Abstract:
An embodiment of the present invention is a method for dynamically routing incoming calls through a private branch exchange (PBX) in response to commands issued by a host computer and, in particular, for routing incoming calls after routing information has been obtained from conventional ACD call handling techniques. In particular, an embodiment of the present invention is a method for dynamically routing incoming calls through a private branch exchange (PBX), which method comprises the steps of: (a) receiving an incoming call; (b) requesting a route request from a call processing module of the PBX, the route request being referred to as an internal route request; (c) receiving a route request for the incoming call from an alternate source, the route request being referred to as an external route request; and (d) rejecting the internal or the external route request on the basis of a priority scheme.
Abstract:
An electronic messaging scheme is described that is configurable to prevent intentional and unintentional transmission of electronic messages subject to one or more access restriction conditions. In accordance with one aspect of this electronic messaging scheme, an electronic message is interrogated for an access restriction notice in response to a user command to transmit the electronic message (step 52), and a detected access restriction notice is responded to in accordance with a prescribed transmission policy (step 58).
Abstract:
A TAPI database system and method is provided according to the present invention. According to one implementation, an object-oriented TAPI database (200) is provided which supports code re-use when used in other TAPI service providers. The database (200) models all the major objects in TAPI telephony - static line, static phone, static addresses, open lines, open phones, open addresses, calls and request Ids.
Abstract:
A system and method for telephone trouble reporting is provided. One aspect of the present invention is a context-sensitive graphical user interface (GUI). The GUI allows a user to select a trouble reporting option at various stages of a telephone call in a telephony-over-LAN system. Thus, a series of menus listing potential call difficulties are provided in the interface of the digital or IP phone or telephony-enabled computer to the user during the telephone call. Selecting one of the options allows the user to report the problem to the server or other central switch.
Abstract:
A jitter buffer controller (110) allows the depth of the jitter buffer (113) to be adjusted dynamically according to the varying jitter of the current sequence. The jitter buffer controller (110) maintains a cache (109) of previous jitter values. This cache contains exponentially averaged values that represent the long-term behavior of specific destination's jitter characteristics, i.e., a jitter characteristic memory. These values are used to initialize the jitter buffer's depth. The jitter cache (109) prevents the buffer's depth from being initialized with an arbitrary value that disregards the specific destination's jitter characteristics.
Abstract:
A multipoint control unit coordinator (MCUC) 105. The MCUC 105 tracks all conferences in a telecommunications system and determines how they can be best configured and modified over time. The MCUC 105 instructs multipoint control units MCUs 104 to break down and reconfigure calls, if necessary. A MCUC 105 according to an embodiment of the invention maintains a database of all the MCUs 104 in the system, a measure of processing coding resources, and a geographical location. When two parties seek to add a third in a conference call, the MCUC 105 determines coding resources, geographical locations, and determines the most appropriate mixing location based on preferences, such as network cost or endpoint coding resources or quality. The MCUC 105 then instructs the MCUs 104 to handle the conference accordingly.
Abstract:
A system and apparatus within a communications server for intercepting supplemental service requests to a communications network and ensuring redirection to correct network party and optimal resource usage when redirecting a call over the network. The optimization system includes a database (131) and database server software (122). A device/trunk handler (121, 123) is used to interface signalling channels to the optimization system. A monitoring and statistics unit (127) monitors the signalling channels. The server software (122) is responsive to the monitoring and statistics unit (127) and selects the routing of the supplementary service through the appropriate server(s) in the network.
Abstract:
A communication network 100 and an associated network manager server 102 include one or more instances of a first object type 122 and one or more instances of a second object type 124. The first object type 122 is associated with a first product of the communication network such as a PBX and the second object type 124 is associated with a second product of the network such as a phone mail product. The network includes a first local module 120a for configuring each instance of the first object type 122 and a second local module 120b for configuring each instance of the second object type 124. A network management server 102 of the network 100 includes a product specific coordinator 106. The product specific coordinator 106 includes means 108a for coordinating configuration activities among each instance of the first object type 122 via the first local module 120a and means 108b for coordinating configuration activities among each instance of the second object type 124 via the second local module 120b. The network 100 further includes a network coordinator 104 adapted for configuring each instance of a network object 126, such as a person object that includes a PBX component and a phone mail component. The network object 126 includes a first component associated with the first object type 122 and a second component associated with the second object type 124. The communication network 100 further includes a network management client 110 that includes a graphical user interface adapted for enabling a user to invoke the network management server 102.
Abstract:
Errors in dialing or otherwise entering network access codes such as telephone numbers are identified by comparing each entered code with a set of stored codes. Each entered code is also stored. For each stored code, statistics are compiled that reflect the likelihood that the code is invalid. Such statistics include frequency of use over a given time period, the length of the connection to the network after each use, and the length of time after ending a short connection that a different but similar or more probably correct code is entered. Similarity between codes is preferably measured by determining in how many positions the codes agree. If an entered code has a statistically low likelihood of being correct, then the system replaces it with a code that is sufficently similar, or immediately follows it sufficently often. The system checks, for example, for possible likely transposition errors. By comparing on a position-by-position basis, the system may also suggest to the user the likely complete code before it is completely entered, thus providing a 'quick-dial' feature for frequently dialed numbers without needing dedicated keys. The systems is locally intelligent in that it does not need to rely on any signals from the network to identify dialing errors.
Abstract:
A telephony over LAN client 102 is provided which includes a disabler to disable a screen 54 saver during active calls by generating a software interrupt indicative of either false keyboard interrupts or false mouse movements. Additionally or alternatively the client includes a power management system configured to enter a power down mode during lack of activity and the disabler disables the power management system with the keyboard interrupts or mouse movements. The ToL client 102 is configured to periodically activate such an interrupt during an active call immediately prior to the end of the timeout period of the screen saver and/or power management system. Alternatively, or in addition to the above-mentioned false keyboard interrupts or mouse movements, a false write to the hard drive might be provided.