Abstract:
In on embodiment, techniques for providing alerts to a user when a communication frequency pattern between a user and a contact has not occurred during a pre-determined amount of time are provided. Communication records between the contact and the user can be analyzed to determine if the communication frequency pattern with the contact during the pre-determined amount of time does not meet pre-determined criteria. For example, the criteria may be generate an alert if communications do not occur in the last month, generate an alert if less than five communications occur in the last six months, or any other communication pattern. Also, the content of a communication may be analyzed to determine if a certain topic has been discussed. If a certain topic has not been discussed during the pre-determined amount of time, an alert may also be generated reminding the user that the topic has not been discussed.
Abstract:
In one embodiment, a method for enhanced extension mobility includes accessing user input indicating either a desire of a user to logon at an endpomt [figure 1, unit 16] in a private mode according to which the endpoint supports only an extension of the user or a desire of the user to logon at the endpoint [figure 1, unit 16] in a shared mode according to which the endpoint concurrently supports an extension of the user and one or more other extensions of one or more other users. The method includes configuring the endpoint to support only an extension of the user if the user input indicates a desire of the user to logon at the endpoint in a private mode according to which the endpoint supports only an extension of the user. The method includes configuring the endpoint to concurrently support an extension of the user and one or more other extensions of one or more other users if the user input indicates a desire of the user to logon at the endpoint in a shared mode according to which the endpoint concurrently supports an extension of the user and one or more other extensions of one or more other users.
Abstract:
In one embodiment, a method for enhanced call pickup includes accessing data indicating a current status of each of one or more users in a call pickup group (CPG) with respect to an incoming phone call to a phone number corresponding to the CPG and communicating the data to one or more endpoints of one or more users in the CPG for display to one or more users in the CPG. A display of the data to a first user in the CPG facilitates the first user determining a current status of each of one or more second users in the CPG to facilitate a decision by the first user regarding whether to pick up the incoming phone call.
Abstract:
A method and apparatus to process an incoming message is described. The method may comprise, at a recipient system, receiving an incoming message from a message communicator and automatically analyzing message content to identify a keyword included in the message content. Thereafter, a predefined action associated with the keyword may be identified and the action may be performed. In an example embodiment, the predefined action may be a priority with the message, alerting an intended recipient of the message, routing the message to the intended recipient, paging the intended recipient, emailing the message to the intended recipient, sending an SMS message to the intended recipient, or the like. In an example embodiment, a user/owner of a mailbox may search a message database to identify incoming messages which includes the search term in the message content.
Abstract:
In one embodiment, a telephony system includes a memory that stores one or more call preferences of a user, and a central call routing entity that enables a user to set a call forwarding rule. In accordance with the call forwarding rule and in response to an incoming call to a first telephone device of the user, the call routing entity routing the incoming call to a second telephone device along with a message indicating that the one or more call preferences of the user are stored in the memory. The one or more call preferences are then fetched and applied at the second telephone device. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
Abstract:
Disclosed are apparatus and methods for utilizing the camera or video capability of particular communication devices (104), such as cell phones, to enhance handling of calls, such as emergency calls. In one implementation, when a call is made to an emergency response center (ERC) (102) using an image hide capable communication device and such call is queued until an agent is available for handling the call, one or more images or video may be collected from such caller by utilizing the image hide capability of the caller's communication device (202). The mages collected from a plurality of different callers may then be sorted into different event groups (502). For instance, all the images/video that relate to a same emergency event, such as a traffic accident, are grouped together into a same event group. The different groups can then be prioritized for handling by an available agent (206, 504).
Abstract:
A unified messaging system includes a unit to store a message operable to store a message sent to a user, the message having a selectable security attribute set to a one of a plurality of levels. A module associated with the unit operates to secure a voice channel used by the user to listen to the message when the selectable security level is set to a high level indicating encryption. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Abstract:
A method for providing a camp-on hold service comprises detecting a hold condition between a first user and a second user and establishing a call hold by placing the call on hold. The method also comprises receiving a request from the second user to camp-on to the call hold and monitoring the status of the first user during the call hold. The method also comprises receiving an indication that the first user is available to continue communications with the second user and notifying the second user that the first user is available to continue communications with the second user.
Abstract:
Disclosed are methods and apparatus for methods and apparatus for automatically contacting a service center (112, 110) for one or more particular products (102, 104, 122, 124), as well as contacting other types of entities with respect to any type of item. In a first embodiment, each item includes a radio frequency identification (RFID) of the particular products that is used to automatically contact a service center or the like (210). In a second embodiment, the RFID of the particular product is automatically sent to the service center or the like (214). In the first embodiment, the RFID of each product contains contact information, such as a 1-800 telephone number, a URL address, or email address, for a particular service center or the like. In one implementation, an RFID reader (104) is coupled with a communication device, such as a telephone or computer device, and the user uses the RFID reader to scan an RFID of a particular item (e.g., a malfunctioning product) (206). The relevant service center or the like is then contacted based on the RFID scan (210). For example, the user is connected to an agent at the relevant service center via a telephone or computer network. In the second embodiment, when a service center (or the like) needs RFID tag data for a particular item, a user may select a "send" option (e.g., on the communication device or reader) to have such RFID tag data automatically transmitted to the service center or the like (214).
Abstract:
Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or "sleep" when a user leaves one or more of the devices. Users may be automatically identified and associated. The "presence" of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.