is to have a voice recognition algorithm convert the customer's initial phone order onto an order form with the voice message still attached to the order form and available for validation by a fulfillment person. One example of this type of order process is prescription call-ins to pharmacies by physicians. If this were the application contained with one embodiment of a WorkSpace system, voice recognition software embedded within the system would complete the prescription order form within a certain degree of certainty. The attached voice message would be available for validation of the order but filling out the order would be at least partially completed.
  • Another example of a process where message management and document management functions are integrated involves sorting documents based on the sender's characteristics or the document's characteristics to a pre-specified location. In a telephone call context, the ANI or the DNIS associated with a telephone call would determine where the file would be placed. For example, consider the above example of physician prescription call-ins. A nationwide pharmacy chain could assign unique 8XX numbers for each pharmacy location. The voice messages could then be sent to and stored in mailboxes specific to a pharmacy location. Alternatively, the voicemail could be attached to or embedded within a prescription order form and sent to a specific document location for the pharmacy. This involves specific routing and forwarding instructions 520 that would send the document to a data-network connected data storage device 565 that is accessible by pharmacy staff over voice or data networks.
  • As a general proposition, characteristics of documents and messages may determine where they are stored or sent (based on user instructions). For example, the type of document attached to a message or otherwise sent to a user could also determine where the document is stored. A user may wish to store all spreadsheet files that they received in a specified location. Another user may specify that both messages and documents from different sources be stored together or sent to the same location. Similar instructions may also be dictated by work processes as opposed to users. Context-specific applications for such routing and forwarding 520 could easily be developed through the core message and document management software within the WorkSpace system.
  • A final example of integrated document and message management functions involves individuals accessing documents based on certain summary characteristics and requesting over the telephone that these documents by sent to designated recipient locations (e.g., fax machine or email address). For example, an individual may request that a paper titled “Voice-over-IP White Paper” in one of their directories be sent to their boss's email address or to the fax number of a hotel where a colleague is staying. Even documents that are external to a specific WorkSpace system could be accessed and managed in a similar fashion. Security for access to external documents, however, would be an added consideration.
  • Integration of document management functions with message management and communications capabilities in a single system is what the WorkSpace system enables. In its simplest version, documents are accessed over a data network (including the Internet) and managed with message management functions. More limited access and management of documents is also possible over the telephone. The optimal use of the functionalities within the WorkSpace system involves integration of communications, message management and document management as required by particular work processes or as dictated by user preferences. The use of a message management platform as an engine for document management, all within a unified portal framework, is advantageous.
  • Integration with Third Party Applications
  • Document management is perhaps the most critical application that is tied to communications and message management. However, other third-applications that work on or with generally used computer operating systems could also be easily integrated with the WorkSpace system through its web server functionality. This capability also facilitates integration with third-party data management applications.
  • In one embodiment, integration of third-party applications within a WorkSpace system takes the form of a “platform” 150 within the WorkSpace portal. Users may determine the choice of applications to be integrated in the WorkSpace portal. Such integration is possible in WorkSpace enterprise environments 270, carrier environments 370, and stand-alone environments 470. Examples of third-party applications that may be integrated within a WorkSpace system and incorporated in a WorkSpace portal include applications that provide real-time stock quotes for a brokerage firm or breaking news information (online wire service) for a media company.
  • Resolving Conflicts in Routing and Filtering
    • 1. General Background
  • Routing rules specify what to do with a particular message or document. Where should a message be sent and how? Where should a document be stored? Filtering rules on the other hand make a determination about message or document characteristics. For example, is a message or document from someone who is a friend? What is the nature of a message or document if the sender is also a work colleague? This is important because users may specify different rules for messages and documents from different groups of senders. Arguably, the above distinction between filtering and routing is somewhat arbitrary. For example, the time of receipt is both a characteristic of the message or document as well as a possible condition for its routing. The distinction, however, is analytically useful. Once users are allowed to specify routing rules and filtering rules, conflicts between and among such rules are inevitable, especially as message and document types and rule-triggering conditions multiply. The question then is how to resolve them. One answer is never allowing users to specify conflicting rules. While appealing, this solution requires the system to anticipate all conflicts and for the user to isolate easily the source(s) of all conflicts. These requirements make the use of routing and filtering rules less appealing.
  • One embodiment of the WorkSpace system employs the following solution. “Small” conflicts should be resolved intelligently by the system while only “large” conflicts should require user intervention or default resolution scheme. Consider a user who specifies that calls to their office phone from “friends” between 5 p.m. and 7 p.m. be routed to their home phone. They may also specify a second rule that specifies that phone calls from “work colleagues” between 6:30 p.m. and 8 p.m. be routed to their cell phone. Suppose that John who is both a friend and work colleague calls at 6:55 p.m. This is an example of a “small” conflict assuming a conflict resolution threshold of 30 minutes. Since John is both a “friend” and “work colleague,” the two rules clearly conflict—the first requiring that the call be directed to their home phone and the second requiring that the call be directed to their cell phone. Given the 30-minute threshold, however, the conflict would be resolved automatically since the second rule is “more or less” dominant and the call would be sent to voicemail. The second-rule is dominant because the 30 minutes (between 6:40 p.m. and 7:10 p.m.) centered around 6:55 p.m. is contained entirely within the second rule while only 20 minutes (between 6:40 p.m. and 7:00 p.m.) is contained by the first rule. With the same set of rules but with a threshold of 10 minutes, a call from John at exactly 6:40 p.m. would result in the two rules being equivalent. This is because a 10-minute window centered around 6:40 p.m. (between 6:35 p.m. and 6:45 p.m.) would be contained entirely within both rules. When no one rule is “more or less” dominant, some default resolution method such as “send the call to voicemail” would have to apply. The above situation would be an example of a “large” conflict.
  • It is difficult to anticipate the possibility of the above conflict when the user is entering their call routing rules. In fact, it is not clear at all that the user should be prohibited from entering the second rule because there are many situations where the two rules (despite overlapping times) would not conflict. By contrast, if a user first specified that calls from “friends” between 5 p.m. and 7 p.m. be sent to their home phone and then specified in a second rule that calls from “friends” between 6:30 p.m. and 8:00 p.m. be routed to their cell phone, the system would consider the second rule to be a “large” conflict that required user intervention. The system would generate an error message that prevented the second rule from being specified.
  • In one embodiment of the invention, to accomplish the type of conflict resolution described above, rules are first converted to mappings between multi-dimensional real number spaces. Each variable in each condition is then mapped to a part of the real number line and associated with a statistical distribution centered at a numerical value (real number). Similarly, outcomes in each rule are mapped to a statistical distribution. Conditions associated with each rule are mapped to a multi-dimensional region made up of the regions for each individual variable. In each specific sample of variable values, an approximate outcome of the rules is computed using a resolution method. This is illustrated in FIG. 15. The outcome is then compared with outcomes prescribed by the rules to determine the amount of conflict present in the rules in that specific situation. For small conflicts between applicable rules, the method determines a solution that approximates user-supplied instructions on the disposition of each message. For large conflicts as determined by a user- or system-specified parameter, the method informs the user of the specific rules that cause large conflicts. The method updates the degree of large conflicts while the user adds and removes rules. One embodiment of the WorkSpace system detects and resolves message and document routing and filtering rule conflicts using the following method, outlined in the flowchart of FIG. 10:
    • 1001. Convert variables in the conditional part of each rule to a value in a statistical distribution centered at a point in the real line and convert each outcome also to a numerical value in the real line.
    • 1002: Map all conditions applicable in a particular time and space locality as a region in N-dimensional space.
    • 1003: For each time-space region, determine the outcome of applicable rules using a resolution method.
    • 1004: Compute the distance of the outcome value from each of the possible values of outcome variables from rule-specified outcomes using a Euclidean metric.
    • 1005: Compare the distance of outcome variables with a specified threshold to determine if conflict is small or large.
    • 1006: If the conflict is small, use the outcome of the resolution as the value of the outcome and use the resultant value to manage messages and documents within the specific time and space.
    • 1007: If the conflict is large, determine the rules that participated in the decision. Iteratively compute the distance of the outcome variables from rule outcomes as user changes the rules that caused the large conflict.
  • Users of the WorkSpace system are likely to specify rules to route, store and otherwise handle messages, including those created by telephone, fax, voicemail, email, and short messaging systems. They may also provide rules to route, store and otherwise handle documents. These rules apply to a combination of time and space constraints. The rules instruct underlying transmission, retrieval, and storage systems to manage these messages and documents based on those rules that apply at any particular time and location.
  • Each rule describes a specific set of actions corresponding to a specific time and space location. Individually, each rule is assumed to provide non-contradictory information about the disposition of any applicable message or document. However, when creating a rule, it is difficult for users to determine if one rule may conflict with another. Consequently users may create rules that instruct the underlying system to perform conflicting actions. Indeed, the likelihood of such conflicts is so great that one may safely assume that they will arise with most users.
  • The method described herein overcomes this limitation of rule systems for disposition of messages and documents in message and document management systems. It applies to management rules where conditions for the application of each rule are based on a location in space and time. It applies to the management of a variety of messages and documents that arrive at a particular location (i.e., communications or data storage device, in a particular format, within a specific time period). The method determines a disposition of each message or document according to an approximate evaluation of all possible actions. In situations where such an action would vary significantly from the prescribed outcome, the method determines that rule conflicts are too large to provide a reasonable approximate outcome and instructs the user to avoid such conflicts in their rules for managing messages and documents.
  • A related consequence of the method here is in managing filtering rules. Filtering rules may apply to the outward characteristics of messages and documents, but may also apply to the content of the messages and documents. These rules decide on the disposition of a piece of information on the basis of conditions that involve variables in time and space, including an information space. Filtering rules may be interpreted as involving mappings between multi-dimensional spaces of real numbers. When users create filtering rules, they may create conflicts between these rules. The method described here resolves between these conflicts to produce approximate actions. The method also advises users on filtering rules that may create large conflicts. Under such advice, users may tune filtering rules to lower the level of conflict between rules.
  • 2. Resolving Conflicts in Message and Document Routing
  • Communications and data management systems offer users a variety of devices and methods for exchanging messages and managing documents. While most communications and document management systems were designed with a view of creating and delivering messages and documents using similar devices and platforms, the proliferation of devices and methods of communication and data management have created the need to deliver messages and documents created on one device to a variety of target devices or locations. Therefore, messages and documents sent to a device may be routed to a different device and location based on preferences selected by the user. These preferences are often expressed in terms of rules.
  • Rules consist of conditions and consequences. Conditions usually involve statements that contain variables. When the variables in a condition fall within specific ranges of values, the rule is applicable (or said to “fire”). A rule also contains one or more consequences. Consequences consist of specific actions. When a rule fires, the actions listed among the consequences should be carried out by the system that utilizes the rules. Rules in a message and document management system generally determine how messages and documents should be handled under specific conditions involving time and space. Here space is generally described in terms of locations and devices and time is described as time periods.
  • A rule may be statements such as “If I get a phone call on my office phone between 5 p.m. and 10 p.m., and if the phone call is from a friend, then forward that call to my home phone.” In this rule, the variables in the conditional part of the rule include: (a) a time period between 5 p.m. and 10 p.m.; (b) a device that may be considered as location, i.e., office phone; and (c) an originator that may be considered as another “location,” namely a friend. The consequence in this rule involves: (d) a location, i.e., home phone; (e) an action on the home phone, i.e. ring the phone to get immediate attention; and (f) an implicit specification that the time period involved is the same as the time period in the condition.
  • In many situations, rules are defined by the provider of a service. For example, a telephone service provider may activate a “call waiting” tone to a user already using a phone—the determination of when to supply this tone is made by rules created by the provider. With some systems, however, users have the ability to create rules that personalize or customize the way messages are delivered.
  • The method described here generally applies to situations involving rules created by users. Unlike rules created by careful analysis, users tend to create a variety of rules in an ad-hoc manner. These rules are interpreted in a strict manner by message and document management systems. Due to unintended interplay between rules, the behavior of a message or document management system may not conform to a user's expectations.
  • There are situations where rule interpretation does not produce correct message or document management solutions. The following examples consider some such situations.
  • 1. Rules are often evaluated based on hard boundary values. For example, a rule that specifies calls to be routed to a home phone number starting at 5 p.m. would not apply at 4:59 p.m. As a result, a user may not get a call that came in at some boundary value as illustrated above even though that value was close to the time a rule would have applied.
  • 2. Rules are generally interpreted in a linear order. For example an older rule that calls should be forwarded starting at 5 p.m. will need to be removed to activate a new rule that says calls should be forwarded after 6 p.m. Often users have difficulty understanding such interplays in rule execution order. The result is that the older rule (that the user may have forgotten) overrides the newer rule that was recently created by the user to address specific needs.
  • 3. A rule may conflict with another rule when interpreted in a strict way. For example there may be a rule to send calls to the office from 8 a.m. to 5 p.m. and another to send them to the home phone after 4 p.m. Rule systems generally do not interpret what needs to be done from 4 p.m. to 5 p.m. Here again users have trouble understanding the interactions of various rules.
  • 4. If rule boundaries do not cover a specific situation, a rule system may do nothing. For example, there may be a rule covering the time period from 8 a.m. to 5 p.m. to send calls to the office, another starting at 6 p.m. to send calls to the home phone. But there is no interpretation of what to do at 5:02 p.m. and at 5:58 p.m. even though there are reasonable solutions in both situations.
  • The problems of rule application have been addressed using various forms of approximate reasoning. These may include Neural Networks, Fuzzy Logic, Probabilistic Reasoning and some lesser-known methods such as Belief Networks. All of these methods try to overcome the limitation of strict reasoning. Each method used varies in terms of how it carries out approximate reasoning.
  • While the different approximate reasoning methods differ in terms of their methods, they generally try to find a conclusion by simultaneously evaluating multiple pieces of evidence. When multiple pieces of evidence are considered in user-created rules, conflicts may also be present. The method here deals with conflicts that arise from evaluating multiple conditions simultaneously when performing approximate reasoning.
  • One embodiment of the method also tries to consider multiple conditions using a method that can be adapted to different approximate reasoning methods. In one preferred application of the method here, a form of reasoning related to fuzzy logic is used as the approximate reasoning component. The method described here differs from other methods in one key respect—in managing messages and documents, the method described here is aware of whether the conflicts it deals with are too large. Hence the method is able to determine whether an approximate conclusion is reasonable and therefore alert the user that the conflicts may be too large to be overcome by a selected approximate reasoning method.
  • 3. Resolving Conflicts in Message and Document Filtering
  • Filters are message and document management screening devices that attempt to select messages and documents from a pool of all available messages and documents. Filters accomplish this task by evaluating properties of messages and documents. The properties considered by filters for managing messages and documents include time and space characteristics. Filters generally involve properties of messages and documents but may also be related to their content.
  • Filtering rules then are instructions on how filters should be applied. These rules contain a set of conditions and a set of actions. The conditions and actions may involve a number of variables. When variables within the condition of a filtering rule are within certain ranges of values, the filter applies, or fires. As a result, variables in the action part of the rule are set to specific values. These values eventually translate to some actual actions in terms of the disposition of a message or document.
  • Filtering rules are generally applied to messages and documents where content may be assessed. For example, a filtering rule may be “If an Excel file arrives from work colleagues as an email attachment, detach the file and place in the ‘Work Excel’ file folder. Otherwise, do not detach.” Another filtering rule may be “If an email arrives with a subject line that mostly consists of nonsensical words, and if the sender is not in my list of contacts, then send the email to my trash folder.” Here the degree to which the subject line is made up of meaningful words is assessed as a real number value. Similarly whether the sender is in my list of contacts may also be assessed as a numerical value, i.e., a real number. The action may also be considered as a numerical value associated with the degree to which the user may pay attention to the incoming message or document. Thus filtering rules may be interpreted as mappings between multiple dimensional real number spaces.
  • Filtering rules are created by users or service provider organizations. Service providers usually filter only messages that are generally accepted to be promotional “junk” mail since it is hard for them to determine the value of each type of content. Individual users or organizations of users may create filtering rules to try to reduce the number of messages they need to consider.
  • When users create filtering rules, it is hard for them to assess and anticipate the potential conflicts between rules and their resultant actions. The following are some of the conflicts in filtering rules that may result in unintended consequences while applying rules. Such conflicts in user-created filtering rules arise especially when multiple conditions need to be considered. The following are some of the situations where conflicts arise.
  • 1. A filtering rule may specify an ad-hoc numerical value for a filtering action. For example a rule may specify that if a message contains three occurrences of the word “price” that it should be considered as junk. However there may be other evidence along with this word (such as that this is in direct reply to a message sent by the user) that may indicate that this message should get immediate attention.
  • 2. Filtering rules are also generally applied in the order in which they are given. This produces unintended results since earlier rules have precedence, a fact that may not be clear to users especially if the earlier rules are “legacy” rules. In this case, the conflict is that older rules should be given greater weight in an overall estimation of a filter's decision.
  • 3. Rules may be directly in conflict. This frequently happens when merging rules created in different situations such as work-time filtering rules combined with personal-time filtering rules.
  • 4. Filtering rules often do not cover all situations. This leads to further conflicts as users try to create rules without sufficient consideration of potential conflicts. This is often a problem for example in unsolicited email filtering (including rules created by service providers).
  • 5. Since filtering rules are hard to write, users often combine rules created by others. This combination is done without understanding the situation when the rules were created and results in unintended consequences. This situation is often seen when Internet Service Providers combine lists of suspect sites, resulting in unintentionally blocking legitimate sites included within the general domain.
  • Conflicts within filtering rules are resolved using the method described here. In the case of filtering rules, variables are evaluated in terms of positions within a vector space of multi-dimensional values. This mapping results in some clusters; data outside of these clusters generally are mapped to one of these clusters. Clusters are created both for variables within conditions of the rules and for variables involved in the consequences of rules (i.e., actions). A vector space is an N-dimensional space; a two-dimensional space is illustrated in FIG. 13. Each dimension of such a space consists of data values in that dimension. The data values generally are close to each other while some may be further from the majority of values. This is illustrated in FIG. 11. In two-dimensional space, a cluster is illustrated in FIG. 13 and FIG. 14 where a cluster is the set of points that looks like a shaded region. The darkest parts of the shaded region include the majority of points in the cluster; there are fewer points in the less densely shaded parts. Mappings between clusters are illustrated in FIG. 15 where each of the curves lines going from left to right indicates a mapping. A mapping associates points representing variables in the conditional (“if”) part of the rule with variables in the consequence part of the same rule. When there are multiple rules, there will be a corresponding number of mappings.
  • When a specific message or document is evaluated by the filtering system, a set of rules applied to a set of clusters fire in response to conditions in the rule. This is evaluated using an approximate reasoning system that may be related to fuzzy logic or neural networks. The resulting conclusions are compared to clusters of outcomes. If the distance is too great, the rules involved in this outcome are shown to the user to determine whether some of them may be adjusted or removed. FIGS. 16 and 22 illustrate this distance with circles. Values falling within the circle are within the expected distance of a centroid, the center of gravity of the two-dimensional region. This process can be continued until outcomes are close to one of the outcome clusters.
  • The method described here is different from other approaches to filtering rules in the way conflicts are removed based on whether conflicts are large or small based on user- or system-specified criteria. The method includes an iterative refinement procedure that adjusts rules until conflicts are within user-specified bounds. A flow chart of this iterative procedure is illustrated in FIG. 10.
  • One embodiment of a high level method underlying the WorkSpace system routing and filtering of messages and documents is detailed below. The numbered items in this method (numbered 1-7) correspond to the numbered steps shown in FIG. 10. The variables in Step 1 of the method are those that appear within rules. The rules here may be related to filtering and routing of both messages and documents. The variables are converted to numerical (real number) values that correspond to the degree of membership in a representative set. This can be done using a possibility value as in fuzzy logic that can be derived from a probability value associated with a statistical distribution.
  • As an example, we may consider a variable that represents the time that a solicitation phone call arrives at a home phone. Most of these phone calls may arrive around 7 p.m., but other calls may arrive as early as 4 p.m. and as late as 10 p.m. There may be a few calls before 4 p.m. and after 10 p.m. In this case, the probability of a phone call at home may be derived from a distribution of the frequency of such calls. It may be pictured as a normal distribution as shown in FIG. 11.
  • For computational convenience in this method we convert the distribution here into a triangular profile as illustrated in FIG. 12. The method can determine a degree of membership of a variable “solicitation phone call arrives at home” based on this distribution by picking the value of the triangular profile at each point. The values may be set so that the value at 7 p.m. is 1, and the values before 4 p.m. or after 10 p.m. are zero.
  • As a result, if a rule contains a condition that “If a solicitation phone call arrives at home and (other conditions) then (do the following actions)” then this can be converted into a numerical mapping where the value of the “solicitation phone call” is now converted into a numerical value. Other variables may also be converted, generally based on an estimation of a degree of membership in some set of values. The choices of these conversions are implementation-dependent and are generally guided by distributions of values as indicated here.
  • In Step 2 of FIG. 10, we consider several of these variables simultaneously. Each of these variables has distributions. Considering these distributions as degrees of membership we can consider the joint distribution of several variables. If we consider only two variables, such a distribution involving two variables may be pictured as a shaded grid as shown in FIG. 13, where the shading is darker in some places and lighter in some other places. The darkest shading represents the region where both variables have the highest possible values.
  • If a rule has two variables, then each rule says that the darkest region of the grid is mapped to a value for each variable in the action part of the rule. If the values of the variables do not fall within the darkest region, then the rule does not apply according to conventional rule-based procedures. But in approximate reasoning, the rule may still apply when values are outside of the darkest region of the values of the variables. The values may not be distributed near the center of space, but may be centered on another part of the two dimensional space as pictured in FIG. 14.
  • Before we consider Step 3 of the procedure in FIG. 10, we determine the list of regions of space. In the two dimensional case pictured above, this means we perform steps 3, 4 and 5 for each small square region within the large grid shown above. For Step 3, for each such region, we evaluate rules that may involve the pictured variables. Assuming that the outcomes consist of two variables also, this means that each rule maps regions in the condition space, as pictured above to a similar outcome space. In FIG. 15, the outcomes or consequences are shown on the right side and the conditions are shown on the left side.
  • In the pictorial representation shown in FIG. 15, a region in the condition space is shown as being mapped to three different regions in a consequence or outcomes space. There is greater or lesser value associated with the conclusion in each mapping, with the darker colors indicating greater certainty. Based on approximate reasoning such as fuzzy logic, we can arrive at an overall value in the outcome space as a resolved value. In the picture above, the black square without an associated arrow (“outcome square”) represents the resolved value from all of the different mappings.
  • Each rule is a mapping; the resolved value is not exactly the value predicted by any of the rules individually. The resolved value is also not necessarily at equal distance from all the outcomes of rules. In FIG. 15, the outcome square is closest to Rule 1 in the outcome space, indicating the greater influence of the rule that fires with the greatest strength.
  • At Step 4 as shown in FIG. 10, we consider the distance between the outcome value represented by the outcome square and the values predicted by each of the rules. Since the outcome square is not exactly the value predicted by any of the rules, this outcome is in some conflict with each of the rules pictured here.
  • At Step 5 as shown in FIG. 10, we consider whether conflict between rules is too great. There is a threshold of distance of the outcome from the predicted outcome from the rule that may be set by the user (or the administrator of a system.) This may be considered as a Euclidean distance, i.e., the distance between two points in N-dimensional space. This can be evaluated by means of a simple formula for two-dimensional space: Euclidean Distance from (x1, y1) to (x2, Y2)=Square Root of ((x1−x2)2+(y1−y2)2). The formula for N dimensions is similar.
  • Here (x1, y1) is a point in two-dimensional space and similarly (x2, y2) is also a point in two-dimensional space. In practice, we will consider square regions in space, thus instead of considering specific points, we will consider small square regions centered on these points. The distances are indicated in FIGS. 16 and 22. In FIG. 22, the circle on the left for instance indicates the set of points that are within some distance of the center, marked as “2” in the Figure. The point marked as “A” in FIG. 22 is within the threshold distance from the point “2”. Any point in two-dimensional space that falls within the circle on the left is within the threshold distance from the point “2”.
  • The regions in FIG. 15 may be considered as points in two-dimensional space. One of the squares within the grid shown may be a square of some size with center at a point such as (x2, y2) considered in the formula above. The distance is computed as shown using the centers of the square regions; then compared to the distance from each of the rule outcomes and the outcome square. This distance can be considered as a circle centered at the center of the square representing the outcome for each rule. This is shown in FIG. 16.
  • There are three circles shown in FIG. 16, all of the same size based on the threshold distance specified by the user or administrator. In this case we can see that the circle representing distance from the outcome of Rule 1 (1610) reaches (in fact contains) the black square. The circle representing Rule 2 (1620) also reaches the outcome square (though barely) within the defined threshold level and the circle for Rule 3 (1630) does not reach the outcome square at all. We consider further actions based on this result at Step 6 as shown in FIG. 10.
  • At Step 6, we note that Rule 1 and Rule 2 are in conflict but the outcome is not in great conflict with the rules. But at Step 7, we will have to either remove Rule 3, or adjust the conditions in that so that the circle around the outcome of Rule 3 reaches the outcome square (within the defined threshold) computed with the newly formulated rule.
  • The process of refining rules continues iteratively until the rule set does not produce large conflicts on all regions we consider. This process may be guided by a user, but it also may be automated if we allow for the algorithm to adjust the values of conditions and consequences so that distances found at Step 5 are not too great.
  • The user may choose to increase or decrease the threshold associated with Step 5. If the threshold is increased in this example, then the circle surrounding the square representing Rule 3 outcome (1630) will increase in diameter—it may increase to touch the black square. If the threshold is decreased, then the circles shown will decrease in diameter and the circle surrounding the square representing Rule 2 (1620) may also not touch the black square. Then the conflict with Rule 2 will also be considered too great and Step 7 will also need to adjust or remove Rule 2.
  • One embodiment of the method will consider more than two variables in general, hence the squares shown here will be “cubes” in N-dimensional space and the circles will be “spheres” in N-dimensional space. The condition space shown on the left in the previous figure may be N-dimensional while the outcome space may be M-dimensional and N and M may not be the same.
  • The methods described here can be described in greater detail in terms of an implementation using specific mappings of variables to numerical values and specific approximate reasoning method. One preferred approximate reasoning method is based on fuzzy logic. The application of the method to filtering differs from the application to routing only in terms of the mapping of variables to numerical values—the conflict resolution method is the same in both applications.
  • 4. Example of Rule Conflict Detection and Resolution
  • Consider the following situation involving message routing. Rules specified by users may involve conflicts. We consider an algorithm to resolve situations involving these conflicts.
  • Bill is a member of both “Friends” and “Work Colleagues” groups. Jane has specified two rules for call routing.
  • Rule 1: If Friends call between 6 p.m. and 8 p.m. send the call to my home phone.
  • Rule 2: If Work Colleagues call between 7 p.m. and 9 p.m. send the call to voicemail.
  • Bill calls at 7:30 p.m. How should the call be routed?
  • Below is an explanation of the proposed conflict detection and resolution for this example. The example will later clarify the following aspects of our conflict detection and resolution algorithm:
      • Conflict resolution applies to the time when Jane is specifying rules, the result of conflict resolution is utilized when handling a call as required in this example.
      • Calls are handled using fuzzy logic algorithms which are well known but have not previously been used in selecting the rules to apply to filtering and routing of messages and documents.
  • Following is a brief overview of fuzzy logic. The application of fuzzy logic to the specific call routing situation here may be new. In conventional logic, a statement is either considered as completely true or completely false.
  • Fuzzy logic considers a statement in terms of whether something belongs to a set. Then also, using conventional logic we could take the view that an object is either in the set or not in the set. In fuzzy logic a real-valued function is considered that assigns a value to the membership in a set in terms of the degree of membership of an object in a set.
  • One usual example is to consider a statement “the outside temperature is pleasant.” Depending on the location, the temperatures that are “pleasant” may vary. But let us assume that if the temperature is 70 degrees, nearly everyone considers that to be pleasant. If the temperature is either less than or greater than 70 degrees, it may be considered pleasant by fewer people. As the temperature differs significantly from 70 degrees, fewer people will consider it pleasant. Thus for any temperature, we may assume a value indicating the level of certainty that this temperature is pleasant. Instead of performing deduction based on the absolute certainty that temperatures are either pleasant or non-pleasant, fuzzy logic uses these real number values of certainty in logical deductions involving rules.
  • In the context of the rules given in the example, we can assign a degree to which conditions of each rule are valid. Considering Rule 1, we could assign a real number to the degree to which conditions of this rule are true. Since there is only one condition, whether a call arrives between 6 p.m. and 8 p.m., we can consider a membership in this set using a simple triangular function. The specific function may be implementation dependant and may be related to data on call distribution, but for now we just pick a simple triangular function that indicates the degree to which a time belongs to the conditional part of Rule 1.
  • Thus as shown in FIG. 17, if a call arrives at 6 p.m., we consider the Rule 1 condition to be true with value 0.5, at 7 p.m., the value is 1.0, at 8 p.m. the value is again 0.5. Earlier than 5 p.m. and later than 9 p.m., the conditions of the rule do not hold. The value then is considered to be zero. This is just one example of interpreting the condition in Rule 1, the shape of the triangular function shown here may be varied by bringing its lower corners closer to 6 p.m. and 8 p.m.
  • Now let us consider the consequence of Rule 1. This consequence should be either true or false in a specific situation. But before we get to determine whether it should be true or false, we will give it a membership value similar to the membership value for conditions. One way to assign a membership value to the consequence interpreting this the same way we considered the statement “the temperature is pleasant.” We will consider the act of ringing the home phone based on whether people consider this intrusive. For the sake of this discussion let us assume that most people consider a ringing home phone to be quite intrusive, while few people consider it extremely intrusive and very few people consider it entirely welcome. Then we may consider “ring the home phone” as a triangular function based on an axis where intrusiveness ranges from very low to very high.
  • In fuzzy logic, generally seven discrete values are recognized: very low, medium low, somewhat low, even, somewhat high, medium high and very high. This range is usually shifted so that we consider the low values to be negative, even to be zero and the rest to be positive. We generally label the values NL, NM, NS, ZE, PS, PM, and PL. Based on this scale, we may construct a triangular function as in FIG. 18 that indicates the perception of intrusion of ringing the home phone. This function may be different from the one shown in FIG. 18 based on our knowledge of people's likes and dislikes. In FIG. 18, we are assuming that a ringing home phone is considered intrusive by a medium high proportion of people, while almost no one considers it to be welcome. We can shift this function in various ways depending on adjustments to this assumption.
  • The standard fuzzy logic deduction step involves two stages. The first stage is a minimization (the second stage is not quite a maximization problem). The first stage involves examining the degree of membership of the variables in the conditional part of a rule, and minimizing over these to take the smallest degree of membership. As part of the first step, we also determine the degree of membership in the consequent variables of each rule. The second step involves combining the degrees of membership of each consequent variable and creating a discrete value by combining contributions from multiple rules. The discrete value can be computed using various methods. The most common method involves finding the x-coordinate of the centroid of the regions of support from all the rules.
  • In the example here, both rules have only one condition each, therefore there is no need to minimize over the degrees of membership of each variable in the conditions. For Rule 1, we combine FIGS. 17 and 18 above to get the degree of membership in the consequence, assuming that the call is coming in at 7:30. FIG. 19 shows the condition and the consequence together, the x-axes of the two variables have nothing in common, but the y-axes are aligned (we generally normalize the values of the triangular functions so that their maximum values are always 1.0 and minimum values are 0.0.) The shaded region shows the support for the action of Rule 1. The standard procedure here is as follows:
  • 1. Compute the value of the condition variable at the specific location. So here the variable's value is 7:30, so we draw a line from x-axis value 7:30 to the corresponding functional value.
  • 2. Find the minimums of all y-values for all the conditional variables. In this case there is only one variable so the conditional value is just the one value we have for the single variable.
  • 3. Find the corresponding value in the function for the variable in the rule's consequence. (The drawing makes it look higher than it should be here, but the idea is that we cut off the triangular function at the right height.)
  • 4. Consider the shaded region as the support for Rule 1. We have to combine the supports for all rules that apply at a later step.
  • If this were the only rule, then the centroid of the support region will have x-axis value=PM, therefore we can conclude that Rule 1 sanctions a PM activity, that is, to ring the home phone. But we have to consider the effect of Rule 2 also.
  • Now let us consider Rule 2 in the same way. For simplicity, let us assume that the condition in the rule is treated the same way as in Rule 1 except for a change in the triangular function. The consequence, in this case voicemail, may be placed on the same x-axis as the consequence in Rule 1, by considering the intrusiveness of voicemail (let us assume this voicemail is without notification, so that it is not very intrusive.) The triangular function here may be something that starts high at NL and comes down in value by the time it reaches ZE (this is based on the thinking that most people consider voicemail to be not intrusive at all but nobody considers it even slightly intrusive.)
  • Based on all the assumptions above, the operation of Rule 2 in this situation can be illustrated by a picture as shown in FIG. 20. Here the condition of the rule is shifted so that we think of the rule applying between 6 p.m. and 10 p.m. (condition of Rule 1 applied between 5 p.m. and 9 p.m.) The shaded region shows the support for the conclusion. The next step combines the two rule consequences to determine the appropriate action. FIG. 21 illustrates this combination.
  • In FIG. 21, each of the lines (A, B, C) indicate points (at the other end of the line as indicated by the arrow head) that are possible values for the centroid of the two regions. The different values may be obtained based on the exact shape of the two triangles, for instance the two triangles may overlap somewhat. Depending on the centroid value obtained, we compute the discrete value of the x-axis of the centroid point. Based on that value we decide on the appropriate action.
  • 1. If the centroid is A, then the x-axis value is reasonably close to the conclusion that voicemail is appropriate. So we send the message to voice mail.
  • 2. If the centroid is C, then similarly the action of sending the call to the home phone is appropriate.
  • 3. If the centroid is B, we really cannot decide what action to use.
  • All that has been said above is fairly standard fuzzy logic; this is well known except for the fact that we are considering it for rules involving the filtering and routing of messages and documents.
  • The situation B above is one where the rules cannot reach a conclusion, i.e. the applicable rules are in conflict. We can of course create some fall back rule, such as “if in doubt, send everything to storage.” But that is simply an administrator overriding the wishes of the user. There is a way we can avoid such conflicting situations. The method to avoid conflicts should be utilized when rules are created.
  • The conflict resolution method has a parameter that may be set by the user or the administrator. This parameter is the maximum allowable distance of an obtained solution from the centroids of each of the participating consequent regions. In the example here, there are two participating regions, those corresponding to the consequences of Rule 1 and Rule 2. The distance is simply the distance of the centroid of the combined regions from the centroids of the individual participating regions. FIG. 22 illustrates this situation.
  • Here the points 1 and 2 indicate the centroids of the consequent regions associated with Rules 1 and 2 respectively. The two circles centered at these points indicate the maximum allowable distance for a solution to be from the points 1 or 2. In this case solution B is not acceptable to either Rule 1 or Rule 2. The other solutions are acceptable according to the designated distance.
  • Even if situation A or C is obtained, the conflict resolution algorithm will consider whether the centroid that is obtained is too far from the centroid of the region within any of the triangles. If the distance indicated by the circle radius is smaller, either A or C could also indicate a conflict. Distance in this case will be a simple two-dimensional distance. In more complex cases the N-dimensional regions replace the triangles illustrated here. In this case, the distance may be the N-dimensional Euclidean distance between points.
  • One embodiment of the conflict resolution method works during the time that rules are created. Consider the interaction where Jane creates rules. Initially there are no rules. Jane creates Rule 1. There is no possible conflict with anything else since this is the first rule.
  • Now Jane creates Rule 2. At this point, our algorithm computes the consequence for the system of rules using a set of sample values. We may consider several sample x-axis values for each of the variables and compute the result of applying the rules at each of these values.
  • Since the algorithm computes the result of applying rules, it will find a situation where the centroid found is too far from the centroid of individual regions according to the maximum allowable distance. FIG. 22 illustrates this distance by circles from the two centers “1” and “2”, the points within the each of the circles are within the distance of the corresponding centroids. An administrator may set the maximum allowable distance but it can also be a parameter that is adjustable by the user. Thus the method knows that there are conflicting situations. There are a number of possible solutions to this conflict. The user may change the rules in many ways as shown below. If the user adjusts rules using 1, 2, 3 or 4 below, then the conflict detection will be run again. This process continues until all conflicts are resolved.
  • The following actions summarize possible responses to conflict. The user or administrator may choose only some of these solutions. The algorithm itself is used only to detect conflicts—any mix of the following methods may be used to resolve conflicts.
  • 1. Jane can simply remove one of Rule 1 or Rule 2.
  • 2. Jane can adjust Rule 1 or Rule 2 to be a different range. The conflict detection algorithm then re-computes the samples to check for conflicts. If, for example, Jane moves the time range of Rule 2 to the left, then the support from Rule 2 at, say 7:30 p.m., will be so low that the centroid will get pulled into the region close to the centroid for Rule 1.
  • 3. Jane can be shown different times of conflict and can choose to deactivate Rule 1 or Rule 2 during these times of conflict. In general this means that Jane selects sets of rules to apply at different times based on our report of conflict periods.
  • 4. Jane can adjust the maximum allowable between the centroid and the consequence (assuming that the system allows users to do this). This may make the result close enough.
  • 5. Jane can leave the conflict in place. The system can choose to interpret conflicting situations arbitrarily (for example, we can pick the first rule that applied and use that as the only rule, or it can pick the nearest shaded region to the actual centroid).
  • In this example, assuming that the user prefers lesser intrusion, and assuming the shapes of distributions given in FIGS. 17 through 22, the call will be sent to voicemail because Rule 2 will have more impact than Rule 1.
  • There are several complications not considered in this example which, in one embodiment, are accommodated within the context of filtering and routing messages and documents:
  • 1. Rules with multiple variables among conditions have not been considered. This changes the fuzzy logic algorithm by minimizing over multiple variables before computing the support in the consequence.
  • 2. The rules and their functional forms may be influenced by data on what sort of calls are likely to occur at what time.
  • 3. Intrusiveness is only one dimension of a possible set of variables we may consider, so that the conflict resolution may be taking place by considering regions in N-dimensional space (as illustrated in the earlier write up about this method).
  • 4. The rules are subject to cultural interpretation, for example the level of intrusiveness of different access methods may vary based on demographic characteristics.
  • 5. Application of Routing and Filtering Rules to All Message and Document Management Functions and to All Types of Messages and Documents.
  • One embodiment of the WorkSpace system allows the application of the rule conflict resolution algorithm described above to all message and document management functions and to all types of messages and documents. In addition, the user may specify their rules online and in a more limited context choose their rule-set over a telephone device. The WorkSpace system, therefore, allows users to specify rules to access, send, forward, and otherwise manage both messages and documents. It also permits users to specify rules for notification of messages and documents. The WorkSpace system also allows users to specify different rules for all message types that can be into an integrated message/document management platform such as the WorkSpace system. Such message types include voicemail, email, text messages and pages but the functionality of specifying rules is easily extended into all message types that can be integrated into a unified messaging platform. The same is true of the different types of documents and databases that can be managed by the unified platform.
  • Meta Document Creation and Delivery
  • Documents often comprise sub-documents that may be of different types. For example, a mortgage application may consist of copies of tax documents (possibly a PDF file), an application form (possibly a word-processing file), and a spreadsheet listing an individual's assets against which the mortgage is obtained. Finally, an applicant may wish to include a personal cover letter or note along with application to explain certain irregularities in their application. On the reverse side of the transaction, the mortgage company may want to deliver to the applicant closing documents that may also consist of different types of sub-documents. Indeed, many transactions involve documents of different types that must be delivered to different parties to a transaction. Such documents today are sent as multiple attachments to an electronic message, or as stored documents on a storage disk, or more commonly, printed out and mailed to the relevant party to the transaction.
  • One embodiment of the WorkSpace document management engine allows for the creation of a “meta document” comprised of different message types. Its document creation software allows for the assembly of documents of various formats, thereby creating a single unified document using a simple Graphical User Interface (“GUI”). FIG. 8 illustrates one embodiment of a GUI used to create and transfer a “meta document.” The interface allows the end user to compose a personal note or letter 810 that is typically attached to a set of documents that are transferred. It also allows the user to place various types of documents 820 in sequence within the “meta document” itself. Such documents could be different types and sizes and organized in the sequence chosen by the user. The only requirement is that these documents be stored in locations that are connected to or otherwise accessible from the user's WorkSpace system. The documents may be on the user's computer, on a network shared document storage device, or even a third-party location. In this regard, this requirement is similar to the “browse” function used to attach documents to electronic mail. Security and access would be the main considerations as to whether documents could be placed within the “meta document” GUI.
  • Once a “meta document” has been created, two options are available for delivery of the document. The first option involves the transfer of the “meta document” to a secure Internet accessible data storage area where a password specific to the document transfer is needed to pick up the document. The sender of the message may receive this automatically generated password as soon as the document is sent. If so desired, the sender may also request that the system provide the password to the recipient. For security or convenience reasons, however, the sender may prefer to provide the password information to the recipient verbally or through some other means of communication. Once the recipient accesses the file and downloads it successfully, the sender may receive an electronic receipt notification. The foregoing process effectively replaces the overnight mail delivery of documents. The same process, of course, may be clearly used for the transfer of a single document without the creation of a “meta document.”
  • If security is not a concern, the sender may send the “meta document” as an electronic mail attachment or even have it faxed (text documents only) to a designated fax number location. Other delivery methods enabled by WorkSpace message management software may also be used for the delivery of such documents, depending on the size of the document and urgency. It is the combination of a “meta document” creation method combined with a delivery method that is part of an integrated message/document management system that is advantageous.
  • Single Management of Messages
  • One problem that is common among many unified communications solutions today is the need to manage messages at least twice when different access methods to messages are permitted or when messages are routed to non-system locations. The cause of this problem is the fact that equivalent messages are produced in various devices and locations. Consider a messaging system that allows users to retrieve voicemail by telephone and over the Internet. If the user reviews a particular voicemail over the Internet and deletes it, the same voicemail is typically retained as “new” in the telephone accessible area. The user is forced to manage the voicemail the next time they access voicemails by telephone even though they had disposed of it earlier. Some users may actually prefer to have voicemails accessible over the telephone even though it has been reviewed over the Internet. This may be the case where a person's secretary routinely reviews voicemail over the Internet for their boss to alert the boss if urgent messages arrive but the boss (who may seldom use a computer) may want to have all voicemail available by telephone. For the majority of users, however, the requirement of double management is a minor nuisance.
  • One embodiment of the WorkSpace system provides users the option to specify whether they want to manage only once their voicemails and other messages. Thus, a user who specifies that they do not want to double manage their voicemail messages would not have available to them a voicemail that was previously accessed over the Internet and deleted. This is accomplished by a set of instructions within WorkSpace message management software to remove a message from the telephone accessible message storage area once it has been deleted from the Internet accessible area.
  • The above described method is accomplished in the following manner. Each message has a unique name based on the recipient, type of message and time of arrival of the initial message. In various file directories, the names that identify these characteristics are retained, though the locations will have different names. When the user asks to delete a message, the action is carried out by a centralized manager of message storage. This message may be relayed by the centralized storage manager to subsidiary storage areas to remove all instances of the uniquely identified message. Each manager of a storage area then identifies the message within its storage area to delete such identified messages.
  • The WorkSpace system, therefore, provides a method for users to handle only once equivalent messages that are stored in or sent to different locations. The method consists of a distributed federated system of task agents that are distributed autonomous communicating processes. The WorkSpace system is organized as a collection of independently operating program units. Each of these program units operate using their own share of computer processing time and memory and can run regardless of whether other units of the program are operating. Each such program unit is called an “Agent.” Even though the agents can run as autonomously, i.e., as independent programs, they can also respond to messages they receive through a message sending medium. Internet sockets are often used to pass messages between agents, but other methods of message passing may also be used. Thus, agents are autonomous communicating processes that independently operate programs that exchange messages to coordinate their activities. When an agent receives a message it can choose to act on the message by responding to it, performing a task requested in the message or the agent can choose to ask other agents to do this or other related tasks.
  • In the WorkSpace system, some agents are responsible for performing specific tasks such as sending an email or handling a phone call. Agents that perform tasks are called “Task Agents.” Some agents in WorkSpace mainly perform the work of coordinating the tasks of other agents. Such agents are generally considered as “Manager Agents.” Manager agents are arranged in a hierarchical fashion, with some manager agents coordinating the management activities of other manager agents. This model of management is generally called a “Federated System of Agents.” The federated system is a way of organizing communications between agents. Messages between agents are sent through manager agents so that manager agents may decide the best way to perform the activities associated with the agent.
  • WorkSpace agents are independent programs that may be executed as separate programs on separate computers. Typically several of these agents, i.e. independent programs, are executed on the same computer, but they can also be organized, according to their function, on separate computers. Since parts of WorkSpace may operate on different computers, WorkSpace may be considered as a distributed program. For example, agents handling Fax services may reside on one computer while agents handling Web services may reside on a separate computer. The agents that are on different computers can work together as if they are on the same computer by exchanging messages that relate to performing tasks. For example when a Fax message arrives at the Fax server, an agent on the Fax server will inform its manager agent on the same fax server, which will then inform the manager agent on the Web server computer. This information will tell a Web server task agent to update the web pages of the user who just received the fax, even though the Web server computer never received the fax. When the user tries to retrieve the fax, a web server agent will, through a system of managers, ask an agent on the Fax server to retrieve the fax and to send it to the user's web page.
  • A system of these agents accomplishes distributed message management of equivalent messages through the coordination of multiple management tasks, one task for each location where the message is stored or sent. At the head of these agents is a main task manager that coordinates all task agents. When a message is managed by a task agent, the main task manager is informed that the particular task was performed. This, in turn, initiates a series of instructions to manage the same message across the system as specified by the user. The system of agents resembles a corporation with many departments to perform individual tasks. Managers within a corporation coordinate the tasks and direct tasks towards appropriate departments or individuals. Similarly, in one embodiment, the entire WorkSpace system is organized as a system of agents where agents resemble individual employees and the system as a whole resembles a corporation. This system of agents is created based on a computer program and is generally not based on any database. It may however be configured, using configuration scripts common in computer applications, to create an appropriate collection of agents based on the needs for each installation. For example a large installation may have a few dozen agents handling email requests while a small installation may have only one such email handling agent. Management agents created as part of this program determine where messages have to be sent for each task. The overall structure of this system of agents does not change depending on each user. However depending on each user, the messages that are sent between agents and the task agents that are activated change. The actual messages that are sent between agents that participate in the task are decided by the manager agents. The decisions are made by manager agents using rules that are programmed into the manager agents. To draw on the analogy of a corporation, the corporation's structure does not change based on each individual customer, but the activities done on behalf of each customer may involve a unique set of interactions and activities.
  • In general, the sets of messages that are accessible by telephone, over the Internet, or through other means need not be identical and these sets can be specified by a user to reflect their preferences or habits. This is accomplished either by maintaining separate message locations corresponding to each access method or marking each message to be made accessible over particular access methods. For example, a user may only want to access voicemail from work colleagues and friends over the telephone but have all voicemail available over the Internet. When messages are made available in different access areas, their status could be mirrored in each of these areas through the method described earlier. Thus, a voicemail that has been deleted over the telephone would also be among deleted voicemails in the message storage area accessible over the Internet. As illustrated earlier, it is also possible that some users may not wish to have such equivalence. If so, the main manager would not issue instructions to maintain equivalence. Alternatively, a user may want equivalence in only two locations but not in a third location. In this case, only a subset of instructions would issue.
  • The problem of multiple message management is more difficult to resolve in a context where the message itself has been forwarded or otherwise sent to a device or location outside the message management system. One example is where voicemail is forwarded as an email attachment to an email address. In this case, the user may access the voicemail through their email and even delete it. The same voicemail, however, remains in the telephone accessible area of most unified communications systems. The WorkSpace system addresses this issue by allowing users to specify whether to retain messages that have been forwarded to non-system destinations (outside fax numbers or email addresses) and if so, with what status to use (e.g., new or saved or old or deleted). FIG. 9 illustrates a set of voicemail messages for a user who wants to access only work voicemail by telephone, has all voicemail from family forwarded to their personal email, and requests that only non-work, non-family voicemail be accessible over the Internet.
  • Online Specification of Personal Preferences
  • Online specification of personal messaging preferences is not new. Online specification of preferences for all message and document types managed by an integrated message/document management system is new. One embodiment of the WorkSpace system allows users and administrators to specify online preferences with respect to all message and document types. Users may specify how much or how little of the message or document characteristics they wish to access over the telephone or view online. For example, a user may not want to know over the telephone whether they have received faxes. Alternatively, they may want to know over the telephone whether they have received email from work colleagues or a text message from a particular individual. Users may also specify not only what messages and documents they access but also how they access them. For example, a user may want to listen to voicemail from family first and the remaining voicemails chronologically. In fact, users can specify online virtually all preferences typically associated with accessing voicemails over the telephone. The WorkSpace system described herein goes further by allowing users to specify online access and management preferences for all types of messages and documents managed through its integrated platform. The specification of these preferences are not unlike the specification of account preferences for Internet accounts. A user's specific set of preferences comprise a subset of the user's profile that determines the particular set of feature/functionalities that are activated for the user.
  • Heuristic IVR Menu Options
  • Most Interactive Voice Response (“IVR”) systems have a limitation that can be a significant nuisance for many users. The announcements and prompts are generally fixed and do not take into account the underlying information that is to be conveyed or the user's usage patterns. This is especially true of announcements and prompts in the course of retrieving messages and information about documents over a telephone. One embodiment of the WorkSpace system implements a heuristic learning approach to this problem. For example, with the WorkSpace system, users will not hear prompts that apply to faxes if they do not have faxes. This saves time and the absence of fax prompts is itself informative. In addition, similar to online menus that incorporate heuristic learning, menus that have not been used in a while could be made hidden from the user while still available for use. This is different than simply “hiding” the options and associated prompts and announcements from the user in a fixed manner as many messaging platforms do. Rather, it is the usage of menus and choices within menus along with the presence or absence of relevant information that will passively activate the “hiding” of menus and choices. In one embodiment, different “hiding” rules are specified for different menus and even for choices within menus.
  • Consider a message retrieval menu that states the following: “Press 1 for Voicemail, Press 2 for Fax, Press 3 for Email.” In one variation of heuristic IVR menus, if the user did not have any faxes to be retrieved, the menu would now be “Press 1 for Voicemail, Press 3 for Email” or alternatively “Press 1 for Voicemail, Press 2 for Email.” Either version of the truncated menu could also be activated if the user never used the “Press 2” key during a period of time (e.g., one month) that is specified as a system parameter or user preference.
  • Messages Distributed Across Multiple Media
  • The use of distribution lists in messaging systems within a common medium is commonplace. For example, there are voicemail distribution lists and email distribution lists enabled by voicemail platforms and email servers. Such distributions lists may be defined by users or pre-defined for users. Such distribution lists, however, do not take into account the messaging preferences of message recipients. Some individuals rely on voicemails while others check their emails frequently. Yet others constantly engage in text messaging or two-way paging. One embodiment of the WorkSpace system allows users to create distribution lists that are cross-media. For example, a user may know that their boss checks their voicemail often but seldom checks their email. By contrast, their secretary may check emails frequently but voicemail infrequently. If that user wants to send a voice message to both parties reflecting the two recipients' preferred messaging media, they could create a distribution list that contains their boss's voicemail box number and the secretary's email address. A voicemail could be created by the user and sent to both of these destinations. The voicemail would go directly to the boss's voicemail box and to the secretary in the form of a sound file attached to an email. Given different messaging habits, the ability to create a single document but send it to different device types in different formats through the use of a single multi-media distribution list increases the probability that the recipient will actually receive and listen to messages sent by a user.
  • “Near-Real-Time” Communications Management
  • If voice communications is real-time and if regular mail and email were non-real-time communications, both instant messaging (“IM”) and text messaging (such as over wireless phones and pagers) may be considered “near-real-time” communications. Users may wish to limit the individuals with whom they communicate through these methods because of the invasive and pervasive nature of such communications. They are invasive because they intrude into an individual's privacy in a written and recorded form. They are pervasive because one can easily guess what another's text address is and certainly one's online presence is easily detected by others. While ignoring text messages and blocking instant messages are possible ways of controlling “near-real-time” communications, a more polite form that enables such communications only with those you choose may be preferred by many. This can be accomplished through the use of “double-blind” or “pseudo-address” method.
  • Through the use of a pseudo Internet address for text messaging, all text messages that are sent to a user arrive in a WorkSpace system and the message is then sent to the specified true text messaging Internet address. Thus, as illustrated in FIG. 23, a user could publish the text messaging address of username.txt@ company.com while the true address is username.txt@carrier1.com 2310. The user could specify their preferences to allow text messages from only certain individuals or numbers or groups of individuals 2320 to reach their true text messaging address. With respect to text messages from all others 2330, they could create a polite personalized response such as “User Name Is Not Able to Receive Text Messages at This Time” or alternatively direct all “unwanted” text messages to a message storage area 2340. A secondary benefit of this approach is the ability of users to switch to another text messaging provider with a new text messaging address username.txt@carrier2.com 2350 without having to republish their company-name-based text messaging address.
  • A similar approach could be used for purposes of instant messaging, as illustrated in FIG. 24. The invasive nature of instant messaging combined with the psychological discomfort to block senders affirmatively makes the “double-blind” approach extremely well-suited for instant messaging. For example, users could publish their business or primary email address username@business.com 2410 but login under a different screen name username@home.com 2420 to go online. Similar to most IM filters today, only those whom the user permits 2430 would know that the user is online and available for instant messaging. Unlike most IM filters today, however, the user would appear to these individuals as if they were online with their published email address username@business.com as opposed to their login screen name. Furthermore, no affirmative blocking of other individuals 2440 would be required.
  • While the foregoing has described what are considered to be the best mode and/or other preferred embodiments, it is understood that various modifications may be made therein and that the concepts disclosed herein may be implemented in various forms and embodiments, and that they may be applied in numerous applications, only some of which have been described herein.
  • Embodiments of the invention may include various steps as set forth above. The steps may be embodied in machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps. Alternatively, these steps may be performed by specific hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.
  • Elements of the present invention may also be provided as a machine-readable medium for storing the machine-executable instructions. The machine-readable medium may include, but is not limited to, flash memory, optical disks, CD-ROMs, DVD ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, propagation media or other type of machine-readable media suitable for storing electronic instructions. For example, the present invention may be downloaded as a computer program which may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).
  • Throughout the foregoing description, for the purposes of explanation, numerous specific details were set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention may be practiced without some of these specific details. For example, although the embodiments of the invention described above focus on the use of Fuzzy Logic techniques for conflict detection/resolution, various alternate/additional techniques may also be employed (e.g., neural networks, probabilistic reasoning, belief networks, . . . etc). Accordingly, the scope and spirit of the invention should be judged in terms of the claims which follow.

Claims (43)

1. A computer-implemented method comprising:
evaluating a plurality of rules for routing, filtering and/or storing messages and/or documents to determine whether a conflict exists between two or more of the plurality of rules;
detecting a conflict between two or more of the plurality of rules, the conflict having a particular level of severity associated therewith; and
identifying a resolution to the conflict if the severity associated with the conflict is below a predetermined threshold.
2. The method as in claim 1 further comprising:
rejecting one or more of the plurality of rules involved in the conflict if the severity level associated with the conflict is above the predetermined threshold value.
3. The method as in claim 1 wherein the resolution comprises implementing only one of the rules involved in the conflict.
4. The method as in claim 1 wherein the resolution comprises:
determining an outcome most likely desired by an end user; and
implementing the rules resulting in the desired outcome.
5. The method as in claim 1 wherein the conflict severity comprises either a “small” conflict or a “large” conflict and wherein resolutions are identified for small conflicts but not for large conflicts.
6. The method as in claim 1 wherein evaluating the plurality of rules comprises:
converting variables of a conditional portion of each rule to a value in a statistical distribution centered at a point in a real line; and
converting each outcome also to a numerical value in the real line.
7. The method as in claim 6 wherein evaluating the plurality of rules further comprises:
mapping all conditions applicable in a particular time and space locality as a region in N-dimensional space (“time-space region”), where N represents the number of variables associated with the rule.
8. The method as in claim 7 wherein evaluating the plurality of rules further comprises:
determining the outcome of applicable rules for each time-space region; and
computing the distance of the outcome value from each of the possible values of outcome variables from rule-specified outcomes using a Euclidean metric.
9. The method as in claim 8 wherein evaluating the plurality of rules further comprises:
comparing the distance of outcome variables with a specified threshold to determine if the conflict is below the predetermined threshold.
10. The method as in claim 9 wherein identifying a resolution to the conflict comprises:
if the severity associated with the conflict is below a predetermined threshold value, using the outcome of the resolution as the value of the outcome and using the resultant value to manage the routing, filtering and/or storing of messages and/or documents within the specific time and space.
11. The method as in claim 1 wherein the messages comprise email messages, voice messages, instant messages and/or fax messages.
12. The method as in claim 1 wherein a first of the plurality of rules specifies that messages sent from one of a first defined group of senders to a first device and/or location within a first specified time period are to be forwarded to a second device and/or location; and
wherein a second of the plurality of rules specifies that messages sent from one of a second defined group of senders to the first device and/or location within a second specified time period are to be forwarded to a third device and/or location, wherein the first specified time period overlaps with the second specified time period, and wherein, in response to receiving a message from a user who is included in both the first and second defined group during the overlap in the first and second specified time periods, resolving the conflict by selecting the outcome most likely desired by the end user.
13. The method as in claim 12 wherein resolving the conflict further comprises:
choosing either the first rule or the second rule based on where, within the overlap in the first and second specified time periods, the message is received.
14. The method as in claim 1 wherein evaluating the plurality of rules comprises performing a fuzzy logic analysis of the plurality of rules to identify conflicts.
15. A system comprising:
a plurality of agents configured to perform message and/or document management functions responsive to a plurality of rules for routing, filtering and/or storing messages and/or documents;
conflict detection logic to determine whether a conflict exists between two or more of the plurality of rules, each detected conflict having a particular level of severity associated therewith; and
conflict resolution logic to identify a resolution to the conflict if the severity associated with the conflict is below a predetermined threshold.
16. The system as in claim 15 wherein the conflict resolution logic rejects one or more of the plurality of rules involved in the conflict if the severity level associated with the conflict is above the predetermined threshold value.
17. The system as in claim 15 wherein the resolution identified by the conflict resolution logic comprises implementing only one of the rules involved in the conflict.
18. The system as in claim 15 wherein the resolution identified by the conflict resolution logic comprises:
determining an outcome most likely desired by an end user; and
implementing the rules resulting in the desired outcome.
19. The system as in claim 15 wherein the conflict severity comprises either a “small” conflict or a “large” conflict and wherein the conflict resolution logic identifies resolutions for small conflicts but not for large conflicts.
20. The system as in claim 15 wherein the conflict detection logic evaluates the plurality of rules by:
converting variables of a conditional portion of each rule to a value in a statistical distribution centered at a point in a real line; and
converting each outcome also to a numerical value in the real line.
21. The system as in claim 20 wherein the conflict detection logic further evaluates the plurality of rules by:
mapping all conditions applicable in a particular time and space locality as a region in N-dimensional space (“time-space region”), where N represents the number of variables associated with the rule.
22. The system as in claim 21 wherein the conflict detection logic further evaluates the plurality of rules by:
determining the outcome of applicable rules for each time-space region; and
computing the distance of the outcome value from each of the possible values of outcome variables from rule-specified outcomes using a Euclidean metric.
23. The system as in claim 22 wherein the conflict detection logic further evaluates the plurality of rules by:
comparing the distance of outcome variables with a specified threshold to determine if the conflict is below the predetermined threshold.
24. The system as in claim 23 wherein, if the severity associated with the conflict is below a predetermined threshold value, the conflict resolution logic uses the outcome of the resolution as the value of the outcome and uses the resultant value to manage the routing, filtering and/or storing of messages and/or documents within the specific time and space.
25. The system as in claim 15 wherein the messages comprise email messages, voice messages, instant messages and/or fax messages.
26. The system as in claim 15 wherein a first of the plurality of rules specifies that messages sent from one of a first defined group of senders to a first device and/or location within a first specified time period are to be forwarded to a second device and/or location; and
wherein a second of the plurality of rules specifies that messages sent from one of a second defined group of senders to the first device and/or location within a second specified time period are to be forwarded to a third device and/or location, wherein the first specified time period overlaps with the second specified time period, and wherein, in response to receiving a message from a user who is included in both the first and second defined group during the overlap in the first and second specified time periods, the conflict resolution logic resolves the conflict by selecting the outcome most likely desired by the end user.
27. The system as in claim 26 wherein the conflict resolution logic resolves the conflict by choosing either the first rule or the second rule based on where, within the overlap in the first and second specified time periods, the message is received.
28. The system as in claim 15 wherein the conflict detection logic evaluates the plurality of rules by performing a fuzzy logic analysis of the plurality of rules to identify conflicts.
29. A machine-readable medium including program code which, when executed by a processor, cause the processor to perform the operations of:
evaluating a plurality of rules for routing, filtering and/or storing messages and/or documents to determine whether a conflict exists between two or more of the plurality of rules;
detecting a conflict between two or more of the plurality of rules, the conflict having a particular level of severity associated therewith; and
identifying a resolution to the conflict if the severity associated with the conflict is below a predetermined threshold.
30. The machine-readable medium as in claim 29 comprising additional program code to cause the processor to perform the additional operations of:
rejecting one or more of the plurality of rules involved in the conflict if the severity level associated with the conflict is above the predetermined threshold value.
31. The machine-readable medium as in claim 29 wherein the resolution comprises implementing only one of the rules involved in the conflict.
32. The machine-readable medium as in claim 29 wherein the resolution comprises:
determining an outcome most likely desired by an end user; and
implementing the rules resulting in the desired outcome.
33. The machine-readable medium as in claim 29 wherein the conflict severity comprises either a “small” conflict or a “large” conflict and wherein resolutions are identified for small conflicts but not for large conflicts.
34. The machine-readable medium as in claim 29 wherein evaluating the plurality of rules comprises:
converting variables of a conditional portion of each rule to a value in a statistical distribution centered at a point in a real line; and
converting each outcome also to a numerical value in the real line.
35. The machine-readable medium as in claim 34 wherein evaluating the plurality of rules further comprises:
mapping all conditions applicable in a particular time and space locality as a region in N-dimensional space (“time-space region”), where N represents the number of variables associated with the rule.
36. The machine-readable medium as in claim 35 wherein evaluating the plurality of rules further comprises:
determining the outcome of applicable rules for each time-space region; and
computing the distance of the outcome value from each of the possible values of outcome variables from rule-specified outcomes using a Euclidean metric.
37. The machine-readable medium as in claim 36 wherein evaluating the plurality of rules further comprises:
comparing the distance of outcome variables with a specified threshold to determine if the conflict is below the predetermined threshold.
38. The machine-readable medium as in claim 37 wherein identifying a resolution to the conflict comprises:
if the severity associated with the conflict is below a predetermined threshold value, using the outcome of the resolution as the value of the outcome and using the resultant value to manage the routing, filtering and/or storing of messages and/or documents within the specific time and space.
39. The machine-readable medium as in claim 29 wherein the messages comprise email messages, voice messages, instant messages and/or fax messages.
40. The machine-readable medium as in claim 29 wherein a first of the plurality of rules specifies that messages sent from one of a first defined group of senders to a first device and/or location within a first specified time period are to be forwarded to a second device and/or location; and
wherein a second of the plurality of rules specifies that messages sent from one of a second defined group of senders to the first device and/or location within a second specified time period are to be forwarded to a third device and/or location, wherein the first specified time period overlaps with the second specified time period, and wherein, in response to receiving a message from a user who is included in both the first and second defined group during the overlap in the first and second specified time periods, resolving the conflict by selecting the outcome most likely desired by the end user.
41. The machine-readable medium as in claim 40 wherein resolving the conflict further comprises:
choosing either the first rule or the second rule based on where, within the overlap in the first and second specified time periods, the message is received.
42. The machine-readable medium as in claim 29 wherein evaluating the plurality of rules comprises performing a fuzzy logic analysis of the plurality of rules to identify conflicts.
43. A system comprising:
means for performing message and/or document management functions responsive to a plurality of rules for routing, filtering and/or storing messages and/or documents;
conflict detection means to determine whether a conflict exists between two or more of the plurality of rules, each detected conflict having a particular level of severity associated therewith; and
conflict resolution means to identify a resolution to the conflict if the severity associated with the conflict is below a predetermined threshold.
US10/889,711 2003-07-11 2004-07-12 System and method for advanced rule creation and management within an integrated virtual workspace Abandoned US20050055433A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/889,711 US20050055433A1 (en) 2003-07-11 2004-07-12 System and method for advanced rule creation and management within an integrated virtual workspace

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US48616603P 2003-07-11 2003-07-11
US10/889,711 US20050055433A1 (en) 2003-07-11 2004-07-12 System and method for advanced rule creation and management within an integrated virtual workspace

Publications (1)

Publication Number Publication Date
US20050055433A1 true US20050055433A1 (en) 2005-03-10

Family

ID=34079202

Family Applications (12)

Application Number Title Priority Date Filing Date
US10/889,689 Abandoned US20050076110A1 (en) 2003-07-11 2004-07-12 Generic inbox system and method
US10/889,688 Abandoned US20050076109A1 (en) 2003-07-11 2004-07-12 Multimedia notification system and method
US10/889,709 Expired - Fee Related US7484213B2 (en) 2003-07-11 2004-07-12 Agent architecture employed within an integrated message, document and communication system
US10/889,711 Abandoned US20050055433A1 (en) 2003-07-11 2004-07-12 System and method for advanced rule creation and management within an integrated virtual workspace
US10/889,708 Abandoned US20050076095A1 (en) 2003-07-11 2004-07-12 Virtual contextual file system and method
US10/930,879 Abandoned US20050172033A1 (en) 2003-07-11 2004-08-30 Apparatus and method for multi-layer rule application within an integrated messaging platform
US10/930,151 Abandoned US20050068980A1 (en) 2003-07-11 2004-08-30 System and method for intelligent message and document access over different media channels
US10/930,262 Abandoned US20050083915A1 (en) 2003-07-11 2004-08-30 Apparatus and method for implementing a multimedia distribution list
US10/930,260 Abandoned US20050074113A1 (en) 2003-07-11 2004-08-30 Heuristic interactive voice response system
US10/956,692 Abandoned US20050114456A1 (en) 2003-07-11 2004-10-01 Apparatus and method for advanced contacts management within an integrated message/document management system
US10/956,245 Abandoned US20050114462A1 (en) 2003-07-11 2004-10-01 Apparatus and method for meta-document creation and processing
US10/956,244 Abandoned US20050108341A1 (en) 2003-07-11 2004-10-01 Apparatus and method for double-blind instant messaging

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US10/889,689 Abandoned US20050076110A1 (en) 2003-07-11 2004-07-12 Generic inbox system and method
US10/889,688 Abandoned US20050076109A1 (en) 2003-07-11 2004-07-12 Multimedia notification system and method
US10/889,709 Expired - Fee Related US7484213B2 (en) 2003-07-11 2004-07-12 Agent architecture employed within an integrated message, document and communication system

Family Applications After (8)

Application Number Title Priority Date Filing Date
US10/889,708 Abandoned US20050076095A1 (en) 2003-07-11 2004-07-12 Virtual contextual file system and method
US10/930,879 Abandoned US20050172033A1 (en) 2003-07-11 2004-08-30 Apparatus and method for multi-layer rule application within an integrated messaging platform
US10/930,151 Abandoned US20050068980A1 (en) 2003-07-11 2004-08-30 System and method for intelligent message and document access over different media channels
US10/930,262 Abandoned US20050083915A1 (en) 2003-07-11 2004-08-30 Apparatus and method for implementing a multimedia distribution list
US10/930,260 Abandoned US20050074113A1 (en) 2003-07-11 2004-08-30 Heuristic interactive voice response system
US10/956,692 Abandoned US20050114456A1 (en) 2003-07-11 2004-10-01 Apparatus and method for advanced contacts management within an integrated message/document management system
US10/956,245 Abandoned US20050114462A1 (en) 2003-07-11 2004-10-01 Apparatus and method for meta-document creation and processing
US10/956,244 Abandoned US20050108341A1 (en) 2003-07-11 2004-10-01 Apparatus and method for double-blind instant messaging

Country Status (3)

Country Link
US (12) US20050076110A1 (en)
EP (1) EP1656620A2 (en)
WO (1) WO2005008432A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060277127A1 (en) * 2005-06-07 2006-12-07 Checkfree Corporation Automated actions based on restrictions
US20090295540A1 (en) * 2008-05-30 2009-12-03 Oki Data Corporation Facsimile machine, facsimile notification system, and communication terminal device
US20100222027A1 (en) * 2009-02-27 2010-09-02 Research In Motion Limited Communications system providing mobile device notification content type selection features and related methods
US20140134979A1 (en) * 2012-11-14 2014-05-15 Apple Inc. Integrated Approach for Visual Dialing
US20170063761A1 (en) * 2015-08-29 2017-03-02 Sysu Huadu Industrial Science And Technology Institute Accessing Computers via Text Messages
EP2360907B1 (en) * 2010-01-15 2019-09-04 J2 Global IP Limited Secure transmission method using a fax server, computer system and program for implementing said method
US20190379615A1 (en) * 2018-06-08 2019-12-12 Capital One Services, Llc System and Method for Proactive Intervention to Reduce High Cost Channel Usage

Families Citing this family (497)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8352400B2 (en) 1991-12-23 2013-01-08 Hoffberg Steven M Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
US7003304B1 (en) 1997-09-19 2006-02-21 Thompson Investment Group, Llc Paging transceivers and methods for selectively retrieving messages
US6253061B1 (en) 1997-09-19 2001-06-26 Richard J. Helferich Systems and methods for delivering information to a transmitting and receiving device
US6636733B1 (en) 1997-09-19 2003-10-21 Thompson Trust Wireless messaging method
US6826407B1 (en) 1999-03-29 2004-11-30 Richard J. Helferich System and method for integrating audio and visual messaging
US6983138B1 (en) * 1997-12-12 2006-01-03 Richard J. Helferich User interface for message access
US7904187B2 (en) 1999-02-01 2011-03-08 Hoffberg Steven M Internet appliance system and method
US6874028B1 (en) 1999-10-25 2005-03-29 Microsoft Corporation System and method for unified registration information collection
US7017002B2 (en) * 2000-01-05 2006-03-21 Rambus, Inc. System featuring a master device, a buffer device and a plurality of integrated circuit memory devices
US6760580B2 (en) * 2000-03-06 2004-07-06 America Online, Incorporated Facilitating instant messaging outside of user-defined buddy group in a wireless and non-wireless environment
US6714793B1 (en) 2000-03-06 2004-03-30 America Online, Inc. Method and system for instant messaging across cellular networks and a public data network
US8645137B2 (en) 2000-03-16 2014-02-04 Apple Inc. Fast, language-independent method for user authentication by voice
US7624172B1 (en) 2000-03-17 2009-11-24 Aol Llc State change alerts mechanism
US9246975B2 (en) 2000-03-17 2016-01-26 Facebook, Inc. State change alerts mechanism
US6701348B2 (en) * 2000-12-22 2004-03-02 Goodcontacts.Com Method and system for automatically updating contact information within a contact database
US6826729B1 (en) * 2001-06-29 2004-11-30 Microsoft Corporation Gallery user interface controls
US7424494B2 (en) * 2001-08-23 2008-09-09 Comverse, Inc. System for synchronizing voice messaging subscriber information
US6988129B2 (en) * 2001-11-26 2006-01-17 Pitney Bowes Inc. Method for providing address change notification in an electronic message forwarding system
US7228335B2 (en) * 2002-02-19 2007-06-05 Goodcontacts Research Ltd. Method of automatically populating contact information fields for a new contract added to an electronic contact database
US20030212745A1 (en) * 2002-05-08 2003-11-13 Caughey David A. Selective multi-step email message marketing
US20060233319A1 (en) * 2002-07-30 2006-10-19 Van Zandt Patience N Automatic messaging system
US7334020B2 (en) * 2002-09-20 2008-02-19 Goodcontacts Research Ltd. Automatic highlighting of new electronic message address
US7383303B1 (en) * 2002-09-30 2008-06-03 Danger, Inc. System and method for integrating personal information management and messaging applications
US7117528B1 (en) * 2002-10-24 2006-10-03 Microsoft Corporation Contested account registration
US20040083230A1 (en) * 2002-10-24 2004-04-29 Caughey David A. Method and system for automatically managing an address database
WO2004046867A2 (en) 2002-11-18 2004-06-03 America Online, Inc. People lists
US7640306B2 (en) 2002-11-18 2009-12-29 Aol Llc Reconfiguring an electronic message to effect an enhanced notification
US8701014B1 (en) 2002-11-18 2014-04-15 Facebook, Inc. Account linking
US8965964B1 (en) 2002-11-18 2015-02-24 Facebook, Inc. Managing forwarded electronic messages
US7590696B1 (en) 2002-11-18 2009-09-15 Aol Llc Enhanced buddy list using mobile device identifiers
US7428580B2 (en) 2003-11-26 2008-09-23 Aol Llc Electronic message forwarding
US8122137B2 (en) 2002-11-18 2012-02-21 Aol Inc. Dynamic location of a subordinate user
US8005919B2 (en) 2002-11-18 2011-08-23 Aol Inc. Host-based intelligent results related to a character stream
US7899862B2 (en) 2002-11-18 2011-03-01 Aol Inc. Dynamic identification of other users to an online user
US7643164B2 (en) * 2003-02-28 2010-01-05 Portauthority Technologies Inc. Method and system for distribution policy enforcement on fax
US7603417B2 (en) 2003-03-26 2009-10-13 Aol Llc Identifying and using identities deemed to be known to a user
CN1765136B (en) * 2003-04-17 2010-05-12 诺基亚有限公司 Mobile communication equipment and operation method thereof
US9392428B2 (en) 2003-04-17 2016-07-12 Nokia Technologies Oy Reminder handling
US7045377B2 (en) * 2003-06-26 2006-05-16 Rj Mears, Llc Method for making a semiconductor device including a superlattice and adjacent semiconductor layer with doped regions defining a semiconductor junction
US7716593B2 (en) * 2003-07-01 2010-05-11 Microsoft Corporation Conversation grouping of electronic mail records
US7707255B2 (en) 2003-07-01 2010-04-27 Microsoft Corporation Automatic grouping of electronic mail
US20070041542A1 (en) * 2003-07-14 2007-02-22 Schramm Steven D Connection management in communications systems
US7889849B2 (en) * 2003-07-14 2011-02-15 Cisco Tech Inc Mobile device conference calls via private branch exchange
US8325906B2 (en) * 2003-07-14 2012-12-04 Cisco Technology, Inc. Class-based call request routing
US7783310B2 (en) * 2003-07-14 2010-08-24 Orative Corporation Melting information on a client device
US7688953B2 (en) * 2003-07-14 2010-03-30 Cisco Technology, Inc. Rate control in communications systems
US7974391B2 (en) 2003-07-14 2011-07-05 Orative Corporation Conversation-based user interface
US7822189B2 (en) * 2003-07-14 2010-10-26 Orative Corporation Searching multiple directories and generating a sorted integrated directory
US8638910B2 (en) * 2003-07-14 2014-01-28 Cisco Technology, Inc. Integration of enterprise voicemail in mobile systems
US20070042792A1 (en) * 2003-07-14 2007-02-22 Josh Perfetto Determining message format according to status information
US8767931B2 (en) * 2003-07-14 2014-07-01 Orative Corporation Provisioning in communications systems
US7742584B2 (en) * 2003-07-14 2010-06-22 Cisco Technology, Inc. Mobile device calls via private branch exchange
US7787607B2 (en) * 2003-07-14 2010-08-31 Cisco Technology, Inc. Mobile device calls via private branch exchange
US7876888B2 (en) * 2003-07-14 2011-01-25 Cisco Technology, Inc. Mobile device calls via private branch exchange
US7940910B2 (en) * 2003-07-14 2011-05-10 Orative Corporation Directory integration in mobile systems
US8503658B2 (en) * 2003-07-14 2013-08-06 Cisco Technology, Inc. Call notification with rich caller identification
AU2006200426B2 (en) * 2003-07-17 2010-07-29 Ivis Group Limited Improved search engine
AU2012200686B2 (en) * 2003-07-17 2014-07-10 Ivis Group Limited Improved search engine
GB0316806D0 (en) * 2003-07-17 2003-08-20 Ivis Group Ltd Improved search engine
US7653693B2 (en) 2003-09-05 2010-01-26 Aol Llc Method and system for capturing instant messages
US7184160B2 (en) * 2003-08-08 2007-02-27 Venali, Inc. Spam fax filter
SG145736A1 (en) * 2003-08-12 2008-09-29 Research In Motion Ltd System and method for processing encoded messages
US8005763B2 (en) * 2003-09-30 2011-08-23 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US20050076090A1 (en) * 2003-10-07 2005-04-07 International Business Machines Corporation Method, system, and apparatus for selective automated electronic mail replies
US10437964B2 (en) 2003-10-24 2019-10-08 Microsoft Technology Licensing, Llc Programming interface for licensing
KR20050052186A (en) * 2003-11-29 2005-06-02 삼성전자주식회사 Method and system for selectively receiving e-mail
US8639755B2 (en) * 2003-12-17 2014-01-28 International Business Machines Corporation System and method of managing real-time communications using context-based awareness states
US7693943B2 (en) * 2004-01-23 2010-04-06 International Business Machines Corporation Classification of electronic mail into multiple directories based upon their spam-like properties
US8442331B2 (en) 2004-02-15 2013-05-14 Google Inc. Capturing text from rendered documents using supplemental information
US7707039B2 (en) * 2004-02-15 2010-04-27 Exbiblio B.V. Automatic modification of web pages
US7822690B2 (en) 2004-02-10 2010-10-26 Paul Rakowicz Paperless process for mortgage closings and other applications
US11538122B1 (en) 2004-02-10 2022-12-27 Citrin Holdings Llc Digitally signing documents using digital signatures
TWI238663B (en) * 2004-02-13 2005-08-21 Era Digital Media Co Ltd Cross media information integration system
US10635723B2 (en) 2004-02-15 2020-04-28 Google Llc Search engines and systems with handheld document data capture devices
US7812860B2 (en) 2004-04-01 2010-10-12 Exbiblio B.V. Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device
US20060104515A1 (en) * 2004-07-19 2006-05-18 King Martin T Automatic modification of WEB pages
US8255835B2 (en) 2004-02-24 2012-08-28 Research In Motion Limited Method and system for managing unread electronic messages
US7552630B2 (en) * 2004-02-27 2009-06-30 Akron Special Machinery, Inc. Load wheel drive
US20050223074A1 (en) * 2004-03-31 2005-10-06 Morris Robert P System and method for providing user selectable electronic message action choices and processing
US9143638B2 (en) 2004-04-01 2015-09-22 Google Inc. Data capture from rendered documents using handheld device
US7990556B2 (en) 2004-12-03 2011-08-02 Google Inc. Association of a portable scanner with input/output and storage devices
US8146156B2 (en) 2004-04-01 2012-03-27 Google Inc. Archive of text captures from rendered documents
US20060098900A1 (en) 2004-09-27 2006-05-11 King Martin T Secure data gathering from rendered documents
US7894670B2 (en) 2004-04-01 2011-02-22 Exbiblio B.V. Triggering actions in response to optically or acoustically capturing keywords from a rendered document
US20060081714A1 (en) 2004-08-23 2006-04-20 King Martin T Portable scanning device
US9116890B2 (en) 2004-04-01 2015-08-25 Google Inc. Triggering actions in response to optically or acoustically capturing keywords from a rendered document
US9008447B2 (en) 2004-04-01 2015-04-14 Google Inc. Method and system for character recognition
US8081849B2 (en) 2004-12-03 2011-12-20 Google Inc. Portable scanning and memory device
US8713418B2 (en) 2004-04-12 2014-04-29 Google Inc. Adding value to a rendered document
US8874504B2 (en) 2004-12-03 2014-10-28 Google Inc. Processing techniques for visual capture data from a rendered document
US8489624B2 (en) 2004-05-17 2013-07-16 Google, Inc. Processing techniques for text capture from a rendered document
US8620083B2 (en) 2004-12-03 2013-12-31 Google Inc. Method and system for character recognition
US8661332B2 (en) 2004-04-30 2014-02-25 Microsoft Corporation Method and apparatus for document processing
US7383500B2 (en) * 2004-04-30 2008-06-03 Microsoft Corporation Methods and systems for building packages that contain pre-paginated documents
US20050273382A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Systems and methods for collaborative co-navigation
US20050273714A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Systems and methods for an embedded collaboration client
US20050262095A1 (en) * 2004-05-21 2005-11-24 Bea Systems, Inc. Systems and methods for collaboration interceptors
US20050262094A1 (en) * 2004-05-20 2005-11-24 Bea Systems, Inc. Systems and methods for enterprise collaboration
US20050262075A1 (en) * 2004-05-21 2005-11-24 Bea Systems, Inc. Systems and methods for collaboration shared state management
US20060031497A1 (en) * 2004-05-21 2006-02-09 Bea Systems, Inc. Systems and methods for collaborative content storage
US20050262006A1 (en) * 2004-05-20 2005-11-24 Bea Systems, Inc. Systems and methods for a collaboration server
US20060004690A1 (en) * 2004-05-21 2006-01-05 Bea Systems, Inc. Systems and methods for dynamic configuration of a collaboration
US20050262185A1 (en) * 2004-05-20 2005-11-24 Bea Systems, Inc. Systems and methods for a collaboration messaging framework
US20060010205A1 (en) * 2004-05-21 2006-01-12 Bea Systems, Inc. Systems and methods for collaboration impersonation
US20060031234A1 (en) * 2004-05-21 2006-02-09 Brodi Beartusk Systems and methods for a collaborative group chat
US20050262007A1 (en) * 2004-05-21 2005-11-24 Bea Systems, Inc. Systems and methods for a collaborative call center
US20050278294A1 (en) * 2004-05-20 2005-12-15 Bea Systems, Inc. Systems and methods for a collaboration presence framework
US20060010125A1 (en) * 2004-05-21 2006-01-12 Bea Systems, Inc. Systems and methods for collaborative shared workspaces
US7526529B2 (en) * 2004-06-02 2009-04-28 Ge Security, Inc. Apparatus and method for presenting data and sending a message
US7370273B2 (en) * 2004-06-30 2008-05-06 International Business Machines Corporation System and method for creating dynamic folder hierarchies
US7643627B2 (en) * 2004-07-09 2010-01-05 At&T Intellectual Property, I,L.P. Methods, systems and storage mediums for providing a self-provisioning telephony service
US8346620B2 (en) 2004-07-19 2013-01-01 Google Inc. Automatic modification of web pages
US7580837B2 (en) 2004-08-12 2009-08-25 At&T Intellectual Property I, L.P. System and method for targeted tuning module of a speech recognition system
CN101268486A (en) * 2004-08-12 2008-09-17 组合数据公司 Contact information marketplace
US8146016B2 (en) 2004-08-16 2012-03-27 Microsoft Corporation User interface for displaying a gallery of formatting options applicable to a selected object
US9015621B2 (en) 2004-08-16 2015-04-21 Microsoft Technology Licensing, Llc Command user interface for displaying multiple sections of software functionality controls
US8255828B2 (en) * 2004-08-16 2012-08-28 Microsoft Corporation Command user interface for displaying selectable software functionality controls
US7703036B2 (en) 2004-08-16 2010-04-20 Microsoft Corporation User interface for displaying selectable software functionality controls that are relevant to a selected object
US7895531B2 (en) * 2004-08-16 2011-02-22 Microsoft Corporation Floating command object
US8805934B2 (en) 2004-09-02 2014-08-12 Vmware, Inc. System and method for enabling an external-system view of email attachments
US7747966B2 (en) * 2004-09-30 2010-06-29 Microsoft Corporation User interface for providing task management and calendar information
US8131804B2 (en) * 2004-11-19 2012-03-06 J Michael Greata Method and apparatus for immunizing data in computer systems from corruption
US7689655B2 (en) * 2004-12-06 2010-03-30 Aol Inc. Managing and collaborating with digital content using a dynamic user interface
US7242751B2 (en) 2004-12-06 2007-07-10 Sbc Knowledge Ventures, L.P. System and method for speech recognition-enabled automatic call routing
US8838454B1 (en) * 2004-12-10 2014-09-16 Sprint Spectrum L.P. Transferring voice command platform (VCP) functions and/or grammar together with a call from one VCP to another
KR100750999B1 (en) 2004-12-20 2007-08-22 삼성전자주식회사 Device and method for processing call/message-related event in wireless terminal
KR100736031B1 (en) * 2005-01-06 2007-07-06 삼성전자주식회사 System and method for offering personalized office work
US20070179953A1 (en) * 2005-01-10 2007-08-02 Instant Information Inc. Methods and systems for presence management in a collaboration system
US7751551B2 (en) 2005-01-10 2010-07-06 At&T Intellectual Property I, L.P. System and method for speech-enabled call routing
US7783708B2 (en) * 2005-01-27 2010-08-24 Microsoft Corporation Attachment browser
US8190687B1 (en) * 2005-03-01 2012-05-29 At&T Intellectual Property Ii, L.P. Multimedia alerting and notification service for mobile users
DE102005013919B4 (en) * 2005-03-24 2007-01-11 Infineon Technologies Ag A method for computer-aided management of a telecommunications conference and telecommunication conference server facilities
US20060248012A1 (en) * 2005-04-29 2006-11-02 Stefan Kircher Transmission of messages related to electronic documents
CA2506665A1 (en) * 2005-05-06 2006-11-06 Iotum Inc. Method of and system for telecommunication management
US20060271503A1 (en) * 2005-05-12 2006-11-30 Per Kangru Methods and systems for interactive signal analysis
US7627656B1 (en) * 2005-05-16 2009-12-01 Cisco Technology, Inc. Providing configuration information to an endpoint
US20060277092A1 (en) * 2005-06-03 2006-12-07 Credigy Technologies, Inc. System and method for a peer to peer exchange of consumer information
US7657020B2 (en) 2005-06-03 2010-02-02 At&T Intellectual Property I, Lp Call routing system and method of using the same
US8577967B1 (en) * 2005-06-30 2013-11-05 Google Inc. Method and system for managing real-time communications in an email inbox
US8577684B2 (en) 2005-07-13 2013-11-05 Intellisist, Inc. Selective security masking within recorded speech utilizing speech recognition techniques
US20070016636A1 (en) * 2005-07-14 2007-01-18 Yahoo! Inc. Methods and systems for data transfer and notification mechanisms
US7761226B1 (en) * 2005-07-27 2010-07-20 The United States Of America As Represented By The Secretary Of The Navy Interactive pedestrian routing system
US8239882B2 (en) * 2005-08-30 2012-08-07 Microsoft Corporation Markup based extensibility for user interfaces
US8677377B2 (en) 2005-09-08 2014-03-18 Apple Inc. Method and apparatus for building an intelligent automated assistant
US9542667B2 (en) * 2005-09-09 2017-01-10 Microsoft Technology Licensing, Llc Navigating messages within a thread
US8627222B2 (en) * 2005-09-12 2014-01-07 Microsoft Corporation Expanded search and find user interface
US7739259B2 (en) * 2005-09-12 2010-06-15 Microsoft Corporation Integrated search and find user interface
US7627561B2 (en) * 2005-09-12 2009-12-01 Microsoft Corporation Search and find using expanded search scope
US7627106B1 (en) * 2005-09-26 2009-12-01 At&T Corporation Method and apparatus for sending updates to a call control element from an application server
US8077838B2 (en) * 2005-09-28 2011-12-13 Cisco Technology, Inc. Method and voice communicator to provide a voice communication
US7243149B2 (en) * 2005-10-03 2007-07-10 Motorola, Inc. System and method for determining a presence state of a user
US8849908B2 (en) * 2005-10-13 2014-09-30 Kaydon A. Stanzione Internet based data, voice and video alert notification communications system
US20070100856A1 (en) * 2005-10-21 2007-05-03 Yahoo! Inc. Account consolidation
US8499031B1 (en) 2005-10-21 2013-07-30 Oracle America, Inc. Markup language messaging service for secure access by edge applications
US20070094065A1 (en) * 2005-10-24 2007-04-26 Chenghsiu Wu Activity planning method and system
US8954511B2 (en) * 2005-11-01 2015-02-10 Blackberry Limited System and method for collecting and presenting records in a journal on an electronic device
US7570382B2 (en) * 2005-11-14 2009-08-04 Kabushiki Kaisha Toshiba System and method for detecting errors in electronic document workflow
US7953846B1 (en) * 2005-11-15 2011-05-31 At&T Intellectual Property Ii, Lp Internet security updates via mobile phone videos
US9392069B2 (en) * 2005-11-18 2016-07-12 Aol Inc. Promoting interoperability of presence-based systems through the use of ubiquitous online identities
WO2007060721A1 (en) * 2005-11-24 2007-05-31 Hewlett-Packard Development Company, L.P. Network administrating device and method of administrating network
US7599362B2 (en) * 2005-11-28 2009-10-06 Sony Ericsson Mobile Communications Ab Method and device for communication channel selection
US7921165B2 (en) * 2005-11-30 2011-04-05 Microsoft Corporation Retaining mail for availability after relay
US8560456B2 (en) * 2005-12-02 2013-10-15 Credigy Technologies, Inc. System and method for an anonymous exchange of private data
US7730144B2 (en) 2005-12-09 2010-06-01 Ebuddy Holding B.V. High level network layer system and method
US20070150906A1 (en) * 2005-12-09 2007-06-28 Art Richards Method for integration of functionality of computer programs and substitute user interface for transportation environment
US20070136450A1 (en) * 2005-12-12 2007-06-14 Filippos Nikiforou Automatic incubation and revival of messages in message systems
US20070162377A1 (en) * 2005-12-23 2007-07-12 Credigy Technologies, Inc. System and method for an online exchange of private data
US7788296B2 (en) * 2005-12-29 2010-08-31 Guidewire Software, Inc. Method and apparatus for managing a computer-based address book for incident-related work
CN101356796A (en) * 2006-01-06 2009-01-28 奥拉蒂夫公司 Integration of enterprise voicemail in mobile systems
US7870264B2 (en) * 2006-01-19 2011-01-11 International Business Machines Corporation Methods and apparatus for providing communications from a plurality of network devices to a user
US20070185970A1 (en) * 2006-02-08 2007-08-09 International Business Machines Corporation Method, system, and computer program product for providing messaging services
US20070192490A1 (en) * 2006-02-13 2007-08-16 Minhas Sandip S Content-based filtering of electronic messages
US8494152B1 (en) 2006-02-28 2013-07-23 Allstate Insurance Company Systems and methods for automated call-handling and processing
US7529795B2 (en) * 2006-03-20 2009-05-05 Stragent, Llc Message board aggregator
US20070226627A1 (en) * 2006-03-24 2007-09-27 Per Kangru Methods and systems for signal analysis
GB2438015A (en) * 2006-04-08 2007-11-14 Jon Slinn System and components to manage event based information on an electronic device.
US7743018B2 (en) * 2006-04-10 2010-06-22 International Business Machines Corporation Transient storage in distributed collaborative computing environments
CA2644666A1 (en) * 2006-04-17 2007-10-25 Vovision Llc Methods and systems for correcting transcribed audio files
WO2009073768A1 (en) 2007-12-04 2009-06-11 Vovision, Llc Correcting transcribed audio files with an email-client interface
GB0607759D0 (en) * 2006-04-20 2006-05-31 Ibm Method,apparatus and computer program for identifying any discrepancies in an email distribution list
US8676703B2 (en) 2006-04-27 2014-03-18 Guidewire Software, Inc. Insurance policy revisioning method and apparatus
US20070266031A1 (en) * 2006-05-15 2007-11-15 Adams J Trent Identifying content
US9727989B2 (en) 2006-06-01 2017-08-08 Microsoft Technology Licensing, Llc Modifying and formatting a chart using pictorially provided chart elements
US20070299919A1 (en) * 2006-06-27 2007-12-27 International Business Machines Corporation Method of initiating automatic actions by an instant messenger service in response to identified incoming messages
US8433915B2 (en) 2006-06-28 2013-04-30 Intellisist, Inc. Selective security masking within recorded speech
US8359297B2 (en) * 2006-06-29 2013-01-22 International Business Machines Corporation Multiple source data management using a conflict rule
WO2008005924A2 (en) * 2006-06-30 2008-01-10 Benjamin Perlman Temporary voicemail greeting for cellular phones: instant away messaging
US9210252B2 (en) * 2006-07-13 2015-12-08 Alcatel Lucent End-user device personalized application notification feature
US7769144B2 (en) * 2006-07-21 2010-08-03 Google Inc. Method and system for generating and presenting conversation threads having email, voicemail and chat messages
US8121263B2 (en) * 2006-07-21 2012-02-21 Google Inc. Method and system for integrating voicemail and electronic messaging
US8166113B2 (en) * 2006-08-02 2012-04-24 Microsoft Corporation Access limited EMM distribution lists
US7894834B1 (en) * 2006-08-08 2011-02-22 Sprint Spectrum L.P. Method and system to facilitate multiple media content providers to inter-work with media serving system
US8780925B2 (en) * 2006-08-17 2014-07-15 Fonality, Inc. Mobile use of a PBX system
US20080052360A1 (en) * 2006-08-22 2008-02-28 Microsoft Corporation Rules Profiler
US8243899B2 (en) * 2006-08-23 2012-08-14 Motorola Solutions, Inc. Method and apparatus for a processing of calls in a telecommunications system
US20080056155A1 (en) * 2006-08-29 2008-03-06 Atte Lahtiranta Active idle extension
US8385517B2 (en) * 2006-08-29 2013-02-26 Nokia Corporation Replying through different channels
US8363794B2 (en) * 2006-08-29 2013-01-29 Nokia Corporation Voice mail extension
US8768332B2 (en) * 2006-09-01 2014-07-01 At&T Mobility Ii Llc Interactive personal information management system
EP2067119A2 (en) 2006-09-08 2009-06-10 Exbiblio B.V. Optical scanners, such as hand-held optical scanners
US9318108B2 (en) 2010-01-18 2016-04-19 Apple Inc. Intelligent automated assistant
US8015083B1 (en) 2006-09-11 2011-09-06 Intuit Inc. Method and apparatus for client-specific notification service
US7739340B2 (en) * 2006-09-20 2010-06-15 International Business Machines Corporation Method, system and computer program product for enabling electronic chat with online calendar invitees
US20080077675A1 (en) * 2006-09-25 2008-03-27 Agere Systems Inc. Systems and Methods for Electronic Message Preparation
US20080091782A1 (en) * 2006-10-13 2008-04-17 Gabriel Jakobson Method and system for delegating and managing tasks over instant messenger
US8036347B1 (en) * 2006-10-18 2011-10-11 Avaya Inc. Method and apparatus providing additional information to an interactive voice response (IVR) system user
US7933874B2 (en) 2006-11-14 2011-04-26 Microsoft Corporation Maintaining tracking information for electronic documents
US20080134344A1 (en) * 2006-12-01 2008-06-05 Mcbrearty Gerald Francis Restricting access to calendar entries
GB2446199A (en) * 2006-12-01 2008-08-06 David Irvine Secure, decentralised and anonymous peer-to-peer network
US20080134285A1 (en) * 2006-12-04 2008-06-05 Electronics And Telecommunications Research Institute Apparatus and method for countering spam in network for providing ip multimedia service
US7765259B2 (en) * 2006-12-05 2010-07-27 Avaya Inc. System and method for aggregation of user conversations and visualizing personal communications map
US20080140826A1 (en) * 2006-12-08 2008-06-12 Microsoft Corporation Monitoring and controlling electronic message distribution
US9258405B1 (en) * 2006-12-18 2016-02-09 Good Technology Software, Inc. Meeting integration for a messaging and scheduling application
US8255811B2 (en) * 2006-12-20 2012-08-28 International Business Machines Corporation Providing auto-sorting of collaborative partners or components based on frequency of communication and/or access in a collaboration system user interface
US9020963B2 (en) * 2007-01-10 2015-04-28 International Business Machines Corporation Providing relevant assets in collaboration mediums
US7986867B2 (en) * 2007-01-26 2011-07-26 Myspace, Inc. Video downloading and scrubbing system and method
WO2008094532A1 (en) * 2007-01-26 2008-08-07 Flektor, Inc. Real time online video editing system and method
US8218830B2 (en) * 2007-01-29 2012-07-10 Myspace Llc Image editing system and method
JP5295128B2 (en) * 2007-01-30 2013-09-18 バブル モーション ピーティーイー,リミテッド Systems and methods for delivering messages to mobile devices.
US20080195448A1 (en) * 2007-02-09 2008-08-14 May Darrell R Method Of Processing Calendar Events, And Associated Handheld Electronic Device
US8098810B2 (en) 2007-03-09 2012-01-17 Fonality, Inc. Intelligent presence management in a communication routing system
US8693659B2 (en) 2007-03-09 2014-04-08 Fonality, Inc. System and method for centralized presence management of local and remote users
US7711717B2 (en) * 2007-03-20 2010-05-04 Microsoft Corporation Achieving recurring item recordings from calendaring applications over LOB systems
US8943018B2 (en) 2007-03-23 2015-01-27 At&T Mobility Ii Llc Advanced contact management in communications networks
US7792912B2 (en) * 2007-03-30 2010-09-07 International Business Machines Corporation Product, method and system for managing multiple user IDS in instant messaging or email computer software applications
US8977255B2 (en) 2007-04-03 2015-03-10 Apple Inc. Method and system for operating a multi-function portable electronic device using voice-activation
US20080273678A1 (en) * 2007-05-01 2008-11-06 Igor Balk Systems and methods for phone call management
US7286661B1 (en) * 2007-05-01 2007-10-23 Unison Technologies Llc Systems and methods for scalable hunt-group management
US7934011B2 (en) * 2007-05-01 2011-04-26 Flektor, Inc. System and method for flow control in web-based video editing system
US8379832B1 (en) 2007-05-03 2013-02-19 Fonality, Inc. Universal queuing for inbound communications
US20080285736A1 (en) * 2007-05-16 2008-11-20 Unison Technolgies Llc Systems and methods for providing unified collaboration systems with conditional communication handling
US20080285587A1 (en) * 2007-05-16 2008-11-20 Unison Technologies Llc Systems and methods for providing unified collaboration systems with user selectable reply format
US8041765B1 (en) 2007-05-17 2011-10-18 Avaya Inc. Method and apparatus providing sender information by way of a personal virtual assistant (PVA)
US7752279B2 (en) * 2007-05-29 2010-07-06 Research In Motion Limited System for facilitating thread-based message prioritization
US8752065B2 (en) * 2007-05-31 2014-06-10 Red Hat, Inc. Rules engine for a persistent message store
US8670972B1 (en) 2007-06-07 2014-03-11 West Corporation Method and apparatus for voice recognition unit simulation
US20080320001A1 (en) * 2007-06-21 2008-12-25 Sreedhar Gaddam Collaboration System and Method for Use of Same
US8209214B2 (en) 2007-06-26 2012-06-26 Richrelevance, Inc. System and method for providing targeted content
US8156138B2 (en) * 2007-06-26 2012-04-10 Richrelevance, Inc. System and method for providing targeted content
US20090007143A1 (en) * 2007-06-28 2009-01-01 Microsoft Corporation Server quota notification
US8230024B2 (en) * 2007-06-28 2012-07-24 Microsoft Corporation Delegating instant messaging sessions
US20090006568A1 (en) * 2007-06-28 2009-01-01 Microsoft Corporation Network-based collaboration record
US8762880B2 (en) 2007-06-29 2014-06-24 Microsoft Corporation Exposing non-authoring features through document status information in an out-space user interface
US8484578B2 (en) 2007-06-29 2013-07-09 Microsoft Corporation Communication between a document editor in-space user interface and a document editor out-space user interface
US8201103B2 (en) 2007-06-29 2012-06-12 Microsoft Corporation Accessing an out-space user interface for a document editor program
US10069924B2 (en) * 2007-07-25 2018-09-04 Oath Inc. Application programming interfaces for communication systems
US10097695B2 (en) 2007-08-10 2018-10-09 Fonality, Inc. System and method for providing carrier-independent VoIP communication
US8660966B2 (en) 2007-08-31 2014-02-25 Microsoft Corporation Payment system and method
US8689330B2 (en) * 2007-09-05 2014-04-01 Yahoo! Inc. Instant messaging malware protection
US8316062B1 (en) * 2007-09-07 2012-11-20 Pinger, Inc. Shared distribution lists for distribution of audio content using mobile telecommunication devices
US8792118B2 (en) * 2007-09-26 2014-07-29 Ringcentral Inc. User interfaces and methods to provision electronic facsimiles
US20090086278A1 (en) * 2007-09-27 2009-04-02 Ringcentral, Inc. Electronic facsimile delivery systems and methods
US8275110B2 (en) 2007-09-28 2012-09-25 Ringcentral, Inc. Active call filtering, screening and dispatching
US8600391B2 (en) * 2008-11-24 2013-12-03 Ringcentral, Inc. Call management for location-aware mobile devices
US8670545B2 (en) * 2007-09-28 2014-03-11 Ringcentral, Inc. Inbound call identification and management
US8185593B2 (en) * 2007-10-08 2012-05-22 International Business Machines Corporation System and method for freezing portions of a chat conversation in an instant messaging system
AU2008311849A1 (en) 2007-10-20 2009-04-23 Citrix Systems, Inc. Systems and methods for folder redirection
US8503989B2 (en) 2007-10-22 2013-08-06 Cisco Technology, Inc. Dynamic contact list
US8130425B2 (en) * 2007-10-26 2012-03-06 At&T Intellectual Property I, Lp Methods and apparatus to route fax calls in an internet protocol (IP) multimedia subsystem (IMS) network
US8478764B2 (en) * 2007-11-09 2013-07-02 Vantrix Corporation Method and apparatus for concurrent filtering of multiple components of streaming data
US10282701B2 (en) * 2007-11-20 2019-05-07 Red Hat, Inc. Web-based technical issue assignments based on technical support groups having handled a highest number of technical requests
US8144841B2 (en) * 2007-12-05 2012-03-27 Microsoft Corporation Multimedia spam determination using speech conversion
US9330720B2 (en) 2008-01-03 2016-05-03 Apple Inc. Methods and apparatus for altering audio output signals
US9584343B2 (en) 2008-01-03 2017-02-28 Yahoo! Inc. Presentation of organized personal and public data using communication mediums
US8401156B1 (en) * 2008-02-08 2013-03-19 West Corporation Real-time monitoring of caller experience in a call flow
US9483755B2 (en) 2008-03-04 2016-11-01 Apple Inc. Portable multifunction device, method, and graphical user interface for an email client
US20090228815A1 (en) * 2008-03-10 2009-09-10 Palm, Inc. Techniques for managing interfaces based on user circumstances
CA2719301C (en) * 2008-03-25 2016-10-04 E-Lane Systems Inc. Multi-participant, mixed-initiative voice interaction system
US9588781B2 (en) * 2008-03-31 2017-03-07 Microsoft Technology Licensing, Llc Associating command surfaces with multiple active components
US8996376B2 (en) 2008-04-05 2015-03-31 Apple Inc. Intelligent text-to-speech conversion
US8656054B2 (en) * 2008-04-30 2014-02-18 International Business Machines Corporation Message send version management in network
US7873745B2 (en) * 2008-04-30 2011-01-18 International Business Machines Corporation Message receipt version management in network
US10496753B2 (en) 2010-01-18 2019-12-03 Apple Inc. Automatically adapting user interfaces for hands-free interaction
US9665850B2 (en) 2008-06-20 2017-05-30 Microsoft Technology Licensing, Llc Synchronized conversation-centric message list and message reading pane
US8402096B2 (en) 2008-06-24 2013-03-19 Microsoft Corporation Automatic conversation techniques
US8527263B2 (en) * 2008-07-01 2013-09-03 International Business Machines Corporation Method and system for automatically generating reminders in response to detecting key terms within a communication
US20100030549A1 (en) 2008-07-31 2010-02-04 Lee Michael M Mobile device having human language translation capability with positional feedback
US8185492B2 (en) * 2008-08-14 2012-05-22 Google Inc. Messaging application with multiple viewports for presenting messages in different orders
US20100088382A1 (en) * 2008-08-27 2010-04-08 Lee G Roger Document manager integration
US8145680B2 (en) * 2008-08-29 2012-03-27 Oracle International Corporation System and method for using an editable lifecycle event distribution list with a service metadata repository
US8204897B1 (en) * 2008-09-09 2012-06-19 Google Inc. Interactive search querying
DE102008046431A1 (en) * 2008-09-09 2010-03-11 Deutsche Telekom Ag Speech dialogue system with reject avoidance method
US9070116B2 (en) * 2008-10-09 2015-06-30 At&T Mobility Ii Llc On-demand spam reporting
GB2478470B8 (en) 2008-11-17 2014-05-21 Sierra Wireless Inc Method and apparatus for network port and netword address translation
US8780383B2 (en) 2008-11-25 2014-07-15 Ringcentral, Inc. Authenticated facsimile transmission from mobile devices
WO2010062981A2 (en) * 2008-11-26 2010-06-03 Ringcentral, Inc. Centralized status server for call management of location-aware mobile devices
US9959870B2 (en) 2008-12-11 2018-05-01 Apple Inc. Speech recognition involving a mobile device
US8677458B2 (en) * 2008-12-24 2014-03-18 Blackboard Connect Inc. Hierarchical structure of a notification system including rights based on roles
EP2382763A1 (en) * 2008-12-30 2011-11-02 Telefonaktiebolaget LM Ericsson (publ) Expression conflict resolution in communication network tailoring
US8719386B2 (en) 2009-01-08 2014-05-06 Fonality, Inc. System and method for providing configuration synchronicity
CN105930311B (en) 2009-02-18 2018-10-09 谷歌有限责任公司 Execute method, mobile device and the readable medium with the associated action of rendered document
WO2010105245A2 (en) 2009-03-12 2010-09-16 Exbiblio B.V. Automatically providing content associated with captured information, such as information captured in real-time
US8447066B2 (en) 2009-03-12 2013-05-21 Google Inc. Performing actions based on capturing information from rendered documents, such as documents under copyright
US10318922B2 (en) 2009-03-16 2019-06-11 Fonality, Inc. System and method for automatic insertion of call intelligence in an information system
US9443244B2 (en) 2009-03-16 2016-09-13 Fonality, Inc. System and method for utilizing customer data in a communication system
US8799353B2 (en) * 2009-03-30 2014-08-05 Josef Larsson Scope-based extensibility for control surfaces
WO2010123915A1 (en) * 2009-04-24 2010-10-28 Dolby Laboratories Licensing Corporation Unified media content directory services
US9046983B2 (en) 2009-05-12 2015-06-02 Microsoft Technology Licensing, Llc Hierarchically-organized control galleries
WO2010141216A2 (en) 2009-06-02 2010-12-09 Xobni Corporation Self populating address book
US9858925B2 (en) 2009-06-05 2018-01-02 Apple Inc. Using context information to facilitate processing of commands in a virtual assistant
US10255566B2 (en) 2011-06-03 2019-04-09 Apple Inc. Generating and processing task items that represent tasks to perform
US10241752B2 (en) 2011-09-30 2019-03-26 Apple Inc. Interface for a virtual digital assistant
US10241644B2 (en) 2011-06-03 2019-03-26 Apple Inc. Actionable reminder entries
US8959157B2 (en) * 2009-06-26 2015-02-17 Microsoft Corporation Real-time spam look-up system
US9431006B2 (en) 2009-07-02 2016-08-30 Apple Inc. Methods and apparatuses for automatic speech recognition
US8984074B2 (en) 2009-07-08 2015-03-17 Yahoo! Inc. Sender-based ranking of person profiles and multi-person automatic suggestions
US8990323B2 (en) 2009-07-08 2015-03-24 Yahoo! Inc. Defining a social network model implied by communications data
US20110191717A1 (en) 2010-02-03 2011-08-04 Xobni Corporation Presenting Suggestions for User Input Based on Client Device Characteristics
US7930430B2 (en) 2009-07-08 2011-04-19 Xobni Corporation Systems and methods to provide assistance during address input
US9721228B2 (en) 2009-07-08 2017-08-01 Yahoo! Inc. Locally hosting a social network using social data stored on a user's computer
US20110060996A1 (en) * 2009-09-10 2011-03-10 Alberth Jr William P Method and System for Reducing Notifications to a Mobile Device in Accordance with User Preferences
US11080790B2 (en) 2009-09-24 2021-08-03 Guidewire Software, Inc. Method and apparatus for managing revisions and tracking of insurance policy elements
US9087323B2 (en) * 2009-10-14 2015-07-21 Yahoo! Inc. Systems and methods to automatically generate a signature block
US20110112881A1 (en) * 2009-11-11 2011-05-12 Harshita Malhotra System and method for user engagement in to-do list task management
US9514466B2 (en) 2009-11-16 2016-12-06 Yahoo! Inc. Collecting and presenting data including links from communications sent to or from a user
US7984106B2 (en) * 2009-11-16 2011-07-19 International Business Machines Corporation Messaging system
US9081799B2 (en) 2009-12-04 2015-07-14 Google Inc. Using gestalt information to identify locations in printed information
US9323784B2 (en) 2009-12-09 2016-04-26 Google Inc. Image search using text-based elements within the contents of images
US9760866B2 (en) * 2009-12-15 2017-09-12 Yahoo Holdings, Inc. Systems and methods to provide server side profile information
US20110145082A1 (en) 2009-12-16 2011-06-16 Ayman Hammad Merchant alerts incorporating receipt data
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts
US10276170B2 (en) 2010-01-18 2019-04-30 Apple Inc. Intelligent automated assistant
US10705794B2 (en) 2010-01-18 2020-07-07 Apple Inc. Automatically adapting user interfaces for hands-free interaction
US10553209B2 (en) 2010-01-18 2020-02-04 Apple Inc. Systems and methods for hands-free notification summaries
US10679605B2 (en) 2010-01-18 2020-06-09 Apple Inc. Hands-free list-reading by intelligent automated assistant
US8924956B2 (en) 2010-02-03 2014-12-30 Yahoo! Inc. Systems and methods to identify users using an automated learning process
US8682667B2 (en) 2010-02-25 2014-03-25 Apple Inc. User profiling for selecting user specific voice input processing information
US8982053B2 (en) 2010-05-27 2015-03-17 Yahoo! Inc. Presenting a new user screen in response to detection of a user motion
US8620935B2 (en) 2011-06-24 2013-12-31 Yahoo! Inc. Personalizing an online service based on data collected for a user of a computing device
US8972257B2 (en) 2010-06-02 2015-03-03 Yahoo! Inc. Systems and methods to present voice message information to a user of a computing device
US8302014B2 (en) 2010-06-11 2012-10-30 Microsoft Corporation Merging modifications to user interface components while preserving user customizations
EP2583167A4 (en) * 2010-06-17 2017-03-22 Unwired Planet International Limited Metadata-based data access and control
FR2963132A1 (en) * 2010-07-23 2012-01-27 Aldebaran Robotics HUMANOID ROBOT HAVING A NATURAL DIALOGUE INTERFACE, METHOD OF USING AND PROGRAMMING THE SAME
US8606923B2 (en) * 2010-09-15 2013-12-10 Core Mobile Networks, Inc. System and method for real time delivery of context based content from the cloud to mobile devices
JP5711518B2 (en) * 2010-12-15 2015-04-30 キヤノン株式会社 Information processing apparatus, control method thereof, and program
US10762293B2 (en) 2010-12-22 2020-09-01 Apple Inc. Using parts-of-speech tagging and named entity recognition for spelling correction
US9471145B2 (en) 2011-01-06 2016-10-18 Blackberry Limited Electronic device and method of displaying information in response to a gesture
US9766718B2 (en) * 2011-02-28 2017-09-19 Blackberry Limited Electronic device and method of displaying information in response to input
US9477311B2 (en) 2011-01-06 2016-10-25 Blackberry Limited Electronic device and method of displaying information in response to a gesture
US9423878B2 (en) 2011-01-06 2016-08-23 Blackberry Limited Electronic device and method of displaying information in response to a gesture
US9465440B2 (en) 2011-01-06 2016-10-11 Blackberry Limited Electronic device and method of displaying information in response to a gesture
US9015641B2 (en) 2011-01-06 2015-04-21 Blackberry Limited Electronic device and method of providing visual notification of a received communication
EP2673927A4 (en) 2011-02-08 2016-08-24 Sierra Wireless Inc Method and system for forwarding data between network devices
US9213421B2 (en) 2011-02-28 2015-12-15 Blackberry Limited Electronic device and method of displaying information in response to detecting a gesture
US9262612B2 (en) 2011-03-21 2016-02-16 Apple Inc. Device access using voice authentication
US20120259806A1 (en) * 2011-04-11 2012-10-11 Balakumaran Balabaskaran User as a Service
US9329832B2 (en) * 2011-05-09 2016-05-03 Robert Allen Blaisch Voice internet system and method
US20140044123A1 (en) * 2011-05-23 2014-02-13 Twilio, Inc. System and method for real time communicating with a client application
US9398622B2 (en) 2011-05-23 2016-07-19 Twilio, Inc. System and method for connecting a communication to a client
US10057736B2 (en) 2011-06-03 2018-08-21 Apple Inc. Active transport based notifications
US8572194B2 (en) * 2011-06-10 2013-10-29 Microsoft Corporation Selective linking of message accounts
US10078819B2 (en) 2011-06-21 2018-09-18 Oath Inc. Presenting favorite contacts information to a user of a computing device
US9747583B2 (en) 2011-06-30 2017-08-29 Yahoo Holdings, Inc. Presenting entity profile information to a user of a computing device
US9285966B2 (en) * 2011-07-18 2016-03-15 Verizon Patent And Licensing Inc. Message notification system
US8819704B1 (en) * 2011-08-05 2014-08-26 Google Inc. Personalized availability characterization of online application services
US8994660B2 (en) 2011-08-29 2015-03-31 Apple Inc. Text correction processing
US20130086495A1 (en) * 2011-10-04 2013-04-04 Sap Portals Israel Ltd Managing Social Suggestions in a Contextual Workspace
US9218189B2 (en) 2011-10-04 2015-12-22 Sap Portals Israel Ltd Managing a contextual workspace
US9213954B2 (en) 2011-10-06 2015-12-15 Sap Portals Israel Ltd Suggesting data in a contextual workspace
US9245245B2 (en) 2011-10-06 2016-01-26 Sap Portals Israel Ltd Managing semantic data in a contextual workspace
US8515029B2 (en) 2011-11-02 2013-08-20 At&T Intellectual Property I, L.P. System and method for visual voice mail in an LTE environment
US8489075B2 (en) 2011-11-16 2013-07-16 At&T Intellectual Property I, L.P. System and method for augmenting features of visual voice mail
US9042527B2 (en) 2011-10-17 2015-05-26 At&T Intellectual Property I, L.P. Visual voice mail delivery mechanisms
US9025739B2 (en) 2011-10-20 2015-05-05 At&T Intellectual Property I, L.P. System and method for visual voice mail in a multi-screen environment
US9282185B2 (en) 2011-10-17 2016-03-08 At&T Intellectual Property I, L.P. System and method for callee-caller specific greetings for voice mail
US9515976B2 (en) * 2011-12-19 2016-12-06 Facebook, Inc. Proxied outgoing message transmission
US9619038B2 (en) 2012-01-23 2017-04-11 Blackberry Limited Electronic device and method of displaying a cover image and an application image from a low power condition
US9058168B2 (en) 2012-01-23 2015-06-16 Blackberry Limited Electronic device and method of controlling a display
US10134385B2 (en) 2012-03-02 2018-11-20 Apple Inc. Systems and methods for name pronunciation
US9483461B2 (en) 2012-03-06 2016-11-01 Apple Inc. Handling speech synthesis of content for multiple languages
US10977285B2 (en) 2012-03-28 2021-04-13 Verizon Media Inc. Using observations of a person to determine if data corresponds to the person
US9280610B2 (en) 2012-05-14 2016-03-08 Apple Inc. Crowd sourcing information to fulfill user requests
US9721563B2 (en) 2012-06-08 2017-08-01 Apple Inc. Name recognition system
US9495129B2 (en) 2012-06-29 2016-11-15 Apple Inc. Device, method, and user interface for voice-activated navigation and browsing of a document
US9576574B2 (en) 2012-09-10 2017-02-21 Apple Inc. Context-sensitive handling of interruptions by intelligent digital assistant
US9547647B2 (en) 2012-09-19 2017-01-17 Apple Inc. Voice-based media searching
US10013672B2 (en) 2012-11-02 2018-07-03 Oath Inc. Address extraction from a communication
US20140129961A1 (en) * 2012-11-07 2014-05-08 Sergey Mikhailovich Zubarev Tool for managing user task information
US20140136938A1 (en) * 2012-11-09 2014-05-15 Microsoft Corporation List management in a document management system
US9575633B2 (en) * 2012-12-04 2017-02-21 Ca, Inc. User interface utility across service providers
US10192200B2 (en) 2012-12-04 2019-01-29 Oath Inc. Classifying a portion of user contact data into local contacts
EP2954514B1 (en) 2013-02-07 2021-03-31 Apple Inc. Voice trigger for a digital assistant
US10346411B1 (en) * 2013-03-14 2019-07-09 Google Llc Automatic target audience suggestions when sharing in a social network
US9368114B2 (en) 2013-03-14 2016-06-14 Apple Inc. Context-sensitive handling of interruptions
US9690476B2 (en) 2013-03-14 2017-06-27 Blackberry Limited Electronic device and method of displaying information in response to a gesture
WO2014145900A2 (en) 2013-03-15 2014-09-18 Broadridge Fluent Solutions, Llc Communication exchanges and methods of use thereof
WO2014144579A1 (en) 2013-03-15 2014-09-18 Apple Inc. System and method for updating an adaptive speech recognition model
AU2014233517B2 (en) 2013-03-15 2017-05-25 Apple Inc. Training an at least partial voice command system
US9507495B2 (en) 2013-04-03 2016-11-29 Blackberry Limited Electronic device and method of displaying information in response to a gesture
WO2014197336A1 (en) 2013-06-07 2014-12-11 Apple Inc. System and method for detecting errors in interactions with a voice-based digital assistant
US9582608B2 (en) 2013-06-07 2017-02-28 Apple Inc. Unified ranking with entropy-weighted information for phrase-based semantic auto-completion
WO2014197334A2 (en) 2013-06-07 2014-12-11 Apple Inc. System and method for user-specified pronunciation of words for speech synthesis and recognition
WO2014197335A1 (en) 2013-06-08 2014-12-11 Apple Inc. Interpreting and acting upon commands that involve sharing information with remote devices
US10176167B2 (en) 2013-06-09 2019-01-08 Apple Inc. System and method for inferring user intent from speech inputs
WO2014200728A1 (en) 2013-06-09 2014-12-18 Apple Inc. Device, method, and graphical user interface for enabling conversation persistence across two or more instances of a digital assistant
AU2014278595B2 (en) 2013-06-13 2017-04-06 Apple Inc. System and method for emergency calls initiated by voice command
KR101749009B1 (en) 2013-08-06 2017-06-19 애플 인크. Auto-activating smart responses based on activities from remote devices
US9426289B2 (en) * 2013-09-12 2016-08-23 Avaya Inc. Techniques for topical customer service menu reconfiguration based on social media
CN104679399B (en) * 2013-12-02 2018-06-01 联想(北京)有限公司 The method and electronic equipment of a kind of information processing
US9973455B1 (en) * 2016-03-31 2018-05-15 HCA Holdings, Inc. Message customization and routing
US10542004B1 (en) 2014-02-24 2020-01-21 C/Hca, Inc. Providing notifications to authorized users
US9413707B2 (en) 2014-04-11 2016-08-09 ACR Development, Inc. Automated user task management
US8942727B1 (en) 2014-04-11 2015-01-27 ACR Development, Inc. User Location Tracking
US9620105B2 (en) 2014-05-15 2017-04-11 Apple Inc. Analyzing audio input for efficient speech and music recognition
US10592095B2 (en) 2014-05-23 2020-03-17 Apple Inc. Instantaneous speaking of content on touch devices
US9502031B2 (en) 2014-05-27 2016-11-22 Apple Inc. Method for supporting dynamic grammars in WFST-based ASR
US9842101B2 (en) 2014-05-30 2017-12-12 Apple Inc. Predictive conversion of language input
US10170123B2 (en) 2014-05-30 2019-01-01 Apple Inc. Intelligent assistant for home automation
US10289433B2 (en) 2014-05-30 2019-05-14 Apple Inc. Domain specific language for encoding assistant dialog
US9715875B2 (en) 2014-05-30 2017-07-25 Apple Inc. Reducing the need for manual start/end-pointing and trigger phrases
US9760559B2 (en) 2014-05-30 2017-09-12 Apple Inc. Predictive text input
US9430463B2 (en) 2014-05-30 2016-08-30 Apple Inc. Exemplar-based natural language processing
US10078631B2 (en) 2014-05-30 2018-09-18 Apple Inc. Entropy-guided text prediction using combined word and character n-gram language models
US9633004B2 (en) 2014-05-30 2017-04-25 Apple Inc. Better resolution when referencing to concepts
US9966065B2 (en) 2014-05-30 2018-05-08 Apple Inc. Multi-command single utterance input method
US9785630B2 (en) 2014-05-30 2017-10-10 Apple Inc. Text prediction using combined word N-gram and unigram language models
US9734193B2 (en) 2014-05-30 2017-08-15 Apple Inc. Determining domain salience ranking from ambiguous words in natural speech
US10659851B2 (en) 2014-06-30 2020-05-19 Apple Inc. Real-time digital assistant knowledge updates
US9338493B2 (en) 2014-06-30 2016-05-10 Apple Inc. Intelligent automated assistant for TV user interactions
US10446141B2 (en) 2014-08-28 2019-10-15 Apple Inc. Automatic speech recognition based on user feedback
WO2016036509A1 (en) 2014-09-02 2016-03-10 Apple Inc. Electronic mail user interface
US9818400B2 (en) 2014-09-11 2017-11-14 Apple Inc. Method and apparatus for discovering trending terms in speech requests
US10789041B2 (en) 2014-09-12 2020-09-29 Apple Inc. Dynamic thresholds for always listening speech trigger
US10074360B2 (en) 2014-09-30 2018-09-11 Apple Inc. Providing an indication of the suitability of speech recognition
US10127911B2 (en) 2014-09-30 2018-11-13 Apple Inc. Speaker identification and unsupervised speaker adaptation techniques
US9646609B2 (en) 2014-09-30 2017-05-09 Apple Inc. Caching apparatus for serving phonetic pronunciations
US9886432B2 (en) 2014-09-30 2018-02-06 Apple Inc. Parsimonious handling of word inflection via categorical stem + suffix N-gram language models
US9668121B2 (en) 2014-09-30 2017-05-30 Apple Inc. Social reminders
KR101966268B1 (en) * 2014-11-04 2019-04-05 후아웨이 테크놀러지 컴퍼니 리미티드 Message display method, apparatus and device
US10552013B2 (en) 2014-12-02 2020-02-04 Apple Inc. Data detection
US9711141B2 (en) 2014-12-09 2017-07-18 Apple Inc. Disambiguating heteronyms in speech synthesis
US10326748B1 (en) 2015-02-25 2019-06-18 Quest Software Inc. Systems and methods for event-based authentication
US9865280B2 (en) 2015-03-06 2018-01-09 Apple Inc. Structured dictation using intelligent automated assistants
US9886953B2 (en) 2015-03-08 2018-02-06 Apple Inc. Virtual assistant activation
US10567477B2 (en) 2015-03-08 2020-02-18 Apple Inc. Virtual assistant continuity
US9721566B2 (en) 2015-03-08 2017-08-01 Apple Inc. Competing devices responding to voice triggers
US10417613B1 (en) 2015-03-17 2019-09-17 Quest Software Inc. Systems and methods of patternizing logged user-initiated events for scheduling functions
US9899019B2 (en) 2015-03-18 2018-02-20 Apple Inc. Systems and methods for structured stem and suffix language models
US10817919B1 (en) * 2015-03-24 2020-10-27 Amazon Technologies, Inc. Providing asynchronous application store event notifications
US9842105B2 (en) 2015-04-16 2017-12-12 Apple Inc. Parsimonious continuous-space phrase representations for natural language processing
US10083688B2 (en) 2015-05-27 2018-09-25 Apple Inc. Device voice control for selecting a displayed affordance
US10127220B2 (en) 2015-06-04 2018-11-13 Apple Inc. Language identification from short strings
US9578173B2 (en) 2015-06-05 2017-02-21 Apple Inc. Virtual assistant aided communication with 3rd party service in a communication session
US10101822B2 (en) 2015-06-05 2018-10-16 Apple Inc. Language input correction
US11025565B2 (en) 2015-06-07 2021-06-01 Apple Inc. Personalized prediction of responses for instant messaging
US10255907B2 (en) 2015-06-07 2019-04-09 Apple Inc. Automatic accent detection using acoustic models
US10186254B2 (en) 2015-06-07 2019-01-22 Apple Inc. Context-based endpoint detection
US10536352B1 (en) 2015-08-05 2020-01-14 Quest Software Inc. Systems and methods for tuning cross-platform data collection
US10747498B2 (en) 2015-09-08 2020-08-18 Apple Inc. Zero latency digital assistant
US10671428B2 (en) 2015-09-08 2020-06-02 Apple Inc. Distributed personal assistant
CA2941950A1 (en) * 2015-09-21 2017-03-21 Wal-Mart Stores, Inc. Adjustable interactive voice response system
US9697820B2 (en) 2015-09-24 2017-07-04 Apple Inc. Unit-selection text-to-speech synthesis using concatenation-sensitive neural networks
US11010550B2 (en) 2015-09-29 2021-05-18 Apple Inc. Unified language modeling framework for word prediction, auto-completion and auto-correction
US10366158B2 (en) 2015-09-29 2019-07-30 Apple Inc. Efficient word encoding for recurrent neural network language models
US11587559B2 (en) 2015-09-30 2023-02-21 Apple Inc. Intelligent device identification
US10691473B2 (en) 2015-11-06 2020-06-23 Apple Inc. Intelligent automated assistant in a messaging environment
US9729733B2 (en) * 2015-11-30 2017-08-08 Kyocera Document Solutions Inc. Electronic document file acquisition representing apparatus, electronic document file acquisition representing method and recording medium
US10049668B2 (en) 2015-12-02 2018-08-14 Apple Inc. Applying neural network language models to weighted finite state transducers for automatic speech recognition
US20170169393A1 (en) * 2015-12-11 2017-06-15 Prakash Vasa Method of managing user contacts and associations between the user contacts
US10324699B2 (en) * 2015-12-15 2019-06-18 International Business Machines Corporation Enhanceable cross-domain rules engine for unmatched registry entries filtering
US10223066B2 (en) 2015-12-23 2019-03-05 Apple Inc. Proactive assistance based on dialog communication between devices
US10446143B2 (en) 2016-03-14 2019-10-15 Apple Inc. Identification of voice inputs providing credentials
US10795947B2 (en) 2016-05-17 2020-10-06 Google Llc Unified message search
US9934775B2 (en) 2016-05-26 2018-04-03 Apple Inc. Unit-selection text-to-speech synthesis based on predicted concatenation parameters
US9972304B2 (en) 2016-06-03 2018-05-15 Apple Inc. Privacy preserving distributed evaluation framework for embedded personalized systems
US10249300B2 (en) 2016-06-06 2019-04-02 Apple Inc. Intelligent list reading
US10049663B2 (en) 2016-06-08 2018-08-14 Apple, Inc. Intelligent automated assistant for media exploration
DK179309B1 (en) 2016-06-09 2018-04-23 Apple Inc Intelligent automated assistant in a home environment
US10067938B2 (en) 2016-06-10 2018-09-04 Apple Inc. Multilingual word prediction
US10586535B2 (en) 2016-06-10 2020-03-10 Apple Inc. Intelligent digital assistant in a multi-tasking environment
US10490187B2 (en) 2016-06-10 2019-11-26 Apple Inc. Digital assistant providing automated status report
US10192552B2 (en) 2016-06-10 2019-01-29 Apple Inc. Digital assistant providing whispered speech
US10509862B2 (en) 2016-06-10 2019-12-17 Apple Inc. Dynamic phrase expansion of language input
DK179415B1 (en) 2016-06-11 2018-06-14 Apple Inc Intelligent device arbitration and control
DK179343B1 (en) 2016-06-11 2018-05-14 Apple Inc Intelligent task discovery
DK201670540A1 (en) 2016-06-11 2018-01-08 Apple Inc Application integration with a digital assistant
DK179049B1 (en) 2016-06-11 2017-09-18 Apple Inc Data driven natural language event detection and classification
US10657098B2 (en) * 2016-07-08 2020-05-19 International Business Machines Corporation Automatically reorganize folder/file visualizations based on natural language-derived intent
US10043516B2 (en) 2016-09-23 2018-08-07 Apple Inc. Intelligent automated assistant
US10593346B2 (en) 2016-12-22 2020-03-17 Apple Inc. Rank-reduced token representation for automatic speech recognition
DK201770439A1 (en) 2017-05-11 2018-12-13 Apple Inc. Offline personal assistant
DK179496B1 (en) 2017-05-12 2019-01-15 Apple Inc. USER-SPECIFIC Acoustic Models
DK179745B1 (en) 2017-05-12 2019-05-01 Apple Inc. SYNCHRONIZATION AND TASK DELEGATION OF A DIGITAL ASSISTANT
DK201770431A1 (en) 2017-05-15 2018-12-20 Apple Inc. Optimizing dialogue policy decisions for digital assistants using implicit feedback
DK201770432A1 (en) 2017-05-15 2018-12-21 Apple Inc. Hierarchical belief states for digital assistants
DK179560B1 (en) 2017-05-16 2019-02-18 Apple Inc. Far-field extension for digital assistant services
US10728190B2 (en) * 2017-06-29 2020-07-28 Salesforce.Com, Inc. Form based user interactions via messaging channels
US20190068533A1 (en) * 2017-08-28 2019-02-28 Microsoft Technology Licensing, Llc Acquiring attachments from data storage providers for use in electronic communications
US10437931B1 (en) * 2018-03-23 2019-10-08 Abbyy Production Llc Information extraction from natural language texts
US11539817B1 (en) 2018-09-27 2022-12-27 C/Hca, Inc. Adaptive authentication and notification system
US10776137B2 (en) * 2018-11-21 2020-09-15 International Business Machines Corporation Decluttering a computer device desktop
US10924442B2 (en) * 2019-03-05 2021-02-16 Capital One Services, Llc Conversation agent for collaborative search engine
US11537997B2 (en) * 2019-07-18 2022-12-27 Microsoft Technology Licensing, Llc Providing task assistance to a user
US11036802B2 (en) 2019-08-05 2021-06-15 Morgan Stanley Services Group Inc. Classification rules engine and API generator
US20210097498A1 (en) * 2019-09-26 2021-04-01 Sap Se Email enabled updates of database time records
US11119759B2 (en) 2019-12-18 2021-09-14 Bank Of America Corporation Self-learning code conflict resolution tool
US11611519B1 (en) * 2021-09-02 2023-03-21 Slack Technologies, Llc Event trigger visibility within a group-based communication system

Citations (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5872928A (en) * 1995-02-24 1999-02-16 Cabletron Systems, Inc. Method and apparatus for defining and enforcing policies for configuration management in communications networks
US5889953A (en) * 1995-05-25 1999-03-30 Cabletron Systems, Inc. Policy management and conflict resolution in computer networks
US6167445A (en) * 1998-10-26 2000-12-26 Cisco Technology, Inc. Method and apparatus for defining and implementing high-level quality of service policies in computer networks
US6233318B1 (en) * 1996-11-05 2001-05-15 Comverse Network Systems, Inc. System for accessing multimedia mailboxes and messages over the internet and via telephone
US6256389B1 (en) * 1998-04-23 2001-07-03 Nortel Networks Limited Integrated telecommunication collaboration system
US6271778B1 (en) * 2000-01-15 2001-08-07 Cirrus Logic, Inc. High pass filtering with automatic phase equalization
US6282565B1 (en) * 1998-11-17 2001-08-28 Kana Communications, Inc. Method and apparatus for performing enterprise email management
US20010039576A1 (en) * 1999-12-10 2001-11-08 Yasusi Kanada Network policy transmission method from policy server to network node
US20020023061A1 (en) * 1998-06-25 2002-02-21 Stewart Lorna Ruthstrobel Possibilistic expert systems and process control utilizing fuzzy logic
US6381639B1 (en) * 1995-05-25 2002-04-30 Aprisma Management Technologies, Inc. Policy management and conflict resolution in computer networks
US6393473B1 (en) * 1998-12-18 2002-05-21 Cisco Technology, Inc. Representing and verifying network management policies using collective constraints
US6466654B1 (en) * 2000-03-06 2002-10-15 Avaya Technology Corp. Personal virtual assistant with semantic tagging
US20030033421A1 (en) * 2001-08-02 2003-02-13 Amplify.Net, Inc. Method for ascertaining network bandwidth allocation policy associated with application port numbers
US6606610B1 (en) * 1999-07-09 2003-08-12 Mitel Corporation Feature interaction resolution using fuzzy rules
US6611498B1 (en) * 1997-09-26 2003-08-26 Worldcom, Inc. Integrated customer web station for web based call management
US6661877B1 (en) * 2000-09-29 2003-12-09 Oracle International Corporation System and method for providing access to a unified message store logically storing computer telephony messages
US6704303B1 (en) * 1999-06-02 2004-03-09 Accenture Llp IP/telephony user interface for a hybrid communication system
US6711154B1 (en) * 1999-01-29 2004-03-23 Microsoft Corporation Apparatus and method for device independent messaging notification
US6738373B2 (en) * 2002-02-11 2004-05-18 Qualcomm Incorporated Wireless communication device operable on different types of communication networks
US6760412B1 (en) * 1999-12-21 2004-07-06 Nortel Networks Limited Remote reminder of scheduled events
US6760420B2 (en) * 2000-06-14 2004-07-06 Securelogix Corporation Telephony security system
US6839735B2 (en) * 2000-02-29 2005-01-04 Microsoft Corporation Methods and systems for controlling access to presence information according to a variety of different access permission types
US6941326B2 (en) * 2001-01-24 2005-09-06 Microsoft Corporation Accounting for update notifications in synchronizing data that may be represented by different data structures
US6978276B2 (en) * 2002-03-21 2005-12-20 International Business Machines Corporation Method and system for detaching files to a specified location
US6983308B1 (en) * 1998-11-19 2006-01-03 Openwave Systems, Inc. Mail synchronization of remote and local mail systems
US6993522B2 (en) * 2001-06-27 2006-01-31 Microsoft Corporation System and method for resolving conflicts detected during a synchronization session
US7065188B1 (en) * 1999-10-19 2006-06-20 International Business Machines Corporation System and method for personalizing dialogue menu for an interactive voice response system
US7197130B2 (en) * 2004-10-05 2007-03-27 Sbc Knowledge Ventures, L.P. Dynamic load balancing between multiple locations with different telephony system
US7219131B2 (en) * 2003-01-16 2007-05-15 Ironport Systems, Inc. Electronic message delivery using an alternate source approach
US7240095B1 (en) * 2002-02-22 2007-07-03 Bellsouth Intellectual Property Corporation Electronic mail notification
US7260537B2 (en) * 2003-03-25 2007-08-21 International Business Machines Corporation Disambiguating results within a speech based IVR session
US7272633B2 (en) * 2001-09-28 2007-09-18 At&T Bls Intellectual Property, Inc. Methods and systems for a communications and information resource manager

Family Cites Families (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167439A (en) * 1988-05-27 2000-12-26 Kodak Limited Data retrieval, manipulation and transmission with facsimile images
US5249260A (en) * 1988-08-12 1993-09-28 Hitachi, Ltd. Data input system
US5673403A (en) * 1992-11-13 1997-09-30 International Business Machines Corporation Method and system for displaying applications of different operating systems on a single system using the user interface of the different operating systems
US5720023A (en) * 1994-03-28 1998-02-17 British Telecommnications Public Limited Company Appartus and method for storing diagram data
US5742905A (en) * 1994-09-19 1998-04-21 Bell Communications Research, Inc. Personal communications internetworking
US6182121B1 (en) * 1995-02-03 2001-01-30 Enfish, Inc. Method and apparatus for a physical storage architecture having an improved information storage and retrieval system for a shared file environment
JPH10501086A (en) * 1995-11-02 1998-01-27 インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン Storage plane organization and storage system based thereon
US5930474A (en) * 1996-01-31 1999-07-27 Z Land Llc Internet organizer for accessing geographically and topically based information
US6072942A (en) * 1996-09-18 2000-06-06 Secure Computing Corporation System and method of electronic mail filtering using interconnected nodes
US5917489A (en) * 1997-01-31 1999-06-29 Microsoft Corporation System and method for creating, editing, and distributing rules for processing electronic messages
US6058435A (en) * 1997-02-04 2000-05-02 Siemens Information And Communications Networks, Inc. Apparatus and methods for responding to multimedia communications based on content analysis
US5940821A (en) * 1997-05-21 1999-08-17 Oracle Corporation Information presentation in a knowledge base search and retrieval system
US6356530B1 (en) * 1997-05-23 2002-03-12 Cisco Technology, Inc. Next hop selection in ATM networks
US6288726B1 (en) * 1997-06-27 2001-09-11 Microsoft Corporation Method for rendering glyphs using a layout services library
US6073165A (en) * 1997-07-29 2000-06-06 Jfax Communications, Inc. Filtering computer network messages directed to a user's e-mail box based on user defined filters, and forwarding a filtered message to the user's receiver
US6062862A (en) * 1997-11-12 2000-05-16 Koskinen; Robin S. Financial services product training apparatus and method related thereto
US6055505A (en) * 1997-12-30 2000-04-25 U S West, Inc. Automatic customer notification system and method
US6067539A (en) * 1998-03-02 2000-05-23 Vigil, Inc. Intelligent information retrieval system
US6212548B1 (en) * 1998-07-30 2001-04-03 At & T Corp System and method for multiple asynchronous text chat conversations
US7509349B2 (en) * 1998-10-01 2009-03-24 Onepin, Inc. Method and apparatus for storing and retrieving business contact information in a computer system
US6389735B1 (en) * 1999-03-03 2002-05-21 Steven P. Holt Method and apparatus for modifying the behavior of aquatic species with electrical fields
US6341282B1 (en) * 1999-04-19 2002-01-22 Electronic Data Systems Corporation Information retrieval system and method
US6213548B1 (en) * 1999-08-12 2001-04-10 Trw Inc. Head restraint apparatus
US20020112007A1 (en) * 1999-11-03 2002-08-15 Christopher (Noah) Wood Personal message management system
US20030087665A1 (en) * 1999-12-13 2003-05-08 Tokkonen Timo Tapani Reminder function for mobile communication device
US7246370B2 (en) * 2000-01-07 2007-07-17 Security, Inc. PDstudio design system and method
GB0005365D0 (en) * 2000-03-06 2000-04-26 Mitel Corp Timed schedule reminder via telephone
US6778643B1 (en) * 2000-03-21 2004-08-17 Sbc Technology Resources, Inc. Interface and method of designing an interface
AU2001253889A1 (en) * 2000-04-12 2001-10-30 Yourdoctor.Com An information navigation system and method for using the same
US7058516B2 (en) * 2000-06-30 2006-06-06 Bioexpertise, Inc. Computer implemented searching using search criteria comprised of ratings prepared by leading practitioners in biomedical specialties
CA2416253A1 (en) * 2000-07-28 2002-02-07 American Calcar Inc. Technique for effective organization and communication of information
US20020067714A1 (en) * 2000-09-28 2002-06-06 Crain Louis M. System and method for wide area network and telco infrastructure integration
WO2002028079A2 (en) * 2000-09-28 2002-04-04 Accessline Communications Corporation User configurable system for handling incoming calls to users having multiple destinations adresses
WO2002039305A1 (en) * 2000-11-09 2002-05-16 Sri International Information management via delegated control
US6842588B2 (en) * 2000-12-08 2005-01-11 Hewlett-Packard Development Company, L.P. Consumables/printer management system with task and calendar links
US8112544B2 (en) * 2000-12-29 2012-02-07 International Business Machines Corporation System and method for providing customizable options on a wireless device
US20020152272A1 (en) * 2001-04-12 2002-10-17 Rahav Yairi Method for managing multiple dynamic e-mail aliases
US20020184317A1 (en) * 2001-05-29 2002-12-05 Sun Microsystems, Inc. System and method for searching, retrieving and displaying data from an email storage location
US7334000B2 (en) * 2001-07-16 2008-02-19 Aol Llc Method and apparatus for calendaring reminders
US6488115B1 (en) * 2001-08-01 2002-12-03 Delphi Technologies, Inc. Apparatus and method for steering a vehicle
US20050022114A1 (en) * 2001-08-13 2005-01-27 Xerox Corporation Meta-document management system with personality identifiers
US20040205648A1 (en) * 2001-08-17 2004-10-14 David Tinsley Systems and methods for authoring content
US7246060B2 (en) * 2001-11-06 2007-07-17 Microsoft Corporation Natural input recognition system and method using a contextual mapping engine and adaptive user bias
GB2384583A (en) * 2002-01-29 2003-07-30 Inventec Corp System and method for managing mail and files
US20030172118A1 (en) * 2002-03-05 2003-09-11 International Business Machines Corporation Method and apparatus for providing post office protocol 3 support for limited storage devices
US20030182234A1 (en) * 2002-03-22 2003-09-25 John Degroot Method and system for document presentment between generic publishers and generic subscribers
US20030187937A1 (en) * 2002-03-28 2003-10-02 Yao Timothy Hun-Jen Using fuzzy-neural systems to improve e-mail handling efficiency
US20030187967A1 (en) * 2002-03-28 2003-10-02 Compaq Information Method and apparatus to estimate downtime and cost of downtime in an information technology infrastructure
US20030236652A1 (en) * 2002-05-31 2003-12-25 Battelle System and method for anomaly detection
US7522910B2 (en) * 2002-05-31 2009-04-21 Oracle International Corporation Method and apparatus for controlling data provided to a mobile device
CA2398103A1 (en) * 2002-08-14 2004-02-14 March Networks Corporation Multi-dimensional table filtering system
US20040068543A1 (en) * 2002-10-03 2004-04-08 Ralph Seifert Method and apparatus for processing e-mail
US7123696B2 (en) * 2002-10-04 2006-10-17 Frederick Lowe Method and apparatus for generating and distributing personalized media clips
US7142645B2 (en) * 2002-10-04 2006-11-28 Frederick Lowe System and method for generating and distributing personalized media
US20040068545A1 (en) * 2002-10-08 2004-04-08 Bellsouth Intellectual Property Corporation Displaying and working with email attachments
US20040128355A1 (en) * 2002-12-25 2004-07-01 Kuo-Jen Chao Community-based message classification and self-amending system for a messaging system
EP1443426A1 (en) * 2003-01-29 2004-08-04 Hewlett-Packard Company (a Delaware corporation) Process for searching a repository
US20040158610A1 (en) * 2003-02-10 2004-08-12 Davis Joel A. Client proxying for instant messaging
US7298833B2 (en) * 2004-09-29 2007-11-20 Avaya Integrated Cabinet Solutions, Inc. Wireless device to manage cross-network telecommunication services

Patent Citations (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5872928A (en) * 1995-02-24 1999-02-16 Cabletron Systems, Inc. Method and apparatus for defining and enforcing policies for configuration management in communications networks
US6381639B1 (en) * 1995-05-25 2002-04-30 Aprisma Management Technologies, Inc. Policy management and conflict resolution in computer networks
US5889953A (en) * 1995-05-25 1999-03-30 Cabletron Systems, Inc. Policy management and conflict resolution in computer networks
US6233318B1 (en) * 1996-11-05 2001-05-15 Comverse Network Systems, Inc. System for accessing multimedia mailboxes and messages over the internet and via telephone
US6611498B1 (en) * 1997-09-26 2003-08-26 Worldcom, Inc. Integrated customer web station for web based call management
US6256389B1 (en) * 1998-04-23 2001-07-03 Nortel Networks Limited Integrated telecommunication collaboration system
US20020023061A1 (en) * 1998-06-25 2002-02-21 Stewart Lorna Ruthstrobel Possibilistic expert systems and process control utilizing fuzzy logic
US6167445A (en) * 1998-10-26 2000-12-26 Cisco Technology, Inc. Method and apparatus for defining and implementing high-level quality of service policies in computer networks
US6282565B1 (en) * 1998-11-17 2001-08-28 Kana Communications, Inc. Method and apparatus for performing enterprise email management
US6983308B1 (en) * 1998-11-19 2006-01-03 Openwave Systems, Inc. Mail synchronization of remote and local mail systems
US6393473B1 (en) * 1998-12-18 2002-05-21 Cisco Technology, Inc. Representing and verifying network management policies using collective constraints
US6711154B1 (en) * 1999-01-29 2004-03-23 Microsoft Corporation Apparatus and method for device independent messaging notification
US6704303B1 (en) * 1999-06-02 2004-03-09 Accenture Llp IP/telephony user interface for a hybrid communication system
US6606610B1 (en) * 1999-07-09 2003-08-12 Mitel Corporation Feature interaction resolution using fuzzy rules
US7065188B1 (en) * 1999-10-19 2006-06-20 International Business Machines Corporation System and method for personalizing dialogue menu for an interactive voice response system
US20010039576A1 (en) * 1999-12-10 2001-11-08 Yasusi Kanada Network policy transmission method from policy server to network node
US6760412B1 (en) * 1999-12-21 2004-07-06 Nortel Networks Limited Remote reminder of scheduled events
US6271778B1 (en) * 2000-01-15 2001-08-07 Cirrus Logic, Inc. High pass filtering with automatic phase equalization
US6839735B2 (en) * 2000-02-29 2005-01-04 Microsoft Corporation Methods and systems for controlling access to presence information according to a variety of different access permission types
US6466654B1 (en) * 2000-03-06 2002-10-15 Avaya Technology Corp. Personal virtual assistant with semantic tagging
US6760420B2 (en) * 2000-06-14 2004-07-06 Securelogix Corporation Telephony security system
US6661877B1 (en) * 2000-09-29 2003-12-09 Oracle International Corporation System and method for providing access to a unified message store logically storing computer telephony messages
US6941326B2 (en) * 2001-01-24 2005-09-06 Microsoft Corporation Accounting for update notifications in synchronizing data that may be represented by different data structures
US6993522B2 (en) * 2001-06-27 2006-01-31 Microsoft Corporation System and method for resolving conflicts detected during a synchronization session
US20030033421A1 (en) * 2001-08-02 2003-02-13 Amplify.Net, Inc. Method for ascertaining network bandwidth allocation policy associated with application port numbers
US7272633B2 (en) * 2001-09-28 2007-09-18 At&T Bls Intellectual Property, Inc. Methods and systems for a communications and information resource manager
US6738373B2 (en) * 2002-02-11 2004-05-18 Qualcomm Incorporated Wireless communication device operable on different types of communication networks
US7240095B1 (en) * 2002-02-22 2007-07-03 Bellsouth Intellectual Property Corporation Electronic mail notification
US6978276B2 (en) * 2002-03-21 2005-12-20 International Business Machines Corporation Method and system for detaching files to a specified location
US7219131B2 (en) * 2003-01-16 2007-05-15 Ironport Systems, Inc. Electronic message delivery using an alternate source approach
US7260537B2 (en) * 2003-03-25 2007-08-21 International Business Machines Corporation Disambiguating results within a speech based IVR session
US7197130B2 (en) * 2004-10-05 2007-03-27 Sbc Knowledge Ventures, L.P. Dynamic load balancing between multiple locations with different telephony system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090287613A1 (en) * 2005-06-07 2009-11-19 Michele Pierdinock Automated actions based on restrictions
US7636686B2 (en) * 2005-06-07 2009-12-22 Checkfree Corporation Automated actions based on restrictions
US7930239B2 (en) 2005-06-07 2011-04-19 Checkfree Corporation Automated actions based on restrictions
US20060277127A1 (en) * 2005-06-07 2006-12-07 Checkfree Corporation Automated actions based on restrictions
US20090295540A1 (en) * 2008-05-30 2009-12-03 Oki Data Corporation Facsimile machine, facsimile notification system, and communication terminal device
US8253984B2 (en) * 2008-05-30 2012-08-28 Oki Data Corporation Facsimile machine, facsimile notification system, and communication terminal device
US20100222027A1 (en) * 2009-02-27 2010-09-02 Research In Motion Limited Communications system providing mobile device notification content type selection features and related methods
US8463242B2 (en) * 2009-02-27 2013-06-11 Research In Motion Limited Communications system providing mobile device notification content type selection features and related methods
EP2360907B1 (en) * 2010-01-15 2019-09-04 J2 Global IP Limited Secure transmission method using a fax server, computer system and program for implementing said method
US20140134979A1 (en) * 2012-11-14 2014-05-15 Apple Inc. Integrated Approach for Visual Dialing
US9894462B2 (en) * 2012-11-14 2018-02-13 Apple Inc. Integrated approach for visual dialing
US20170063761A1 (en) * 2015-08-29 2017-03-02 Sysu Huadu Industrial Science And Technology Institute Accessing Computers via Text Messages
US20190379615A1 (en) * 2018-06-08 2019-12-12 Capital One Services, Llc System and Method for Proactive Intervention to Reduce High Cost Channel Usage
US10680979B2 (en) * 2018-06-08 2020-06-09 Capital One Services, Llc System and method for proactive intervention to reduce high cost channel usage
US11456977B2 (en) 2018-06-08 2022-09-27 Capital One Services, Llc System and method for proactive intervention to reduce high cost channel usage
US11784947B2 (en) 2018-06-08 2023-10-10 Capital One Services, Llc System and method for proactive intervention to reduce high cost channel usage

Also Published As

Publication number Publication date
US20050076095A1 (en) 2005-04-07
WO2005008432A2 (en) 2005-01-27
EP1656620A2 (en) 2006-05-17
US20050172033A1 (en) 2005-08-04
US20050060638A1 (en) 2005-03-17
US20050114462A1 (en) 2005-05-26
US20050076109A1 (en) 2005-04-07
US20050068980A1 (en) 2005-03-31
US20050074113A1 (en) 2005-04-07
US20050108341A1 (en) 2005-05-19
US20050114456A1 (en) 2005-05-26
US20050076110A1 (en) 2005-04-07
WO2005008432A3 (en) 2005-08-04
US20050083915A1 (en) 2005-04-21
US7484213B2 (en) 2009-01-27

Similar Documents

Publication Publication Date Title
US20050055433A1 (en) System and method for advanced rule creation and management within an integrated virtual workspace
US7027463B2 (en) System and method for multi-tiered rule filtering
US20060031340A1 (en) Apparatus and method for advanced attachment filtering within an integrated messaging platform
US8068588B2 (en) Unified rules for voice and messaging
CN101711469B (en) Voicemail filtering and transcription
US8122097B2 (en) System, method and computer program for recipient controlled communications
RU2459379C2 (en) Mechanism to distribute voice call using e-mail distribution groups
CN101730879B (en) Voicemail filtering and transcription
US20030105827A1 (en) Method and system for contextual prioritization of unified messages
US7774823B2 (en) System and method for managing electronic communications
US8161531B2 (en) System and method for managing electronic communications
US11368580B2 (en) Smart handling of call redirection based on the out-of-office message of the user
US20210051232A1 (en) Call routing to convert synchronous landline voice communcations into asynchronous bidirectional text messaging

Legal Events

Date Code Title Description
AS Assignment

Owner name: SONOLINK COMMUNICATIONS SYSTEMS, LLC, DISTRICT OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MATHEW, BOBAN;JOHN, THOMAS;EVANS, DAGNY;REEL/FRAME:015393/0671;SIGNING DATES FROM 20041028 TO 20041104

AS Assignment

Owner name: CATALYSTWEB, LLC, VIRGINIA

Free format text: CHANGE OF NAME;ASSIGNOR:SONOLINK COMMUNICATIONS SYSTEMS, LLC;REEL/FRAME:020281/0450

Effective date: 20070629

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION