摘要:
The present invention provides mechanisms for sharing user information, including user authentication information, across communication networks and more specifically across networks separated by one or more Session Border Controllers (SBCs). The authentication of a user at one network can be leveraged by the second network to invoke one or more applications at the second network in connection with administering a communication session for the user.
摘要:
The present invention provides mechanisms for sharing user information, including user authentication information, across communication networks and more specifically across networks separated by one or more Session Border Controllers (SBCs). The authentication of a user at one network can be leveraged by the second network to invoke one or more applications at the second network in connection with administering a communication session for the user.
摘要:
Symbol sequences of varying lengths and having logical meanings other than as network addresses (e.g., subscriber names), are assigned and used as actual telecommunications network addresses, without imposition of predefined fixed lengths, formats, or orderings on their constituent segments (e.g., given name, surname), in a call-processing arrangement (200) that uses stored definitions of syntax (320, 350) and grammar (400, 410) of the network numbering plan. The syntax definitions include definitions (312) of individual address segments, called symbol strings, which have logical meanings. Each string's definition includes a string length range (332), a string type (331), and an indicator (VNI 334) of the string's influence on call treatment (e.g., route) selection. The grammar definitions include a matrix (400) that defines permissible sequences of string types, including string types (256) which cannot be dialed by users but only result from receipt of permissible sequences of strings of user-dialable types, and a matrix (410) that defines which string types' influences on call treatment selection may be combined to select a treatment for a call. A network digit analysis function (210) parses a received call-control symbol sequence by using the stored syntax and grammar definitions to select a treatment for the call.
摘要:
A call-processing arrangement (200) views a network numbering plan as a language in the mathematical/computer science sense and takes a lexicographic approach to call processing. Numbering plan syntax is defined by data in tree data structures (320, 330), and numbering plan grammar is defined by data in matrix data structures (400, 410). The data structures are used by numbering plan-independent functions to determine the meaning of call-associated digit strings and to specify the treatment (e.g., routing, features,) to be given to the call based on that meaning. A string-identification function (340) applies collected digits to the trees and matrices to find leafs (312) that define digit strings that make up the number. A string-action function (341) uses the definitions in the found leafs to form a call-route-specifying or call-feature-specifying index (254) for the call. A generalized route-selection function (343) uses a set of first call characteristics including the route-or-feature-specifying index to select from multi-dimensional matrices (1200, 1202) either a feature module (205) to be invoked or a routing-pattern number (1201), and in the latter case uses a set of second call characteristics including the routing-pattern number to select a route preference (1701) from routing pattern-preference tables (1300). A digit-sending function (344) uses the route preference to select an entry of digit-sending information (1701) from a sending table (1700) and uses the sending information to establish a call path and to outpulse digits. A digit modification function (343) and a table (1000) of digit modifications are also provided for purposes of number conversion, such as between different network numbering plans when more than one is defined.
摘要:
Which call feature module, if any, is invoked in response to a user's input of a feature access code is made dependent upon the context in which the feature request is made, in a call-processing arrangement (200) that uses stored definitions of syntax (320, 350) and grammar (400, 410) of the network numbering plan. The syntax definitions are definitions (312) of individual symbol strings, including the feature access codes, and include the string's associated virtual node-point identifier (VNI 334) which indicates the string's influence on feature selections. A VNI (254) resulting from the VNIs of symbol strings included in the entire symbol sequence input by a user serves, along with parameters (1230, 1231, 1232) of the context, as a multi-dimensional pointer into a matrix (1202) of feature numbers (1203). The feature module (205) which corresponds to the feature number pointed to in the matrix by the pointer is then invoked and executed to provide a corresponding call feature.
摘要:
A method of operating a communication system includes generating a transcript of at least a portion of a conversation between a plurality of users. The transcript includes a plurality of subsets of characters. The method further includes displaying the transcript on a plurality of communication devices, identifying an occurrence of at least one selected subset of characters from the plurality of subsets of characters, and querying a definition source for at least one definition for the selected subset of characters. The definition for the selected subset of characters is displayed on the plurality of communication devices.
摘要:
Allowing the alerting of supervisors and off duty agents to conditions on a split of an ACD system via wireless terminals. The conditions under which the wireless alerting will be performed are programmed by the owner of the ACD system rather than the manufacturer. The ACD center is connected to a wireless switching system via a primary rate ISDN interface (PRI) link. The ACD system considers the wireless switching system as another ACD system and utilizes the look ahead interflow operation to communicate information to the wireless switching system concerning the condition of a split. This is done by the ACD placing informational telecommunication calls to pseudo telecommunication numbers via the PRI link to the wireless switching system. The wireless switching system is responsive to each of these pseudo numbers to interpret the pseudo number as to the wireless terminal that should be contacted and an alphanumeric message that is to be displayed on that wireless terminal. The alphanumeric message defines the condition of the split to the supervisor or off duty agents of the split. The wireless switching system may be a wireless telephone system or a paging system. The wireless terminals may be wireless telephones or pagers.
摘要:
Mechanisms and methods for providing sequenced applications upon communications session termination are provided. More particularly, a variety of messages, transcriptions, recordings, information sharing, billing, verification, participant listing, reporting, date and time stamping, linkages to other applications, launching of software programs, initiation of one or more subsequent communications sessions via the same or other communications modalities, and the like are possible. Provision of sequenced applications is performed in accordance with selections made as part of the initial negotiation of the communications session, during the communications session, or prior to the communications session to drive the applications launched upon call disconnect. The selections can include the features or resources for which associated applications will be launched in response to variables associated with the communications session, such as the identity of at least one participant to a communication, and the recipients of the application output.
摘要:
Mechanisms and methods for providing sequenced applications upon communications session termination are provided. More particularly, a variety of messages, transcriptions, recordings, information sharing, billing, verification, participant listing, reporting, date and time stamping, linkages to other applications, launching of software programs, initiation of one or more subsequent communications sessions via the same or other communications modalities, and the like are possible. Provision of sequenced applications is performed in accordance with selections made as part of the initial negotiation of the communications session, during the communications session, or prior to the communications session to drive the applications launched upon call disconnect. The selections can include the features or resources for which associated applications will be launched in response to variables associated with the communications session, such as the identity of at least one participant to a communication, and the recipients of the application output.
摘要:
Automatically connecting an unauthorized wireless terminal to a service provider agent so that online registration can be performed to provide permanent service to the wireless terminal. The wireless terminal is initially connected to a service provider agent by a telephone call from the wireless terminal via a call center having a plurality of agents when the wireless terminal first attempts to register with the service provider's wireless switching network. From the point of view of the user, the user may purchase a wireless terminal off the shelf of a mass merchandiser or in the corporate setting simply check a wireless terminal out of a stock room. When the user initially turns the power of the wireless terminal on, a call is placed to an agent of the service provider so that the registration may take place. All necessary information that must be loaded into the wireless telephone will be downloaded during this registration process. To prevent fraudulent use of the wireless terminal, the user sets up their service profile to prohibit certain types of activity. The user will have a personal identification number (PIN) that may be utilized to perform these activities on a selective basis. The PIN could be the mother's maiden name or secured credit. In addition, authorization could be performed where the PIN would actually be voice recognition. Once a user performs an activity that is not allowed in their service profile, they would be transferred to an agent of the service provider. By identifying themselves with the PIN, the user would be allowed to perform the restricted activity on a one-time basis, for a short period of time, or permanently change their service profile so that the activity could be performed all the time.