Contemporary communication systems enable users to have a number of identities over various systems such as enterprise emails, personal emails, social networking exchanges, and comparable ones. Each of these systems may generate contact lists based on automatic processing of exchange information and/or manual input. A structure and content of contact information for distinct communication systems may be different depending on their infrastructure. Thus, a user may have a plurality of contact information for the same contact stored in each communication system they are associated with.
Increasingly, other applications are becoming capable of providing access to multiple communication systems for a user. For example, an electronic mail exchange application may be configured to send and receive emails from a variety of systems for a user managing the user's identities automatically. Because each communication system tends to have its own contact lists, it is a challenge for users to manage multiple contacts while using multiple communication clients. Discrepancies arise when a user attempts to communicate with a contact while accessing contact information from multiple sources. Contact information consolidation systems can be black boxes that hide the consolidation process from the user. Additionally, contact information consolidation services may not be sufficiently scalable to reach all applications and services utilized by a user. Consolidation services may be device dependent and may scale poorly to adverse use scenarios such as mobile and resource limited applications.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to exclusively identify key features or essential features of the claimed subject matter, nor is it intended as an aid in determining the scope of the claimed subject matter.
Embodiments are directed to automatically linking contact information. A communication application may address duplicate and complimentary contact information from data sources without interrupting user tasks. The application may remove duplicate contact information and aggregate complimentary contact information in a non-invasive process to the user experience. The communication application may automatically retrieve complimentary contact information and aggregate it to a unified contact object for presentation.
These and other features and advantages will be apparent from a reading of the following detailed description and a review of the associated drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory and do not restrict aspects as claimed.
As briefly described above, contact information may be automatically linked by a communication application. The application may determine match criteria for a contact associated with a contact list of a communication application. The application may determine duplicate contact information retrieved from at least one data service according to the match criteria. The application may access a data service of a data source such as a social networking application to retrieve the contact information. Next, the application may determine complimentary contact information retrieved from another at least one data service according to the match criteria. The application may retrieve contact information not found in the contact. The application may automatically aggregate the duplicate contact information, the complimentary contact information, and the contact into a unified contact object by eliminating the duplicate contact information and adding the complimentary contact information. The application may present the unified contact object to a user through a user interface of the communication application.
In the following detailed description, references are made to the accompanying drawings that form a part hereof, and in which are shown by way of illustrations specific embodiments or examples. These aspects may be combined, other aspects may be utilized, and structural changes may be made without departing from the spirit or scope of the present disclosure. The following detailed description is therefore not to be taken in the limiting sense, and the scope of the present invention is defined by the appended claims and their equivalents. While the embodiments will be described in the general context of program modules that execute in conjunction with an application program that runs on an operating system on a personal computer, those skilled in the art will recognize that aspects may also be implemented in combination with other program modules.
Generally, program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that embodiments may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and comparable computing devices. Embodiments may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
Embodiments may be implemented as a computer-implemented process (method), a computing system, or as an article of manufacture, such as a computer program product or computer readable media. The computer program product may be a computer storage medium readable by a computer system and encoding a computer program that comprises instructions for causing a computer or computing system to perform example process(es). The computer-readable storage medium is a computer-readable memory device. The computer-readable storage medium can for example be implemented via one or more of a volatile computer memory, a non-volatile memory, a hard drive, a flash drive, a floppy disk, or a compact disk, and comparable media.
According to embodiments, a contact may be a data set with elements such as identifiers to enable communication with another user. Contact may be part of a list of contacts presented to a user through a user interface of a communication application. Contact information may include the user's name, email address(es), telephone number(s), user-id(s), address(es), and similar identifiers. Contact information may also include dynamic information such as a user's presence information including availability and location. Contact information may be retrieved from an external or internal data source. Contact information may be retrieved during a bulk import, manual operations, and contact synchronization. Retrieved contact information may match the contact through common identifier(s) such as a user's whole name or partial name, user id, and email address. The contact information may be a duplicate of the contact or may have complimentary contact information not found in the contact.
Throughout this specification, the term “server” generally refers to a computing device executing one or more software programs typically in a networked environment. However, a server may also be implemented as a virtual server (software programs) executed on one or more computing devices viewed as a server on the network. Similarly, a “client” may refer to a computing device enabling access to a communication system or an application executed on a computing device enabling a user to access a networked system such as a social networking service, an email exchange service, and comparable ones. More detail on these technologies and example operations is provided below.
Referring to
A communication application may provide linking services at server 120. The application may be executed in the server 120 and provide linking services to a client 130 within client/server architecture. A server based communication application may provide continued connectivity to data sources. Continued network connectivity may enable a server based communication application to link retrieved contact information incrementally. An update in a data source may cause the communication application to propagate the update into a unified contact object upon an update determination according to match criteria. The communication application may eliminate determined duplicate contact information such as a duplicate email address. Additionally, the communication application may add complimentary contact information into the unified contact object such as an address not previously found in a contact.
Alternatively, the application may be executed solely in the client 130 in scenarios where server based architecture may be inconvenient. An example client based application may be a mobile device application providing the contact aggregation services with unreliable network connectivity. In such a scenario, aggregation services may be provided intermittently depended on available network connectivity. In a client based communication application, contact information may be synchronized intermittently with data sources.
In an embodiment, the communication application may retrieve contact information from different data sources. Data source 1 (110) to data source N (112) may host contact information. A data source may be an external or local data source. Data sources may include a variety of platforms such as social networking applications, partner applications, email services, address books and similar ones. Data sources may provide access to contact information through data services 114. The communication application may access the data services 114 through a data source connect application programming interface (API) 122. The application may utilize the data source connect API 122 to negotiate with the data services 114 in order to retrieve contact information hosted by data resources. The connect API may be part of services available in server 120. Alternatively the connect API may be a component of the communication application.
In an example scenario, the communication application may connect to the data service 114 of a social networking application utilizing the data source connect API 122 to retrieve a user's social networking contact information. Alternatively, the application may utilize the data source connect API 122 to retrieve contact information from an address book. The application may analyze the contact information to determine duplicate and complimentary contact information according to match criteria. Retrieved contact information may be duplicate contact information when some identifiers of a contact match some identifiers of the retrieved contact information. An example may be a name and email address of a retrieved contact information matching the contact's identifiers according to a match criteria of common name and email address.
In another example scenario, the application may determine the retrieved contact information as complimentary contact information when the retrieved contact information includes additional information not found in the contact. An example may be the complimentary contact information matching the contact according to a common name and email address match criteria and having a phone number not found in the contact.
The communication application 220 may retrieve duplicate contact information 204. The duplicate contact information 204 may have identifiers 206 including name and email address in common with contact 222. The communication application may also retrieve complimentary contact information 214. The complimentary contact information may have identifiers 216 including name, email address and phone number.
The communication application 220 may provide aggregation, storage, and presentation functionality for contact 222. The contact may be an existing contact in a contact list used by the communication application. Alternatively, the contact may be a recently created contact.
The aggregation functionality may determine the retrieved contact information as duplicate or complimentary contact information according to common identifiers and aggregate the contact and the retrieved contact information into a unified contact object 230. Additionally, the application may provide storage functionality to maintain the unified contact object 230. The application may also provide the unified contact object 230 to other consuming applications.
The application may present the unified contact object through a user interface. A user may be enabled to access and edit the unified contact object through the user interface. The user interface may be scalable by providing a consistent experience across multiple platforms such as a desktop device based platform and mobile device based platform.
In an embodiment, the communication application may automatically link a contact with determined duplicate and complimentary contact information according to match criteria upon initial synchronization or import of data. The application may also be capable of subscribing to contact information in a data source to receive incremental updates on the subscribed contact information. The application may analyze the incremental update for duplicate and complimentary contact information to be linked with the unified contact. The schedule for retrieving updates may be according to an update timer setting of the subscription. The update timer setting may be user configurable.
In an example scenario, the application may detect a user edit or other operation adding, deleting, or changing identifiers in the subscribed contact information. Upon detecting the update operation (e.g.: an email address addition), the application may retrieve the subscribed contact information and analyze for duplicate or complimentary contact information between the unified contact object and the subscribed contact information. The application may link by eliminating duplicate contact information and integrating the complimentary contact information such as additional identifier information from the subscribed contact information into the unified contact object.
The application may also analyze for duplicate and complimentary contact information upon detecting an edit of the unified contact. The application may retrieve the subscribed contact information and aggregate any duplicate or complimentary subscribed contact information into the unified contact object subsequent to detecting the edit.
In another embodiment, the application may automatically link upon a manual user creation and editing of a contact. Upon a manual user creation of contact, the application may retrieve subscribed contact information from data sources and determine duplicate and complimentary contact information between the contact and the subscribed contact information. The application may link the subscribed contact information and the newly created contact information as described above. The application may then present the unified contact information through a user interface for viewing and editing by a user.
In a bulk import scenario 310, the communication application 340 may retrieve multiple contact information 312, 314 from data source 302. The application may retrieve contact information for all contacts or some of the contacts in data source 302 through a bulk import. The application may determine duplicate and complimentary contact information during the bulk import of multiple contacts. The application may eliminate duplicate contact information and add complimentary contact information to aggregate contact information retrieved during the bulk import into a unified contact object 342 for each contact. In an example scenario, the application may eliminate contact information upon determining duplicate contact information 314 according to match criteria of common name and email address. Additionally, the application may add phone number from contact information 312 into the unified contact object upon determining complimentary contact information of phone number according to match criteria of common name. The application may employ the bulk import to retrieve an initial set of contact information in a background process with minimal impact to a user experience.
In a synchronization scenario 320, the communication application may retrieve contact information matching a contact of the communication application according to match criteria. Synchronization may be as a result of a subscription process as discussed above. In an example scenario, the application may retrieve updated contact information from a data source upon detecting an update to subscribed contact information. The application may determine duplicate or complimentary contact information as described above. The application may determine duplicate contact information 322 according to match criteria of common name and email address. The application may eliminate the duplicate contact information and prevent entry of duplicate contact information 322 into the unified contact object 342.
A manual import scenario 330 may arise out of creation of a new contact. The application may automatically retrieve contact information from data source 302 upon detecting the creation of the contact. In an example scenario, the application may determine complimentary contact information 332 according to match criteria of common name. The application may add the mobile phone number from the complimentary contact information 332 to link the complimentary contact information 332 and the newly created contact.
In an embodiment, the communication application may employ a confidence algorithm to determine match criteria. The algorithm may use weighted elements of the duplicate and complimentary contact information such as common identifiers. The algorithm may assign a high weight score to a complete match of a common identifier. An example may be matching a name such as “Albert Lin” of a contact to a name such as “Albert Lin” of retrieved contact information. The algorithm may assign a low weight score to a partial match of a common identifier. An example may be matching a name such as “Albert Lin” of a contact to name such as “Al Lin” of retrieved contact.
In another embodiment, the algorithm may assign a high confidence score to one or more predefined or user selected identifiers of contact information (e.g., name, phone number, address, email address, organization, etc.). Matching contacts may be determined by comparing scores of candidate matching contacts against a threshold.
In yet another embodiment, the algorithm may be localizable and culture aware. The application may compare common identifiers in the match criteria through phonetic comparison to match the common identifiers in different languages. Additionally, the algorithm may be configurable to enable a user to define identifiers in match criteria. Examples may include matching names in different languages, shortened names, acronyms, etc. Thus, the weighting may be based on a predefined rule or user configuration.
In another embodiment, the application may provide the unified contact object to other consumers such as email servers. The application may provide the unified contact object to local communication applications through organizational interfaces. The application may provide the unified contact object to legacy application through customized interfaces. The application may provide the unified contact object to third party applications through standardized interfaces.
While the example communication applications, services, and platforms discussed in
The application may determine duplicate and complimentary contact information according to match criteria of common identifiers as discusses above. The application may display the aggregated unified contact object 402. The application may aggregate the contact into a unified contact object by merging contact identifiers such as name and email address with complimentary contact information retrieved from data sources. Example identifiers include home phone number 404 and home address 406. The user interface may also show eliminated duplicate contact information 408. The user interface may indicate the duplicate contact information through an alert to inform the user in order to disregard the duplicate contact.
The above discussed user interface and example communication applications in
As discussed, the communication application may access contact information from data sources through a variety of scenarios including, but not exclusive to, bulk import, synchronization, manual import. The communication application may determine duplicate or complimentary contact information according to match criteria of common identifiers between the retrieved contact information and contact. The application may eliminate duplicate contact information while aggregating contact and complimentary contact information into a unified contact object.
Client devices 511-513 are used to facilitate communications through a variety of modes between users of the communication application. One or more of the servers 518 may be used to manage contact information as discussed above. Contact information may be stored in one or more data stores (e.g. data store 516), which may be managed by any one of the servers 518 or by database server 514.
Network(s) 510 may comprise any topology of servers, clients, Internet service providers, and communication media. A system according to embodiments may have a static or dynamic topology. Network(s) 510 may include a secure network such as an enterprise network, an unsecure network such as a wireless open network, or the Internet. Network(s) 510 may also coordinate communication over other networks such as PSTN or cellular networks. Network(s) 510 provides communication between the nodes described herein. By way of example, and not limitation, network(s) 510 may include wireless media such as acoustic, RF, infrared and other wireless media.
Many other configurations of computing devices, applications, data sources, and data distribution systems may be employed to automatically aggregate contact information. Furthermore, the networked environments discussed in
Communication application 622 may be part of a service that links contact information from a number of data sources for a variety of scenarios including bulk import, synchronization, and manual import. Aggregation component 624 may eliminate duplicate contact information and add complimentary contact information into the unified contact object. This basic configuration is illustrated in
Computing device 600 may have additional features or functionality. For example, the computing device 600 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. Such additional storage is illustrated in
Computing device 600 may also contain communication connections 616 that allow the device to communicate with other devices 618, such as over a wireless network in a distributed computing environment, a satellite link, a cellular link, and comparable mechanisms. Other devices 618 may include computer device(s) that execute communication applications, other directory or policy servers, and comparable devices. Communication connection(s) 616 is one example of communication media. Communication media can include therein computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
Example embodiments also include methods. These methods can be implemented in any number of ways, including the structures described in this document. One such way is by machine operations, of devices of the type described in this document.
Another optional way is for one or more of the individual operations of the methods to be performed in conjunction with one or more human operators performing some. These human operators need not be collocated with each other, but each can be only with a machine that performs a portion of the program.
Process 700 begins with operation 710, where the communication application determines a match criteria for a contact associated with a contact list of the communication application. Next, the communication application may determine duplicate contact information retrieved from at least one data service according to the match criteria at operation 720. The duplicate contact information may be retrieved from a data source including a social networking application, an email service, and an address book. The application may also determine complimentary contact information retrieved from another at least one data service according to the match criteria at operation 730. The determination may be according to common identifiers of match criteria between the potentially matching contact information and the original contact.
The application may automatically aggregate the duplicate and complimentary contact information and the original contact by eliminating the duplicate contact information and linking the complimentary contact information and the original contact at operation 740. At operation 750, the application may present a unified contact object representing linked contact information through a user interface of the communication application.
The operations included in process 700 are for illustration purposes. A communication application configured to automatically link contact information according to embodiments may be implemented by similar processes with fewer or additional steps, as well as in different order of operations using the principles described herein.
The above specification, examples and data provide a complete description of the manufacture and use of the composition of the embodiments. Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims and embodiments.