Abstract:
A system allows a user to drag content from one application and drop the content into a separate application. In response to the user interface functions of dragging and dropping the content, an importation system can create a data object. The object can have fields that are defined based on the application or data being dragged. The object fields may be automatically populated using a search function that searches for data in the application that may be highlighted during the drag function. The drop is intercepted the information is formatted for the receiving application. The information is formatted to meet the specifications of the receiving application to optimize the storage and use of the information. Thus, the system can translate the information from its native format into a format understandable by the receiving application.
Abstract:
A method and an apparatus are disclosed that improve how an incoming call is handled across multiple data-processing systems, without some of the disadvantages of the prior art. Specifically, in a telecommunications call when a called telephone number is not associated with a particular in-service terminal, an enhanced terminating system of the call refrains from transmitting ringback to the calling terminal until an appropriate event occurs, such as the receiving of an asynchronous response from the auxiliary data-processing system to which the call has been directed. Depending on the response received, the terminating system might refocus the call or provide other treatment to the call. In some embodiments of the present invention, the terminating system also transmits a feedback signal to the calling terminal to provide status to the calling party on the progress of the call attempt, wherein the feedback signal is different than the ringback signal.
Abstract:
An apparatus and method are disclosed that enable a private branch exchange to determine that a voice mail system has answered a call, without some of the disadvantages in the prior art. The private branch exchange—or, generally-speaking, a data-processing system—infers that the voice mail system has answered a call by timing key events or by noting some of indications that are received from another system, or both. Subsequently, the private branch exchange drops the voice mail system from the call, thereby minimizing the non-enterprise voice mail system's handling of calls that are originated to an on-premises terminal.
Abstract:
A method and apparatus are disclosed that enable a telecommunications terminal to securely receive unsolicited content from applications that are external to the terminal. In particular, the present invention enables the terminal to control the interaction with external applications by using a secure, two-task process. In the two-task process of the present invention, the execution of the second task is based on verifying the trustworthiness of address information that is provided in the first task. This is in contrast to a one-task process, in which an untrustworthy server that provides content might hide its own address by substituting a legitimate address.
Abstract:
A system and method create an interconnection among users of different social networks. Each user can provide information about the social networks they use (e.g., username, passwords, etc.). An application may register with the social network and can inter-dispose the application between the user and the social network. Then, the system can interconnect the users into a “virtual private network” (VPN) where communications between the users and the social networks can be replicated to other social networks for the other users. As such, different users using different social networks can communicate.
Abstract:
It would be beneficial to allow one or more of information, applications, desktops, and in general any information to be shared between a computer and a communications device. For example, it would be useful to be able to move a presentation from a computer to a mobile communications device. Some solutions attempt to address this by requiring a user to load the information on a laptop, USB key, burn it to an optical disk or the like, and then “open” the information on another device located at the remote destination. In one embodiment, through the use of one or more of virtualization and content translation, any information and/or applications can be exchanged between a computer and a communications device. More specifically, one embodiment utilizes metadata in conjunction with a virtualization environment to allow the exchange of information and/or applications between a personal computer and a communications device, or vice versa.
Abstract:
A method and apparatus are disclosed that enable a user who is on a call using a call appearance at a first terminal to continue the call on a call appearance at a second terminal, wherein the second terminal has been excluded from the call. In the illustrative embodiment of the present invention, a private branch exchange that handles both telecommunications terminals receives a first signal that indicates that the first terminal has disconnected from the call. The private branch exchange then receives a second signal that indicates that the second terminal has gone off-hook or otherwise indicates a request to be added to the call. If the private branch exchange has received the second signal within a predetermined time interval after having received the first signal, then it adds the second terminal to the call.
Abstract:
A method and apparatus are disclosed that enable: (i) applications that are external to a telecommunications terminal, rather than the user, to initiate the delivery of content to the terminal, and (ii) the terminal to determine, based on the state of the terminal, whether or not to provide the content to a user. The “state” of the terminal is determined by one or more of (i) user-driven states, (ii) data states, and (iii) call states. When the terminal's state is considered, as in accordance with the illustrative embodiment of the present invention, the readiness of the user and terminal to accept and process the content are accounted for, and as a result the content does not interfere.
Abstract:
A technique is disclosed that changes one or more properties of a user interface at a telecommunications terminal based on an incoming call. When a first caller calls the telephone number of the terminal directly and the terminal answers the call, the terminal presents the direct call to the user through a first user interface. When a second caller calls a telephone number that is associated with a data-processing system and the call is then redirected to the terminal, the terminal presents the redirected call to the user through a second user interface. The telecommunications terminal can be a cell phone that belongs to a user, and the data-processing system can be a private branch exchange that serves an office enterprise network that the user belongs to, wherein the private branch exchange extends the call to the user's cell phone when the user is out of the office.
Abstract:
A system and method are disclosed for providing access to a telephone Application and an Information Application using a walk-up telecommunications terminal having an intuitive, context-sensitive interface configured to facilitate simple and intuitive usage by a user. An Idle Application is displayed on a display screen of the walk-up telecommunications terminal. A Startup Screen is then displayed on the display screen of the walk-up telecommunications terminal in response to a triggering event. The Phone Application is activated in response to a Phone Application event. An Information Application is activated in response to an Information Application event. The Phone Application is configured to take priority over the Information Application in the user interaction with the walk-up telecommunications terminal.