摘要:
Negotiation of a future communication through a personal virtual assistant is provided. A trigger command is received. The trigger command identifies a communication received for a recipient from a sender. Schedule information is accessed. The schedule information is related to the recipient of the received communication. A plurality of options is presented to the sender. The plurality of options are for arranging a future communication between the sender and the recipient, and include at least one option determined based on the accessed schedule information. A selection of an option for arranging a future communication is received. The selected option is executed to arrange the future communication.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for implementing, via a communication device, a set of algorithms to learn about user's usage of the device and provide automated customization to the device's user interface to improve ease of use and productivity of the end-user. This approach does not require the user's involvement by manually customizing the user interface, such as by setting up a speed dial list or a screen layout. The system automates rendering decisions and the content that is rendered based on the usage information. For example, if a user consistently calls a number every Tuesday and Wednesday morning regardless of scheduled calendar information, the communication device can provide a dynamic widget in the user interface for easy access to that number every Tuesday and Wednesday morning. The user can dial the number easily via the widget without the dial pad or a contacts application.
摘要:
A method is provided for the use of a signaling protocol stack by telephony applications which run on different system software images. When a telecommunications session is conducted by a first telephony application, the first telephony application typically controls the state of the telecommunications session through a signaling protocol stack executing on the same system software image as the first telephony application. When control over the telecommunications session is passed from the first telephony application to a second telephony application, the second telephony applications begins controlling the state of the telecommunications session through the same signaling protocol stack by using remote procedure calls.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for automatically establishing trusted relationships between users across organizational boundaries. A user makes a request to his system to create a trusted relationship with an individual of another organization. The system then analyzes the previous communication history between the user and the other individual, and, based on that analysis, sends a query to the other individual's system. The system then receives a response from the other individual's system, and if the response matches an expected response the system forms a trusted relationship between the user and the other individual.
摘要:
Techniques for detecting and resolving feature interactions during calls are disclosed. In particular, a finite-state machine and a corresponding method detect when a feature that is invoked during a call would interact with another previously-activated feature, and ensure that both features are not active simultaneously. Three different techniques for resolution are disclosed: in one technique, activation of the latter feature is always refused; in a second technique, the former feature is always deactivated and the latter feature is then activated; and in a third technique, one of the two features is selected to be the active feature—perhaps based on priorities assigned to the features—and the features are activated and/or deactivated accordingly.
摘要:
A method for determining the privacy settings for location-based services without some of the disadvantages of the prior art is disclosed. This is done by establishing a session between the location generator and the location recipient. The session is created by a validator that is capable of keeping track of the rules for a stream of location objects created by a location generator. The validator determines what information to send to the location recipient without having to determine the rules for each location object and each location recipient every time a new location object is received by the location server.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for facilitating communications based on a trusted relationships. A system configured to practice the method first receives a communication request from a second communication device for a specific resource, wherein the communication request is based, at least in part, on trust information generated by a previously established trusted relationship. The system confirms, via an access to a trust database and using the trust information, (1) an identity of a sender of the communication request and (2) access permissions for a requested resource. Then, if the identity and the access permissions are confirmed, the system establishes communications between the first communications device and the second communications device in response to the communication request according to the specific resource. The trust information can include a trust user ID and a trust key.
摘要:
Methods, systems, and computer-readable media for self-maintaining interactive communications privileges governing interactive communications with entities outside a domain are disclosed. The interactive communications privileges can be used to process interactive communications requests between entities inside a domain and entities outside the domain. Currently configured interactive communications privileges configured for an entity outside a domain may no longer be desired, reliable, or valid with the current capabilities of the entity outside the domain. In this regard, embodiments disclosed herein involve self-maintaining interactive communications privileges configured for entities outside a domain. Review of interactive communications privileges configured for entities outside a domain can be performed to determine if those interactive communications configurations should be maintained, in whole or part, or not maintained. In this manner, the burden and complexity of maintaining interactive communications privileges for entities outside the domain on a domain administrator or other administrator may be reduced or alleviated.
摘要:
A method for the registration of a communication terminal is provided. In some embodiments of the present invention, a communication terminal is registered with a base station by searching and executing a virtual appliance that contains base station software with which the communication terminal pre-subscribed. In some embodiments of the present invention, a communication terminal is registered as an endpoint device for a Session Initiation Protocol (SIP) uniform resource identifier (URI) when the communication terminal registers with the base station.
摘要:
The present disclosure provides mechanisms for verification of mapping from one type of network address to another type of network address based on delivery of a one-time key over one type of the network and confirmation of its receipt over another type of network. A particular example of such mapping is mapping from a telephone number used in the PSTN or the like to a VoIP address such as a SIP URI. The mapping verification mechanisms can be provided without dependence on the records of past calls, manual calling, or the line information database in the PSTN system. Accordingly, a highly secure and efficient mapping verification mechanism is realized.