Abstract:
Within an interactive voice response system, a method of automatically disambiguating results presented to a user can include determining the identity of a user within an interactive voice response session, receiving user inputs specifying selections in an interactive voice response menu hierarchy, and storing historical information specifying the user selections within a profile associated with the identity of the user. For at least one subsequent input from the user, identifying the historical information associated with the identity of the user and using the historical information to reduce a number of possible selections in the interactive voice response menu hierarchy which are presented to the user.
Abstract:
A method of conducting commerce within a portable, wireless computing device can include storing an identifier specifying a cellular communications channel and receiving a user input specifying financial transaction information. The identifier and the financial transaction information can be provided to a receiving device over a short range, wireless communications link to initiate the financial transaction. An authorization code can be received via the cellular communications channel specified by the identifier. The authorization code can indicate whether the financial transaction was approved.
Abstract:
A server (115) having a communication link comprises an application execution environment, a random IP address generator application (135) executing within the application execution environment of the server to randomly select (205) an IP address, a communications interface configured to send outbound data or to receive inbound data thereby establishing the communications link in coordination with the random IP address generator application and a processor (150). Preferably, the processor is programmed to receive a request from a client (112 or 114) and process the request if an IP address randomly selected at the client synchronously matches the randomly selected IP address at the server. Additionally, the processor can be further programmed to ignore the request from the client if the IP address randomly selected at the client fails to synchronously match the randomly selected IP address at the server.
Abstract:
A method of providing wireless local area network providers with subscriber administration services can include receiving from a processing node in a wireless local area network a request through a gateway interface for approval for a subscriber to access the wireless local area network. The request can specify subscriber identifying information. A determination can be made as to whether the subscriber is approved to access the wireless local area network using the subscriber identifying information by querying a telecommunications subscriber data store. The processing node of the wireless local area network can be notified of the determination results through the gateway interface. If the subscriber is approved, a record of the wireless session can be stored in a session data store.
Abstract:
A method of transmitting updates to a data requester can include receiving a telephony connectivity request for establishing a telephony voice channel between a data requester and a data source. The data source can be detected based upon the telephony connectivity request. A data synchronizer can ascertain an update time that the data requester last received a data update and can determine a synchronization time that the data source was last synchronized. The data synchronizer can compare the update time and the synchronization time. If the synchronization time occurs after the update time, then the data synchronizer can synchronize the data requester with the data source.
Abstract:
A system and method for mining data from stored telephone conversations is provided. Users request advanced data processing on the recorded data, either on the live data stream or the data in storage. Processes search the recorded data for keywords and phrases that the user provides the PTR. User can also request more sophisticated analysis of the recorded data for deeper contextual meaning of the conversations. Context information may include identifying the users, the locations and times referred to by the users during the conference, etc. Additional searches related to the obtained information are performed and the extracted information is compared to similar information obtained from previous meetings. Voice inflections and any emotional stress present in the voices of the users can also be detected and added to the collected information. Search terms can also be highlighted in the results.
Abstract:
A method of communication among telephony services using an event context cache can include, in a messaging telephony service, receiving a telephony event from a node in the public switched telephony network specifying a called directory number, a calling directory number, and service context data. The service context data can be stored as an entry within the event context cache. The event context cache can be accessible by at least one other telephony service. The entry can be associated with a key for the event context cache. The key can be specified by the called directory number and the calling directory number.
Abstract:
A method for sharing signaling event data in a telephony system can include receiving within a first service logic component an event from a telephony signaling network. An event context can be determined for the event and asynchronously stored within an event context cache communicatively linked with at least said first service logic component and a second service logic component.
Abstract:
A method, system and article of manufacture of recognizing a voice command. One embodiment of the invention comprises: receiving a voice input; using the number of sound fragments, determining a number of sound fragments to be processed in a first set of sound fragments; determining whether the first set of sound fragments of the voice input matches with the first set of sound fragments of a voice command; and if the first set of sound fragments matches with the first set of sound fragments of the voice command, then determining whether one or more remaining sound fragments matches with one or more remaining sound fragments of the voice command.
Abstract:
A method for visually generating a service component can include specifying at least one service building block, wherein the specification includes visually selecting a plurality of event handlers for inclusion in the at least one service building block. The method can also include exporting the at least one service building block. The exporting step can produce a deployment descriptor which describes events for which the at least one service building block has been configured to handle. The at least one service block can be visually arranged, wherein the arrangement can form the service component. Finally, the service component produced by the visual arrangement can be configured for insertion in a SLEE in an advanced intelligent network. Notably, in one aspect of the method, the method can further include the step of encapsulating the service component in a service application container.