WO2006135614A2 - Systems and processes to manage multiple modes of communication - Google Patents

Systems and processes to manage multiple modes of communication Download PDF

Info

Publication number
WO2006135614A2
WO2006135614A2 PCT/US2006/022015 US2006022015W WO2006135614A2 WO 2006135614 A2 WO2006135614 A2 WO 2006135614A2 US 2006022015 W US2006022015 W US 2006022015W WO 2006135614 A2 WO2006135614 A2 WO 2006135614A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
recipient
communication
recited
computer
Prior art date
Application number
PCT/US2006/022015
Other languages
French (fr)
Other versions
WO2006135614A8 (en
WO2006135614A9 (en
WO2006135614A3 (en
Inventor
Kwok Wai Cheung
Peter P. Tong
Original Assignee
Ipventure, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ipventure, Inc. filed Critical Ipventure, Inc.
Publication of WO2006135614A2 publication Critical patent/WO2006135614A2/en
Publication of WO2006135614A3 publication Critical patent/WO2006135614A3/en
Publication of WO2006135614A8 publication Critical patent/WO2006135614A8/en
Publication of WO2006135614A9 publication Critical patent/WO2006135614A9/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4547Network directories; Name-to-address mapping for personal communications, i.e. using a personal identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4557Directories for hybrid networks, e.g. including telephone numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Definitions

  • a person tries to electronically convey a message to the user.
  • the status of the user is identified; the identity of the person is identified; the urgency of the message is identified; the access priority of the person is determined based on the person's identity; and a process is set to manage the message using one or more rules, and in view of the status of the user, the access priority of the person and the urgency of the message.
  • the status of the user depends on the current activity or location of the user, or the current time. The status of the user can also be defined by the user.
  • the access priority of the person can be defined by the user, or is set depending on the user's reaction towards a prior message from the person. Also, the urgency of the message is set by the person. [0005] The process can depend on the mode of communication of the message.
  • the mode of communication can include a mobile phone, an office phone, a home phone, a mobile SMS, a pager from a mobile phone or PDA, a home/office SMS, mobile online chat, home online chat, a voice mail with/without instant notification, an office fax, a home fax, a mobile email, and an email.
  • the user receives the message through a handheld device, such as a cellular phone.
  • the message is electronically conveyed based on Internet protocol through a website.
  • the person is not aware of the contact information of the user. For example, the person is not aware of the phone number of the cellular phone that the user used to talk to the person. This prevents the person from directly accessing the user without going through an intermediate control, such as a website. Similarly, the user does not have to be aware of the contact information of the person.
  • the defined access priority of the person is stored at a website, allowing the website to access such information without asking for the user's permission.
  • the defined access priority is stored in a private database under the user's control.
  • Figure 1 shows a number of intelligent communication modes according to one embodiment of the invention.
  • Figure 2 shows a number of contact classes according to one embodiment of the invention.
  • Figure 3 shows a number of urgency classes according to one embodiment of the invention.
  • Figure 4 shows a number of statuses of a user according to one embodiment of the invention.
  • Figure 5 shows one embodiment of an example of an Access Priority
  • One embodiment of the invention can automatically remove unwanted communications. Certain Communications are relatively easy to determine to be unwanted, such as marketing cold calls and wrong number calls. Other communications may be more difficult. They can depend not just on the sources of the communication, but also the conditions or status of the receiver (a user) of the communication. The status can be related to the user's current activity and/or location. For example, when the user is on a train going to work, the user probably does not mind chatting with his grandchild. However, if the user is having his yearly review meeting with his boss, the user probably would prefer to avoid the call from his grandchild, unless it is an emergency. Based on the embodiment, communications from sources the user wants to postpone receiving can be automatically diverted.
  • the user can get appropriate notification on the source of the incoming communication request.
  • the attributes of the notification can depend on the urgency of the communication and/or the status of the user.
  • the user may receive information from different modes of communication.
  • the user can have mobile phones, fixed lines at home or office, emails, SMS, and faxes, with their different numbers and/or addresses.
  • One embodiment can help the user efficiently manage information from the different modes.
  • the user only has to remember one specific address from one mode of communication. Through that address, the user can receive communications from all modes of communication, independent of where the user is, or the type of hardware the user has. This allows the user to efficiently maintain his communication from the numerous modes even when he is traveling. For example, the user does not have to change phones (and the phone numbers) when he moves from areas covering 3G to areas that do not.
  • a number of embodiments depend on the different modes of communication converging onto the internet protocol platform.
  • a communication gateway or a portal is formed allowing the user to receive communications from numerous sources through different modes. This, in turn, could reduce the numerous addresses the user has to remember, to one address.
  • an e-mail address for the user can serve as an access identifier for the different communication addresses from different communication modes.
  • the access identifier can become the user's digital identity.
  • the user's other types of identification such as the user's driver licenser number, can be the user's access identifier.
  • One embodiment of the invention uses an open portal based on the web. Based on the portal, the user can securely determine who can reach him at what conditions.
  • this indicator is determined according to the status of the user, the access priorities of the person trying to reach the user (or the relationship or the lack of relationship between the user and the person), and/or the urgency of the message from the person.
  • the status of the user can be dynamically determined, based on the current condition(s) of the user.
  • the portal can allow the user and the person to select different options, which can be modified as desired. For exampie, the relationship can be preset by the user and stored in a database, while the urgency of the message can be set by the person. [00021]
  • the portal can be used to control the selection and setting of different intelligent communication modes for the user.
  • the portal allows worldwide access to the user, and can dynamically determine, for example, whether a call initiated at different time by different callers should be accepted by the user in real-time or handled by other mechanisms. From this information, communication requests can be classified, for example, into different degrees of undesvrability. Some requests can be automatically blocked from the user. Others can be diverted and handled by other mechanism, such as diverting a phone call to an email or voice mail.
  • the portal or gateway also includes a database to keep track of the user's different contacts or acquaintances, and the access priorities of each contact.
  • the user can modify information in the database, such as assigning and/or changing the priorities of the contacts.
  • the gateway can automatically select an intelligent mode of communication for the user. This selection can be done dynamically.
  • the portal can dynamically change the access priorities of a caller trying to reach the user. For exampie, previously the caller is of high priority to the user, and the user has set her access priorities accordingly. Lately, every time the caller trying to reach the user, the request was denied.
  • the portal can automatically send a message to the user, asking the user if the user would like to lower the access priority of the caller. If the response is affirmative, the caller's priority is automatically reduced.
  • the user does not have to set priorities of each contact.
  • the system monitors every call, and provides the contact's identity to the user. Based on the user's reaction to the call (e.g. accepting or rejecting it), the system automatically sets the contact's priorities.
  • the system can then query the user for approval on the setting, and allow the user to adjust it as necessary.
  • the system can continue to modify the caller's priorities based on the user's reaction to the caller's subsequent calls.
  • the user could keep information he believes to be sensitive local in a different database. Such information can be stored securely under the user's direct control.
  • the portal can retrieve information from the different database when required.
  • the user can restrict or limit such retrieval process.
  • Additional confidentiality can be provided.
  • the user can be aware of the identity of the caller even without being informed of the number of the caller.
  • the caller can reach the user without being aware of the number of the phone the user is using to receive the call.
  • the user can keep his location and/or status confidential but still can receive the communication. This can be useful because there are situations, for example, when the user does not want to disclose his contact information but the user needs to receive services provided by the caller.
  • caller is used in general. It is not just limited to phone calls, but they can be any person or entity requesting to communicate with the user, such as trying to send a message to the user. As a separate note, the caller can also be a user of different embodiments of the invention.
  • the system can establish connections between the caller and the user in real time. Though contacts are established, the system only needs to ensure the identities of the caller and the user to each other. However, the system does not have to disclose the phone numbers, electronic addresses, physical locations and/or other attributes of the caller and the user to each other.
  • real time implies that the time required for the identification is similar to the typical time required to set up, for example, a telephone call.
  • the system can be a portal based on the web.
  • a portal also holds the user's electronic calendar. The calendar can be programmable, with entries set by the user. The portal can automatically and securely set appointments for the user since the portal knows the identity of the caller, and the status and schedule of the user. For example, the appointment can be for a conference call,
  • a portal provides a number of intelligent communication modes ( ⁇ CM) for the user to select as shown in Figure 1.
  • ⁇ CM intelligent communication modes
  • ICM 8 the incoming message goes directly to voice mail with instant notification to mobile devices of the user. The incoming message can usually go to voice mail. There is no need to default.
  • the user can define a number of contact classes, as shown in Figure 2.
  • the user can set up a number of urgency classes, as shown in Figure 3.
  • the user can define a number of status, as shown in Figure 4.
  • the user can set up an Access Priority Database for different ContactCIasses, as shown in Figure 5.
  • the user can categorize the following contacts into the corresponding CoritactClasses:
  • Peter wants to make a mobile phone call to the user.
  • Peter calls a portal.
  • the portal can be the user's ISP.
  • the portal first verifies the caller's identity to be Peter. This can be done, for example, by a public key challenge based on Peter having a public key digital certificate.
  • Peter is also a registered user of the portal. Then, Peter's identity can be more readily identified or verified.
  • a virtual address/number for the communication session is created allowing Peter to reach the user, which can be by phone. The user's phone number does not have to be disclosed to Peter.
  • a virtual address/number for the communication session is created allowing Peter to reach the user, which can be by phone. The user's phone number does not have to be disclosed to Peter.
  • the portal can assure the user that the person calling is Peter based on an identification verification process, such as ones described above.
  • the portal can access the user's database and determine that Peter belongs to ContactClass2.
  • the database can, for example, be in the portal.
  • the database is in a personal communication device of the user.
  • the portal accesses the personal communication device to determine Peter's ContactClass.
  • the user may receive Peter's call directly.
  • the user may receive Peter's call directly.
  • Peter may be asked to leave a voice mail to the user, while the user is notified by a mobile short message regarding an incoming call from Peter.
  • location information of the user could be determined based on GPS information from, for example, the user's cell phone.
  • the user receives messages through a handheld device, such as a phone, and the phone has a switch.
  • the switch can be a physical button or a software setting, such as a pull-down menu.
  • the user could set his status dynamically by changing the physical or logical position of the switch, For example, one position can indicate that the user is very busy, and should only be interrupted by an urgent message from the user's closest contacts, such as his wife or parents.
  • Another position can indicate that the user's status allows the user to receive any messages from anyone.
  • a message is electronically conveyed by a central network server, such as a web server based on
  • a portal or gateway approach could provide general Internet access to one or more embodiments of the communication management systems so that users can configure the system behavior they desire.
  • the portal or gateway can then facilitate download of a database or update thereto to a communication device, such as a phone.
  • a user could efficiently maintain his communication, and does not even have to change phones when he moves from areas covering 3 G to areas that do not. These phones could be based on different communication mechanisms, such as GSM, CDMA, 3G and 4G systems. Also as explained above, the user could keep information in local databases, such as in such a phone. For example, the intelligent communication modes shown in Figure 1 for the user to select are in the phone.
  • the user could define the contact classes, such as the ones shown in Figure 2; set up the urgency classes, such as the ones shown in Figure 3; define the statuses, such as the ones shown in Figure 4; set up the Access Priority Database, such as the one shown in Figure 5; and categorize a number of the user's contacts into the corresponding ContactCl asses, all in the phone.
  • the phone could automatically manage the communication. Note that the phone does not have to be a cellular phone. In one embodiment, the phone is a desk top phone. [00042] Again as explained above, the person or the caller trying to contact the user could select different options.
  • the urgency of the message can be set by the caller. This selection is typically in the call setup phase.
  • the caller has pre-selected the urgency class before making the call.
  • the system could prompt the caller to input an urgency class or status before the call or message is routed to the user.
  • different urgency classes could be defined by the caller.

Abstract

A computer-implemented system and method to manage the communication of a user are disclosed. In one embodiment, when a person tries to electronically convey a message to the user, the status of the user, the identity of the person, and the urgency of the message can be identified. The access priority of the person can be determined based on the person's identity. Then, the message can be managed using one or more rules and in view of the status of the user, the access priority of the person and the urgency of the message.

Description

Systems and Processes to Manage Multiple Modes of Communication
BACKGROUND OF THE INVENTION
[0001] For many years, other than mails from post offices, we typically only received information from afar through telephones. However, in the past few years, ways that others can send us information have increased significantly. Just to list a few different modes of communication, we can be reached from standard desk phones, fax, cell phones, electronic mails, and instant messages. In addition, we can have more than one phone number and multiple electronic mail addresses. There are people we like to communicate with, and there are those we prefer to avoid. Managing information from all such different modes can be quite time consuming. [0002] It should be apparent from the foregoing that there is still a need to help manage the numerous modes of communication.
SUMMARY OF THE INVENTION
[0003] Different embodiments of a computer-implemented system and method to manage the communication of a user are disclosed. A person tries to electronically convey a message to the user. In one embodiment, the status of the user is identified; the identity of the person is identified; the urgency of the message is identified; the access priority of the person is determined based on the person's identity; and a process is set to manage the message using one or more rules, and in view of the status of the user, the access priority of the person and the urgency of the message. [0004] Based on different embodiments, the status of the user depends on the current activity or location of the user, or the current time. The status of the user can also be defined by the user. Similarly, the access priority of the person can be defined by the user, or is set depending on the user's reaction towards a prior message from the person. Also, the urgency of the message is set by the person. [0005] The process can depend on the mode of communication of the message.
For example, the mode of communication can include a mobile phone, an office phone, a home phone, a mobile SMS, a pager from a mobile phone or PDA, a home/office SMS, mobile online chat, home online chat, a voice mail with/without instant notification, an office fax, a home fax, a mobile email, and an email. [0006] In one embodiment, the user receives the message through a handheld device, such as a cellular phone. In another embodiment, the message is electronically conveyed based on Internet protocol through a website.
[0007] In one embodiment, though the process allows the user to receive the message, the person is not aware of the contact information of the user. For example, the person is not aware of the phone number of the cellular phone that the user used to talk to the person. This prevents the person from directly accessing the user without going through an intermediate control, such as a website. Similarly, the user does not have to be aware of the contact information of the person.
[0008] In another embodiment, the defined access priority of the person is stored at a website, allowing the website to access such information without asking for the user's permission. In one embodiment, the defined access priority is stored in a private database under the user's control.
[0009] Other aspects and advantages of the present invention will become apparent from the following detailed description, which, when taken in conjunction with the accompanying drawings, illustrates by way of example the principles of the invention.
BRIEF DESCRIPTION OFTHE DRAWINGS
[00010] Figure 1 shows a number of intelligent communication modes according to one embodiment of the invention.
[00011] Figure 2 shows a number of contact classes according to one embodiment of the invention.
[00012] Figure 3 shows a number of urgency classes according to one embodiment of the invention.
[00013] Figure 4 shows a number of statuses of a user according to one embodiment of the invention.
[00014] Figure 5 shows one embodiment of an example of an Access Priority
Database according to one embodiment of the invention.
[00015] Same numerals in Figures 1-5 are assigned to similar elements in all the figures. Embodiments of the invention are discussed below with reference to Figures 1-5. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes as the invention extends beyond these limited embodiments.
DETAILED DESCRIPTION OFTHE INVENTION [00016] One embodiment of the invention can automatically remove unwanted communications. Certain Communications are relatively easy to determine to be unwanted, such as marketing cold calls and wrong number calls. Other communications may be more difficult. They can depend not just on the sources of the communication, but also the conditions or status of the receiver (a user) of the communication. The status can be related to the user's current activity and/or location. For example, when the user is on a train going to work, the user probably does not mind chatting with his grandchild. However, if the user is having his yearly review meeting with his boss, the user probably would prefer to avoid the call from his grandchild, unless it is an emergency. Based on the embodiment, communications from sources the user wants to postpone receiving can be automatically diverted. [00017] In one embodiment, the user can get appropriate notification on the source of the incoming communication request. The attributes of the notification can depend on the urgency of the communication and/or the status of the user. [00018] The user may receive information from different modes of communication. For example, the user can have mobile phones, fixed lines at home or office, emails, SMS, and faxes, with their different numbers and/or addresses. One embodiment can help the user efficiently manage information from the different modes. The user only has to remember one specific address from one mode of communication. Through that address, the user can receive communications from all modes of communication, independent of where the user is, or the type of hardware the user has. This allows the user to efficiently maintain his communication from the numerous modes even when he is traveling. For example, the user does not have to change phones (and the phone numbers) when he moves from areas covering 3G to areas that do not.
[00019] A number of embodiments depend on the different modes of communication converging onto the internet protocol platform. A communication gateway or a portal is formed allowing the user to receive communications from numerous sources through different modes. This, in turn, could reduce the numerous addresses the user has to remember, to one address. For example, an e-mail address for the user can serve as an access identifier for the different communication addresses from different communication modes. The access identifier can become the user's digital identity. In one embodiment, the user's other types of identification, such as the user's driver licenser number, can be the user's access identifier. [00020] One embodiment of the invention uses an open portal based on the web. Based on the portal, the user can securely determine who can reach him at what conditions. This can be done based on a status indicator. As an example, this indicator is determined according to the status of the user, the access priorities of the person trying to reach the user (or the relationship or the lack of relationship between the user and the person), and/or the urgency of the message from the person. The status of the user can be dynamically determined, based on the current condition(s) of the user. The portal can allow the user and the person to select different options, which can be modified as desired. For exampie, the relationship can be preset by the user and stored in a database, while the urgency of the message can be set by the person. [00021] Thus, in one embodiment, the portal can be used to control the selection and setting of different intelligent communication modes for the user. These intelligent communication modes allow priorities of various kinds of communication options to be set by the user. The portal allows worldwide access to the user, and can dynamically determine, for example, whether a call initiated at different time by different callers should be accepted by the user in real-time or handled by other mechanisms. From this information, communication requests can be classified, for example, into different degrees of undesvrability. Some requests can be automatically blocked from the user. Others can be diverted and handled by other mechanism, such as diverting a phone call to an email or voice mail.
[00022] In one embodiment, the portal or gateway also includes a database to keep track of the user's different contacts or acquaintances, and the access priorities of each contact. The user can modify information in the database, such as assigning and/or changing the priorities of the contacts. Based on the information (or lack of information) in the database of the contact trying to access the user, and based on the status of the user, the gateway can automatically select an intelligent mode of communication for the user. This selection can be done dynamically. [00023] In one embodiment, the portal can dynamically change the access priorities of a caller trying to reach the user. For exampie, previously the caller is of high priority to the user, and the user has set her access priorities accordingly. Lately, every time the caller trying to reach the user, the request was denied. After a preset number of rejections, the portal can automatically send a message to the user, asking the user if the user would like to lower the access priority of the caller. If the response is affirmative, the caller's priority is automatically reduced. [00024] In another embodiment, the user does not have to set priorities of each contact. The system monitors every call, and provides the contact's identity to the user. Based on the user's reaction to the call (e.g. accepting or rejecting it), the system automatically sets the contact's priorities. In one embodiment, the system can then query the user for approval on the setting, and allow the user to adjust it as necessary. In another embodiment, the system can continue to modify the caller's priorities based on the user's reaction to the caller's subsequent calls.
[00025] In one embodiment, the user could keep information he believes to be sensitive local in a different database. Such information can be stored securely under the user's direct control. The portal can retrieve information from the different database when required. In another embodiment, the user can restrict or limit such retrieval process.
[00026] Additional confidentiality can be provided. In one embodiment, using phone calls as an example, the user can be aware of the identity of the caller even without being informed of the number of the caller. Similarly, the caller can reach the user without being aware of the number of the phone the user is using to receive the call. The user can keep his location and/or status confidential but still can receive the communication. This can be useful because there are situations, for example, when the user does not want to disclose his contact information but the user needs to receive services provided by the caller.
[00027] One approach to maintain such confidentiality while maintaining realtime communication is based on a system that digitally identifies the identities of the caller and the receiver. Note that the term caller is used in general. It is not just limited to phone calls, but they can be any person or entity requesting to communicate with the user, such as trying to send a message to the user. As a separate note, the caller can also be a user of different embodiments of the invention.
[00028] After determining the identities, the system can establish connections between the caller and the user in real time. Though contacts are established, the system only needs to ensure the identities of the caller and the user to each other. However, the system does not have to disclose the phone numbers, electronic addresses, physical locations and/or other attributes of the caller and the user to each other. In one embodiment, real time implies that the time required for the identification is similar to the typical time required to set up, for example, a telephone call. The system can be a portal based on the web. [00029] In one embodiment, a portal also holds the user's electronic calendar. The calendar can be programmable, with entries set by the user. The portal can automatically and securely set appointments for the user since the portal knows the identity of the caller, and the status and schedule of the user. For example, the appointment can be for a conference call,
[00030] To illustrate, in one embodiment, a portal provides a number of intelligent communication modes (ΪCM) for the user to select as shown in Figure 1. There are three columns in the table. If the communication mode selected in the second column does not work, the portal automatically defaults to the corresponding approach in the third column. For example, under ICM 1, if the mobile phone is busy, default to voice mail. Some of the selections do not have any default because it may not be necessary to default. For example, under ICM 8, the incoming message goes directly to voice mail with instant notification to mobile devices of the user. The incoming message can usually go to voice mail. There is no need to default. [00031 ] As a receiver of communication, the user can define a number of contact classes, as shown in Figure 2. The user can set up a number of urgency classes, as shown in Figure 3. The user can define a number of status, as shown in Figure 4. Then, based on tables in Figures 1-4, the user can set up an Access Priority Database for different ContactCIasses, as shown in Figure 5.
[00032] As another example, the user can categorize the following contacts into the corresponding CoritactClasses:
Figure imgf000007_0001
[00033] Peter wants to make a mobile phone call to the user. In one embodiment, Peter calls a portal. As an example, the portal can be the user's ISP. The portal first verifies the caller's identity to be Peter. This can be done, for example, by a public key challenge based on Peter having a public key digital certificate. In another example, Peter is also a registered user of the portal. Then, Peter's identity can be more readily identified or verified. [00034] In one embodiment, after verification, a virtual address/number for the communication session is created allowing Peter to reach the user, which can be by phone. The user's phone number does not have to be disclosed to Peter. Similarly,
Peter's mobile phone number does not have to be disclosed to the user. The portal can assure the user that the person calling is Peter based on an identification verification process, such as ones described above.
[00035] In establishing contact, the portal can access the user's database and determine that Peter belongs to ContactClass2. The database can, for example, be in the portal.
[00036] In another embodiment, the database is in a personal communication device of the user. The portal accesses the personal communication device to determine Peter's ContactClass.
[00037] Based on the ContactClass information, the status of the user and
Peter's urgency setting, the user may receive Peter's call directly. As another example,
Peter may be asked to leave a voice mail to the user, while the user is notified by a mobile short message regarding an incoming call from Peter.
[00038] As additional examples, in one embodiment, location information of the user could be determined based on GPS information from, for example, the user's cell phone.
[00039] In one embodiment, the user receives messages through a handheld device, such as a phone, and the phone has a switch. The switch can be a physical button or a software setting, such as a pull-down menu. The user could set his status dynamically by changing the physical or logical position of the switch, For example, one position can indicate that the user is very busy, and should only be interrupted by an urgent message from the user's closest contacts, such as his wife or parents.
Another position can indicate that the user's status allows the user to receive any messages from anyone.
[00040] As explained above, based on an embodiment, a message is electronically conveyed by a central network server, such as a web server based on
Internet protocol. A portal or gateway approach could provide general Internet access to one or more embodiments of the communication management systems so that users can configure the system behavior they desire. The portal or gateway can then facilitate download of a database or update thereto to a communication device, such as a phone.
[00041 ] Also, as explained above, based on an embodiment, a user could efficiently maintain his communication, and does not even have to change phones when he moves from areas covering 3 G to areas that do not. These phones could be based on different communication mechanisms, such as GSM, CDMA, 3G and 4G systems. Also as explained above, the user could keep information in local databases, such as in such a phone. For example, the intelligent communication modes shown in Figure 1 for the user to select are in the phone. The user could define the contact classes, such as the ones shown in Figure 2; set up the urgency classes, such as the ones shown in Figure 3; define the statuses, such as the ones shown in Figure 4; set up the Access Priority Database, such as the one shown in Figure 5; and categorize a number of the user's contacts into the corresponding ContactCl asses, all in the phone. When a caller places a call to the phone, based on information previously set in the phone and based on the urgency class selected by the caller, the phone could automatically manage the communication. Note that the phone does not have to be a cellular phone. In one embodiment, the phone is a desk top phone. [00042] Again as explained above, the person or the caller trying to contact the user could select different options. For example, the urgency of the message can be set by the caller. This selection is typically in the call setup phase. In one embodiment, the caller has pre-selected the urgency class before making the call. In another embodiment, if the caller has not selected the urgency class, the system could prompt the caller to input an urgency class or status before the call or message is routed to the user. In yet another embodiment, different urgency classes could be defined by the caller.
[00043] Other embodiments of the invention will be apparent to those skilled in the art from a consideration of this specification or practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with the true scope and spirit of the invention being indicated by the following claims.
What is claimed is:

Claims

1. A computing device to manage the communication of a user in view of a person trying to electronically convey a message to the user, the device comprising: mechanism configured to identify the status of the user; mechanism configured to identify the identity of the person; mechanism configured to identify the urgency of the message; mechanism configured to determine the access priority of the person based on the person's identity; and mechanism configured to set a process to manage the message using one or more rules, and in view of the status of the user, the access priority of the person and the urgency of the message.
2. A computing device as recited in claim 1 , wherein the status of the user depends on the current activity or location of the user, or the current time, or the status of the user is defined by the user.
3. A computing device as recited in claims 1-2, wherein the access priority of the person is defined by the user, or is set depending on the user's reaction towards a prior message from the person.
4. A computing device as recited in claims 1-3, wherein the urgency of the message is set by the person.
5. A computing device as recited in claims 1 -4, wherein the process depends on the mode of communication of the message, and wherein the mode of communication is selected from the list of a mobile phone, an office phone, a home phone, a mobile SMS from a mobile phone or PDA, a pager from a mobile phone or PDA, a home/office SMS, mobile online chat, home online chat, a voice mail with/without instant notification, an office fax, a home fax, a mobile email, and an email.
6. A computing device as recited in claims 1-5, wherein the user receives the message through a handheld device, and wherein the status of the user is defined by the user using the handheld device.
7. A computing device as recited in claims 1 -6, wherein the message is electronically conveyed based on Internet protocol through a website, and wherein though the process allows the user to receive the message, the person is not aware of the contact information of the user to prevent the person from directly accessing the user without going through the website, or the user is not aware of the contact information of the person to prevent the user from directly accessing the person without going through the website.
8. A computing device as recited in claims 1-7, wherein the message is electronically conveyed based on Internet protocol through a website, and wherein the defined access priority of the person is stored at the website, or is stored in a private database under the user's control.
9. A computing device as recited in claims 1 -8, wherein the message is electronically conveyed based on Internet protocol through a website, wherein the website keeps an electronic calendar of the user, and wherein an appointment is automatically set for the user with the person in view of information in the calendar.
10. A computing device as recited in claims 1-6, wherein the message is electronically conveyed based on Internet protocol through a website.
11. A computer-implemented method for managing incoming communication for a recipient, said method comprising: receiving an incoming communication request of a first communication type from a requestor; determining an access priority for trie requestor based on information provided by the recipient; and determining an appropriate communication type for the incoming communication request based on one or more configurable rules and the access priority for the requestor.
12. A computer-implemented method as recited in claim 11 , wherein the one or more configurable rules and/or the information are configured by the recipient through interaction with a website.
13. A computer-implemented method as recited in claim 11 , wherein the one or more configurable rules and/or the information are stored in a database.
14. A computer-implemented method as recited in claim 11 , wherein the appropriate communication type is of a type different from the first communication type.
15. A computer-implemented method as recited in claim 11 , wherein said method further comprises determining a status of the recipient, and wherein said determining operates to determine the appropriate communication type for the incoming communication request based on the one or more configurable rules, the access priority for the requestor, and the status of the recipient.
16. A computer-implemented method as recited in claim 15, wherein said method further comprises determining an urgency level for the incoming communication request, and wherein said determining operates to determine the appropriate communication type for the incoming communication request based on the one or more configurable rules, the access priority for the requestor, the status of the recipient and the urgency level of the incoming communication recipient.
17. A computer-implemented method as recited in claim 11 , wherein said method further comprises determining an urgency level for the incoming communication request, and wherein said determining operates to determine the appropriate communication type for the incoming communication request based on the one or more configurable rules, the access priority for the request, and the urgency level of the incoming communication recipient.
18. A computer-implemented method as recited in claim 11, wherein the appropriate communication type is chosen from a plurality of communication types including a voice call with a mobile phone, a voice call with an office phone, a voice call with a home phone, a SMS message with a mobile phone, a SMS message with a PDA, a pager message with a mobile phone, a pager message with a PDA, an online chat, a voice mail with or without instant notification, an office fax, a home fax and an email.
19. A computer-implemented method as recited in claim 11 , wherein said method further comprises determining a status of the recipient, and wherein said determining operates to determine the appropriate communication type for the incoming communication request based on the one or more configurable rules and based on one oτ more of the following factors: the time of day of the incoming communication request, a piece of information regarding the current activity of the recipient and the current location of recipient.
20. A computer-implemented method as recited in claim 11 , wherein said determining of the appropriate communication type learns to more intelligently identify the appropriate communication type.
21. A computer-implemented method as recited in claim 11 , wherein said determining the appropriate communication type comprises filtering the incoming communication request, whereby the incoming communication request can be denied or redirected to another less intrusive communication type based on the one or more configurable rules and the access priority for the requestor.
22. A computer-implemented method as recited in any of claims 11-21 , wherein said method further comprises diverting the incoming communication request for the first communication type to a communication session of the appropriate communication type.
23. A computer-implemented method for managing incoming communication for a recipient, said method comprising:
(a) receiving an incoming communication request directed at the recipient;
(b) determining predetermined communication processing criteria for use in processing communication requests directed at the recipient, in view of the incoming communication request;
(c) determining whether and how to divert the incoming communication request to a specific communication mode among a plurality of communication modes based on the predetermined communication processing criteria; and
(d) automatically diverting the incoming communication request to the specific communication mode if so determined.
24. A computer-implemented method as recited in claim 23, wherein at least one attribute of the communication processing criteria is decided by the recipient, and wherein the plurality of communication modes includes at least three communication modes.
25. A computer-implemented method as recited in any of claim 24, wherein the predetermined communication processing criteria depend on one or more of: at least one configurable rule, access priority for the requestor, status of the recipient, and urgency level of the incoming communication request.
26. A computer-implemented method as recited in any of claims 24-25, wherein the predetermined communication processing criteria depend on at least one configurable rule, and wherein the at least one configurable rule makes use of one or more of the following factors: the time of day of the incoming communication request, a piece of information regarding the current activity of the recipient, access priority for the requestor, status of the recipient, urgency level of the incoming communication request and the current location of recipient.
27. A computer-implemented method as recited in claim 24, wherein the predetermined communication processing criteria depend on a priority indication of the recipient.
28. A computer-implemented method as recited in any of claims 24-28, wherein the incoming communication request can be via a data network, and wherein at least one attribute of the communication processing criteria is set by the recipient through interaction with a website.
29. A computer-implemented method as recited in any of claims 24-28, wherein the incoming communication request can be received by the recipient through a phone, and wherein at least one attribute of the communication processing criteria is set by the recipient through the phone.
30. A computer-implemented method for managing incoming communication for a recipient, said method comprising:
(a) receiving an incoming communication request from a requestor;
(b) determining predetermined communication processing criteria for use in processing communication requests directed at the recipient, in view of the incoming communication request; and
(c) automatically directing the incoming communication request to an address of the recipient to be received by the recipient, based on one or more of the predetermined communication processing criteria, wherein although the requestor has established communication with the recipient through the address of the recipient, the requestor does not have to know or to be provided with the address of the recipient.
31. A computer-implemented method as recited in claim 30 wherein the address is a phone number of the recipient.
32. A computer-implemented method as recited in claims 30-31, wherein the requestor sends the incoming communication request through a requestor address, and wherein although the requestor has established communication with the recipient through the requestor address, the recipient does not have to know the requestor address but the recipient is aware of the identity of the requestor.
33. A computer-implemented method as recited in claim 32 wherein the requestor address is an email address.
PCT/US2006/022015 2005-06-10 2006-06-07 Systems and processes to manage multiple modes of communication WO2006135614A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US68968605P 2005-06-10 2005-06-10
US60/689,686 2005-06-10

Publications (4)

Publication Number Publication Date
WO2006135614A2 true WO2006135614A2 (en) 2006-12-21
WO2006135614A3 WO2006135614A3 (en) 2007-03-22
WO2006135614A8 WO2006135614A8 (en) 2008-07-10
WO2006135614A9 WO2006135614A9 (en) 2008-12-11

Family

ID=37012087

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/022015 WO2006135614A2 (en) 2005-06-10 2006-06-07 Systems and processes to manage multiple modes of communication

Country Status (2)

Country Link
CN (1) CN101297191A (en)
WO (1) WO2006135614A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012025499A1 (en) * 2010-08-25 2012-03-01 Alcatel Lucent System for managing emergency calls
FR2968493A1 (en) * 2010-12-06 2012-06-08 France Telecom Method for controlling communication received by mobile terminal of user, involves processing communication received by mobile terminal according to preset rule associated with determined location context

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847542B (en) * 2016-03-18 2019-12-13 梁梅芹 Incoming call prompting method and device for mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4714345A (en) * 1984-06-29 1987-12-22 Bernhard Schrader Sample arrangement for spectrometry, method for the measurement of luminescence and scattering and application of the sample arrangement
US5450193A (en) * 1992-02-24 1995-09-12 Hewlett-Packard Company Raman spectroscopy of airway gases
US5534997A (en) * 1994-07-15 1996-07-09 Bruker Analytische Messtechnik Gmbh Raman spectrometer using a remote probe with enhanced efficiency
US5786893A (en) * 1993-04-15 1998-07-28 Board Of Regents, The University Of Texas System Raman spectrometer
US20040063214A1 (en) * 2002-09-30 2004-04-01 Berlin Andrew Arthur Spectroscopic analysis system and method
US20050043597A1 (en) * 2003-07-31 2005-02-24 Skymoon Research And Development, Llc Optical vivo probe of analyte concentration within the sterile matrix under the human nail

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4714345A (en) * 1984-06-29 1987-12-22 Bernhard Schrader Sample arrangement for spectrometry, method for the measurement of luminescence and scattering and application of the sample arrangement
US5450193A (en) * 1992-02-24 1995-09-12 Hewlett-Packard Company Raman spectroscopy of airway gases
US5786893A (en) * 1993-04-15 1998-07-28 Board Of Regents, The University Of Texas System Raman spectrometer
US5534997A (en) * 1994-07-15 1996-07-09 Bruker Analytische Messtechnik Gmbh Raman spectrometer using a remote probe with enhanced efficiency
US20040063214A1 (en) * 2002-09-30 2004-04-01 Berlin Andrew Arthur Spectroscopic analysis system and method
US20050043597A1 (en) * 2003-07-31 2005-02-24 Skymoon Research And Development, Llc Optical vivo probe of analyte concentration within the sterile matrix under the human nail

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012025499A1 (en) * 2010-08-25 2012-03-01 Alcatel Lucent System for managing emergency calls
FR2964284A1 (en) * 2010-08-25 2012-03-02 Alcatel Lucent URGENT CALL MANAGEMENT SYSTEM
CN103141071A (en) * 2010-08-25 2013-06-05 阿尔卡特朗讯 System for managing emergency calls
FR2968493A1 (en) * 2010-12-06 2012-06-08 France Telecom Method for controlling communication received by mobile terminal of user, involves processing communication received by mobile terminal according to preset rule associated with determined location context

Also Published As

Publication number Publication date
CN101297191A (en) 2008-10-29
WO2006135614A8 (en) 2008-07-10
WO2006135614A9 (en) 2008-12-11
WO2006135614A3 (en) 2007-03-22

Similar Documents

Publication Publication Date Title
US9204268B2 (en) Systems and processes to manage multiple modes of communication
US6714519B2 (en) Communications availability
CA2393574C (en) Aggregates in a presence management system
USRE45926E1 (en) Method and system for facilitating mediated communication
CA2394344C (en) Presence management system
EP1240756B1 (en) Anonymity in a presence management system
US7254221B2 (en) Methods, systems, and products for providing communications services
US7603108B2 (en) Automatic connection and access controls for communications devices
US7769154B1 (en) Aggregated perceived presence
US9531652B2 (en) Communications routing and contact updates
WO2006135614A2 (en) Systems and processes to manage multiple modes of communication
CA2394317C (en) Presence management system using context information
WO2002037812A2 (en) Communications availability

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200680027964.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06772364

Country of ref document: EP

Kind code of ref document: A2