The present disclosure relates generally to voicemail systems. More particularly, the present disclosure relates to call handling treatment for voicemail systems.
Voicemail is a popular telephone service feature, and is often included in the price paid for telephone service. When a called line with voicemail functionality does not answer or is busy, a call can be handled by a voicemail system. A voicemail system can store recordings and/or announcements for a user. When a call is passed to a voicemail system, the voicemail system can play one or more recordings and/or announcements for the calling party, or a generic message, and can prompt the calling party to leave a message, for example, a spoken message. The voicemail system can record the calling party's message and store the message, for example, as audio data in a storage device. Call data associated with the message, for example, the calling party's telephone number, the date and time of the call, and the like, can also be stored by the voicemail system and associated with the stored message. Some voicemail systems also allow calling parties to leave alphanumeric messages for a called party. In any event, the voicemail system can store the message and/or data and associated call data.
According to one aspect of the present disclosure, a voicemail system can include one or more processors and one or more communication interfaces that are operatively linked and in communication with the one or more processors. The one or more communication interfaces can be configured to receive an incoming call. The voicemail system can further include one or more memory operatively linked and in communication with the processor. The one or more memory can be configured to store a call treatment application that includes one or more rules for determining call handling treatment of the incoming call.
In some embodiments, the one or more communication interfaces can be further configured to receive an address message. The address message can identify a called party number of the incoming call. In some embodiments, the address message can identify one or more of a calling party number, an original called number, and a redirecting number.
In one embodiment, the one or more rules can determine that only the called party number is present and can instruct the voicemail system to forward the incoming call to an open tree voicemail greeting. The open tree voicemail greeting can request a calling party to enter a voicemail box number for the voicemail box that the calling party would like to access. In some embodiments, the one or more rules can prevent the incoming call from being routed to a calling party voicemail box.
In other embodiments, the one or more rules determine that the redirecting number is present and instruct the voicemail system to forward the incoming call to the redirecting number.
In other embodiments, the one or more rules determine that the calling party number and the original called number are equal and instruct the voicemail system to route the incoming call to a calling party voicemail box such that the calling party can retrieve voicemail messages.
In other embodiments, the one or more rules determine that the original called number is present and instruct the voicemail system to forward the incoming call to a voicemail box associated with the original called number.
In other embodiments, the one or more rules determine that a calling party mailbox and a called party mailbox are resident on the voicemail system and that the calling party number is present. The one or more rules instruct the voicemail system to route the incoming call to the calling party mailbox without requiring the calling party to re-enter the calling party number.
In another embodiment, the one or more rules determine that the calling party number is present and instruct the voicemail system to route the incoming call to a voicemail box associated with the called party number.
According to another aspect of the present disclosure, a method for operating a voicemail system to determine call handling treatment of an incoming call includes receiving an address message at the voicemail system. The address message can identify a called party number of the incoming call. The method can further include analyzing the address message to determine what call handling treatment rules to apply and apply the call handling treatment rules. The address message can further identify one or more of a calling party number, an original called number, and a redirecting number.
In some embodiments, analyzing the address message to determine what call handling treatment rules to apply can include determining that only the called party number is present, and determining to apply a first rule, whereby a calling party is requested to enter a voicemail box number for the voicemail box the calling party would like to access. In some embodiments, applying one or more call handling treatment rules can include applying the first rule.
In other embodiments, analyzing the address message to determine what call handling treatment rules to apply can include determining that the calling party number and the original called number are equal, and determining to apply a second rule, whereby the incoming call is routed to a calling party voicemail box such that the calling party can retrieve voicemail messages. In some embodiments, applying one or more call handling treatment rules can include applying the second rule.
In other embodiments, analyzing the address message to determine what call handling treatment rules to apply can include determining that the redirecting number is present, and determining to apply a third rule, whereby the incoming call is forwarded to the redirect number. In some embodiments, applying one or more call handling treatment rules can include applying the third rule.
In other embodiments, analyzing the address message to determine what call handling treatment rules to apply can include determining that the original called number is present, and determining to apply a fourth rule, whereby the incoming call is forwarded to a voicemail box associated with the original called number. In some embodiments, applying one or more call handling treatment rules can include applying the fourth rule.
In other embodiments, analyzing the address message to determine what call handling treatment rules to apply can include determining that the calling party number is present, and determining to apply a fifth rule, whereby the incoming call is routed to a voicemail box associated with the called party number. In some embodiments, applying one or more of the plurality of call handling treatment rules can include applying the fifth rule.
In other embodiments, analyzing the address message to determine what call handling treatment rules to apply can include determining that the calling party number is present, and determining to apply a sixth rule, whereby the incoming call is routed to a voicemail box associated with the calling party number without requiring the calling party to renter the calling party number. In some embodiments, applying one or more call handling treatment rules can include applying the sixth rule.
According to another aspect of the present disclosure, a method for operating a voicemail system can include receiving a call at the voicemail system from an internationally roaming voicemail user to retrieve voicemail messages. The call identifies a voicemail box number. The method can further include determining that the voicemail box number is proper for the voicemail user and routing the call to a voicemail box associated with the user.
In some embodiments, routing the call to the voicemail box number can include routing the call to the voicemail box number without prompting the voicemail user to reenter the voicemail box number.
According to another aspect of the present disclosure, a method for operating a voicemail system can include receiving a call at the voicemail system and determining to route the call to an open tree voicemail greeting. The open tree voicemail greeting can request the calling party to enter a voicemail box number for the voicemail box that the calling party would like to access. In some embodiments, the method can further include routing the call to the voicemail box number identified by the calling party.
As required, detailed embodiments of the present disclosure are disclosed herein. It must be understood that the disclosed embodiments are merely exemplary examples of the disclosure that may be embodied in various and alternative forms, and combinations thereof. As used herein, the word “exemplary” is used expansively to refer to embodiments that serve as an illustration, specimen, model or pattern. The figures are not necessarily to scale and some features may be exaggerated or minimized to show details of particular components. In other instances, well-known components, systems, materials or methods have not been described in detail in order to avoid obscuring the present disclosure. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure.
Referring now to the drawings wherein like numerals represent like elements throughout the several views,
The communications network, with which the communications network interface 102 allows communications, can be a circuit-switched network, such as a PSTN (Public Switched Telephone Network), a packet-switched network, such as the Internet, or a wireless communications network, for example. By way of example, a wireless communications network can be configured as a 2G GSM (Global System for Mobile communications) network and can provide data communications via GPRS (General Packet Radio Service), and EDGE (Enhanced Data rates for GSM Evolution). By way of further example, the wireless communications network can be configured as a 3G UMTS (Universal Mobile Telecommunications System) network and provide data communications via the HSPA (High-Speed Packet Access) protocol family, such as, HSDPA (High-Speed Downlink Packet Access), EUL (Enhanced Uplink) or otherwise termed HSUPA (High-Speed Uplink Packet Access), and HSPA+ (Evolved HSPA). The wireless communications network is also compatible with future mobile communications standards including, but not limited to, pre-4G and 4G standards, for example. Moreover, the wireless communications network can be configured for providing messaging services via Short Message Service (SMS), Multimedia Message Service (MMS), instant messaging, and voicemail messaging including plain old voicemail (POVM) and visual voicemail (WM).
The word “memory”, as used herein to describe the memory 108, collectively refers to all memory types associated with the VMS 100, such as, but not limited to, processor registers, processor caches, random access memory (RAM), other volatile memory forms, and non-volatile, semi-permanent or permanent memory types; for example, tape-based media, optical media, solid state media, hard disks, combinations thereof, and the like. While the memory 108 is illustrated as residing proximate the processor 104, it should be understood that the memory 108 can be a remotely accessed storage system, for example, a remote disk, a removable storage medium, combinations thereof, and the like. Moreover, the memory 108 is intended to encompass network memory and/or other storage devices, in wired or wireless communication with the VMS 100, which may utilize the communications network interface 102 to facilitate such communication. Thus, any of the data, applications, tables, settings, preferences, messages, and/or software described below can be stored in the memory 108 and/or accessed via network connections to other data processing systems (not shown). Accordingly, the present disclosure may operate on the VMS 100, wherein the VMS 100 is configured as a server to one or more client data processing systems as dictated by a client/server model.
The illustrated memory 108 includes one or more VMAs (voicemail applications) 110 and one or more CTAs (call treatment applications) 112. Additionally, the memory 108 can include other data, software, instructions, applications, and the like, for example, an operating system (not illustrated), hardware data, firmware, and the like. Although the VMA 110 and the CTA 112 are shown as separate entities, it should be appreciated that substantially all of the functionality of the VMS 100 modules can be performed by a single application. The memory 108 can also include user data 114.
The VMA 110 can provide user interface functions for called parties to retrieve and listen to voicemail messages, save voicemail messages, delete voicemail message, prioritize voicemail messages, change voicemail greetings, change voicemail announcements, change voicemail preferences and settings, and otherwise manage at least one voicemail box. The aforementioned interface functions can be provided via a TUI (Telephone User Interface) whereby a user can access their voicemail box by calling the VMS 100. Alternatively, the interface functions can be provided by a GUI (Graphical User Interface) of a visual voicemail application stored on the user's device. Other user interfaces, such as a web interface, are contemplated. The VMA 110 can also provide user interface functions for calling parties to leave voicemail messages for a called party. The VMA 110 can also be configured to manage the user data 114.
The illustrated CTA 112 includes one or more CNTs (Call Nature Tables) 116, one or more translation tables 117, and call treatment settings 118. The CNT 116 can include data and instructions that define at least one rule for call handling treatment for all domestic call scenarios. The CNT 116 can further include data and instructions that define at least one rule for call handling treatment of international call scenarios. For example, a rule for call handling treatment can be defined to allow a user roaming internationally to retrieve voicemail messages without being required to reenter his or her voicemail box number. The CNT 116 can further define rules to eliminate a present deposit routing fault to an internationally roaming number when the calling party has a voicemail box on the same voicemail system as the target voicemail box. The CNT 116 and the translation table 117 are described in more detail with reference to
The call treatment settings 118 can include a call nature setting that can be set to “ON” to activate the CNT 116 and can be set to “OFF” to ignore the CNT 116. Embodiments of the present disclosure are described with the assumption that the call nature setting is set to “ON,” rendering the CNT 116 in an active state. The call treatment settings 118 can further include a double forwarding setting. The double forwarding setting can allow additional information to be used if a parameter in the CNT 116 is not available, for example. The double forwarding setting can be set to “ON” to activate double forwarding and can be set to “OFF” to disable double forwarding. Embodiments of the present disclosure are described with the assumption that the double forwarding setting is set to “OFF”.
The user data 114 can include various data types. For purposes of illustration and not limitation, the user data 114 is illustrated in
The greetings and/or announcements 120 can include greetings, announcements, schedules, and the like, and can be associated with a user and one or more voicemail boxes. The greetings 120 can be configured by the user, by a network node, by the VMS 100, or by any other authorized party or device. For example, a user can record a greeting, schedule, or announcement, and store the greeting 120 on the VMS 100. As such, the greetings 100 can be audio data that is stored in the VMS memory 108 as an audio file. Additionally, the greetings 120 can be default messages that are created by the network, or a network node, and can be tailored for a user.
The greetings 120 can be stored in any desired format. If the greetings 120 are stored as audio data, exemplary formats include, but are not limited to, WAV (waveform audio), AIFF (audio interchange file format), RAW, encoded in GSM CODEC, AAC (advanced audio coding), MP3 (MPEG-1 audio layer 3), MP4 (MPEG-4 Part 14), WMA (Windows® media audio), RA (RealAudio), FLAC (free lossless audio codec), ALE (Apple® lossless encoder), ALAC (Apple® lossless audio codec), and other open and proprietary audio formats.
The preferences 124 can include data relating to a user's preferences for at least one voicemail box. The preferences 124 can include, for example, an indication as to what functions the user wants to make available to calling parties, conversion formats supported by the user's device, forwarding destination information, e.g., telephone numbers, email addresses, facsimile numbers, and the like, message time limits, voice to text settings, the number of rings allowed prior to passing a call to the VMS 100, message waiting indicator preferences, download settings, data routing preferences, and the like. It will be understood that users can customize many other functions and options of the VMS 100 including, but not limited to, options for bypassing the VMS 100 and sending incoming calls for a user to another system, phone number, and/or user, forwarding numbers, voice or data delivery options, including formats, size, delivery times, email addresses, and the like, as well as other preferences.
The messages 122 can include audio files created by recordings made by the VMS 100, text created by a calling party or by the VMS 100, headers associated with audio or text, and the like. For example, if a calling party leaves a spoken message for a called party, an audio file associated with a message 122 can be created by recording the spoken message. The audio files, if any, can be stored in any desired format, including, but not limited to, WAV, AIFF, RAW, encoded in GSM CODEC, AAC, MP3, MP4, WMA, RA, FLAC, ALE, ALAC, and other open and proprietary audio formats. Text data of the message 122 can include text created by the VMS 100, for example, using a speech to text converter. The text data can also include text created by or entered by the calling party, for example, an alphanumeric message, a callback number, a text message, and the like. The headers of the message 122 can include call data, such as the MSISDN, the length of the message, the size of the text file, if applicable, the time and date of the call, priority information, and the like. In addition to the file formats discussed above, the audio files, headers, and text can be stored in any network-recognizable format. The various data associated with a message 122 can be stored by the VMS 100 in any manner. If desired, the various data can be correlated to associate an audio file, a text file, and headers with each other as part of a message 122.
Account/device data 126 can include data relating to the user's account and/or device including, but not limited to, the user's subscription plan and the user's device capabilities. For example, the VMS 100 can be in communication with one or more billing platforms, subscriber databases, other network nodes, and the like to receive the account/device data 126 relating to a user's subscription plan, usage, and billing information. Additionally, the account/device data 126 can inform the VMS 100 of the features the user's device supports by indicating the IMEI (International Mobile Equipment Identity), serial number, carrier, software version(s), firmware, carrier-specific applications, combinations thereof, or the like. The account/device data 126 can pass-through the VMS 100 or can be stored at least temporarily in the memory 108. The VMS 100 can use the account/device data 126 to determine file formats and functionality that should be provided to a calling party or a user based upon billing, device, network, or other considerations. Additionally, billing considerations can be used to tailor options presented to a calling party. A user can be given the ability to override deactivation of any desired features or functionality.
Referring now to
The illustrated IAM message 200 includes four fields that can be used by the CNT 116 to determine the appropriate rule for call handling treatment of a given call scenario. For the sake of brevity and clarity the illustrated IAM message 200 does not include some fields and parameters.
The illustrated IAM message 200 includes a calling party number field 202 (hereinafter field A 202), an original called number field 204 (hereinafter field B 204), a called party number field 206 (hereinafter field C 206), and a redirecting number field 208 (hereinafter field D 208). The calling party number in field A 202 is the number of the calling party and can be set as either “network provided” or “customer provided” based upon where the call originates. The original called number in field B 204 identifies the number originally called by the calling party and can be specified for call forwarding scenarios. The called party number in field C 206 is the number of the called party. The original called number can be forwarded to the called party number, for example. The redirecting number in field D 208 is used in some scenarios of call forwarding to redirect a call to another voicemail box identified by the redirecting number present in field D 208.
According to present ISUP protocol specifications, field C 206 is the only mandatory field and the other fields can be populated as needed. When a call is placed, the originating SSP (service switching point) transmits an ISUP IAM message, such as IAM message 200, to reserve a path from the originating switch to the destination switch. The destination switch rings the called party and after a predetermined number of rings the call is transferred to the VMS 100. The IAM message 200 is received by the VMS 100 and analyzed by comparing the IAM message fields 202, 204, 206, 208 to the fields of the CNT 116 to determine at least one rule to apply as defined by the CNT 116, described immediately below with reference to
Referring now to
In the illustrated example, an “X” is used to indicate that a field should be ignored for the corresponding rule. An “X” can be used in the trunk group field 302, the subscriber field 304, and the direct call field 306, although this is not necessarily the case.
In the illustrated example, a “−” is used to indicate that the contents of a field does not bear any result for the corresponding rule and therefore the VMS 100 does not care what number is populated in the field. A “−” can be used in the calling party number field 308, the original called number field 310, and the redirecting number field 314, although this is not necessarily the case.
In the illustrated example, an “=” is used to indicate that a field and any other field with an “=” are checked for equality. An “=” can be used in the calling number field 308 and the original called field 310, although this is not necessarily the case.
In the illustrated example, a “P” is used to indicate that a field is populated with any value. A “P” can be used in the calling party number field 308, the original called number field 310, the called party number field 312, or the redirecting number field 314, although this is not necessarily the case.
In the illustrated example, a “T” is used to indicate that the calling party number in the calling party number field 308 must be associated with at least one voicemail box in the VMS 100 prior to applying this rule. An “F” in this field (not shown) can indicate that the calling party number is not associated with at least one voicemail box.
In the illustrated example, a “DPN” indicates that the number is a deposit pilot number. An “RPN” indicates that the number is a retrieval pilot number. A pilot number is a special number assigned to a destination that allows switch data translation rules to be developed to route a call to the specified destination. In the case of voicemail, different pilot numbers are used to route calls to the proper voicemail system. A “DPN” and “RPN” are used in the called party number field 312, although this is not necessarily the case.
In the illustrated example, an “F” in the call nature field 316 indicates that a call should be routed such that the calling party can deposit a voicemail message at the designated voicemail box. A “D” character indicates that a call should be routed to a voicemail box for message retrieval. Generally, a “D” character indicates that a calling party has called to listen to any available voicemail messages that have been deposited into his or her voicemail box. The “F” and “D” characters can be used in the call nature field 316, although this is not necessarily the case.
In the illustrated example, the scan field 318 and the calling number field 320 can be populated with an “A,” “B,” “C,” or “D” to identify the field from which the scan field 318 and/or the calling number field 320 should be populated, although this is not necessarily the case.
The rule field 300 identifies each row as a rule of the CNT 116. The rule field 300 includes a number representation of the rule number or row of the CNT 116.
The trunk group field 302 can include a value that can be used by the CNT 116 to specify the trunk group to which each rule can be applied. In the illustrated example, the trunk group field 302 is ignored for all rules as indicated by the “X” character.
The subscriber field 304 can be used to examine the calling party number field 202 of the IAM message 200, and to provide call handling treatment based upon the result. In the illustrated example, an “X” is used for rule one through rule four and rule six, and a “T” is used for rule five. The “X” is used to designate that this field is ignored for rule one through rule four and rule six. The “T” is used to designate that the calling party number in the calling party number field 308 must be associated with at least one voicemail box in the VMS 100 prior to applying this rule. An “F” in this field (not shown) can indicate that the calling party number in the calling party number field 308 is not associated with at least one voicemail box. The direct call field 306 can similarly include either an “X” or a “T.” As illustrated, the direct call field 306 includes an “X” for rule one through rule four and rule six and a “T” for rule five.
The calling party number field 308 can correspond to field A 202 of the IAM message 200. In the illustrated example, a “−” is used for rule one, rule three, and rule six to indicate that the VMS 100 does not consider what is populated in the field. With regard to rule two, the calling party number field 308, field A 202 and the original called number field 310, field B 204 are equal indicating that a user has called his or her own number to access a voicemail box, for example. A “P” character is used for rule four and rule five to indicate that the field is populated with any value.
The original called number field 310 can correspond to field B 204. In the illustrated example, the “−” character is used for rule one and rule four through rule six. The “=” character is used for rule two, and the “P” character is used for rule four through rule six.
The called party number field 312 can correspond to field C 206. In the illustrated example, a DPN is present for rule one through rule four, an RPN is present for rule five, and a “P” character is present for rule six.
The redirecting number field 314 can correspond to field D 208. The redirecting number field 314 can include a “−” character to indicate that the field is ignored or a “P” character to indicate a value is present. In the illustrated example, a “P” character is present for rule one and “−” characters are present for all other rules.
The call nature field 316 can include a setting to control call treatment. An “F” character indicates that a call should be routed such that the calling party can deposit a voicemail message at the designated voicemail box. A “D” character indicates that a call should be routed to a voicemail box for message retrieval. Generally, a “D” character indicates that a voicemail user has called to listen to any available voicemail messages. In the illustrated example, an “F” character is present for rule one, rule three, rule four, and rule six, and a “D” character is present for rule two and rule five.
The scan field 318 can include a setting for each rule to specify the field 308, 310, 312, 314 in the IAM message 200 to be used as the voicemail box number, where each IAM message 200 field corresponds to the calling party number field 308 (field A 202), the original called number field 310 (field B 204), the called party number field 312 (field C 206), and the redirecting number field 314 (field D 208). For example, rule one specifies field D 208, which is the redirecting number field 314 in the CNT 116, to be scanned for the voicemail box number to which an inbound call should be forwarded or routed. Since many call scenarios are a first mobile device calling a second mobile device, this setting determines the number to select the proper mailbox on the VMS 100.
The calling number field 320 can include a setting that provides information to the VMS 100 to record the number of the calling party. This allows the called party to “check” the calling party number from which a voicemail message was deposited.
Referring now to
Referring now to
The illustrated method 400 begins and flow proceeds to determination block 402 wherein it is determined if the CNT 116 is activated based upon the call treatment settings 118, particularly the call nature setting. If the call nature setting is set to “OFF,” the CNT 116 is disabled and flow proceeds to block 404 wherein call handling treatment proceeds in accordance with established rules and procedures for normal call treatment. Otherwise, flow proceeds to block 406 and the IAM message 200 is analyzed by comparing the received parameters of the IAM message 200 to the CNT 116 to determine, at block 408, the call treatment rule that should be applied. At block 410, the applicable call treatment rule is applied and the inbound call is handled accordingly. The method 400 can end.
The methods 500, 600, 700, 800, 900, 1000 illustrated in
Referring now to
It should be understood that the steps of the method 500 are not necessarily presented in any particular order and that performance of some or all the steps in an alternative order(s) is possible and is contemplated. The steps have been presented in the demonstrated order for ease of description and illustration. Steps can be added, omitted and/or performed simultaneously without departing from the scope of the appended claims. It should also be understood that the illustrated method 500 can be ended at any time. Some or all steps of this process, and/or substantially equivalent steps, can be performed by execution of computer-readable instructions included on a computer readable medium.
Turning now to both
Referring now to
It should be understood that the steps of the method 600 are not necessarily presented in any particular order and that performance of some or all the steps in an alternative order(s) is possible and is contemplated. The steps have been presented in the demonstrated order for ease of description and illustration. Steps can be added, omitted and/or performed simultaneously without departing from the scope of the appended claims. It should also be understood that the illustrated method 600 can be ended at any time. Some or all steps of this process, and/or substantially equivalent steps, can be performed by execution of computer-readable instructions included on a computer readable medium.
Turning now to both
Referring now to
It should be understood that the steps of the method 700 are not necessarily presented in any particular order and that performance of some or all the steps in an alternative order(s) is possible and is contemplated. The steps have been presented in the demonstrated order for ease of description and illustration. Steps can be added, omitted and/or performed simultaneously without departing from the scope of the appended claims. It should also be understood that the illustrated method 700 can be ended at any time. Some or all steps of this process, and/or substantially equivalent steps, can be performed by execution of computer-readable instructions included on a computer readable medium.
Turning now to both
Referring now to
It should be understood that the steps of the method 800 are not necessarily presented in any particular order and that performance of some or all the steps in an alternative order(s) is possible and is contemplated. The steps have been presented in the demonstrated order for ease of description and illustration. Steps can be added, omitted and/or performed simultaneously without departing from the scope of the appended claims. It should also be understood that the illustrated method 800 can be ended at any time. Some or all steps of this process, and/or substantially equivalent steps, can be performed by execution of computer-readable instructions included on a computer readable medium.
Turning now to both
Referring now to
It should be understood that the steps of the method 900 are not necessarily presented in any particular order and that performance of some or all the steps in an alternative order(s) is possible and is contemplated. The steps have been presented in the demonstrated order for ease of description and illustration. Steps can be added, omitted and/or performed simultaneously without departing from the scope of the appended claims. It should also be understood that the illustrated method 900 can be ended at any time. Some or all steps of this process, and/or substantially equivalent steps, can be performed by execution of computer-readable instructions included on a computer readable medium.
Turning now to both
Referring now to
It should be understood that the steps of the method 1000 are not necessarily presented in any particular order and that performance of some or all the steps in an alternative order(s) is possible and is contemplated. The steps have been presented in the demonstrated order for ease of description and illustration. Steps can be added, omitted and/or performed simultaneously without departing from the scope of the appended claims. It should also be understood that the illustrated method 1000 can be ended at any time. Some or all steps of this process, and/or substantially equivalent steps, can be performed by execution of computer-readable instructions included on a computer readable medium.
Turning now to both
The law does not require and it is economically prohibitive to illustrate and teach every possible embodiment of the present claims. Hence, the above-described embodiments are merely exemplary illustrations of implementations set forth for a clear understanding of the principles of the disclosure. Variations, modifications, and combinations may be made to the above-described embodiments without departing from the scope of the claims. All such variations, modifications, and combinations are included herein by the scope of this disclosure and the following claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2008/068738 | 6/30/2008 | WO | 00 | 7/15/2008 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2010/002382 | 1/7/2010 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5329579 | Brunson | Jul 1994 | A |
5524137 | Rhee | Jun 1996 | A |
5572578 | Lin et al. | Nov 1996 | A |
5737394 | Anderson et al. | Apr 1998 | A |
5737395 | Irribarren | Apr 1998 | A |
5809111 | Matthews | Sep 1998 | A |
6005870 | Leung et al. | Dec 1999 | A |
6108559 | Astrom et al. | Aug 2000 | A |
6148212 | Park et al. | Nov 2000 | A |
6246871 | Ala-Laurila | Jun 2001 | B1 |
6335962 | Ali et al. | Jan 2002 | B1 |
6351523 | Detlef | Feb 2002 | B1 |
6360272 | Lincke et al. | Mar 2002 | B1 |
6480885 | Olivier | Nov 2002 | B1 |
6522727 | Jones | Feb 2003 | B1 |
6615036 | Haas et al. | Sep 2003 | B1 |
6751298 | Bhogal et al. | Jun 2004 | B2 |
6829334 | Zirngibl et al. | Dec 2004 | B1 |
6868143 | Menon et al. | Mar 2005 | B1 |
6879847 | Kato | Apr 2005 | B1 |
6912275 | Kaplan | Jun 2005 | B1 |
6937868 | Himmel et al. | Aug 2005 | B2 |
6981023 | Hamilton et al. | Dec 2005 | B1 |
7095828 | Elliot et al. | Aug 2006 | B1 |
7142648 | Miller | Nov 2006 | B1 |
7171186 | Miyachi et al. | Jan 2007 | B2 |
7248857 | Richardson et al. | Jul 2007 | B1 |
7277529 | Wuthnow et al. | Oct 2007 | B1 |
7283809 | Weinman | Oct 2007 | B1 |
7369648 | Chang | May 2008 | B1 |
7680491 | Zabawskyj et al. | Mar 2010 | B2 |
7738833 | Bettis et al. | Jun 2010 | B2 |
7796977 | Vander Veen | Sep 2010 | B2 |
7826831 | Bettis et al. | Nov 2010 | B2 |
7894580 | Veen et al. | Feb 2011 | B2 |
8320535 | Alperin et al. | Nov 2012 | B2 |
8644463 | Demmitt et al. | Feb 2014 | B2 |
20020015403 | McConnell et al. | Feb 2002 | A1 |
20020037075 | Flanagan | Mar 2002 | A1 |
20020049768 | Peek et al. | Apr 2002 | A1 |
20020077098 | Tilks et al. | Jun 2002 | A1 |
20020112007 | Wood et al. | Aug 2002 | A1 |
20020115429 | Deluca et al. | Aug 2002 | A1 |
20030091169 | Cain | May 2003 | A1 |
20030099341 | Williams | May 2003 | A1 |
20030220784 | Fellenstein et al. | Nov 2003 | A1 |
20040023643 | Vander Veen et al. | Feb 2004 | A1 |
20040081088 | Schinner et al. | Apr 2004 | A1 |
20040139471 | Geen et al. | Jul 2004 | A1 |
20040146147 | Picard et al. | Jul 2004 | A1 |
20040248594 | Wren | Dec 2004 | A1 |
20040252679 | Williams et al. | Dec 2004 | A1 |
20040264658 | Cline et al. | Dec 2004 | A1 |
20050059384 | Kuusinen et al. | Mar 2005 | A1 |
20050089149 | Elias | Apr 2005 | A1 |
20050102368 | Forman et al. | May 2005 | A1 |
20050113078 | Deitrich | May 2005 | A1 |
20050186944 | True et al. | Aug 2005 | A1 |
20050213715 | Winick | Sep 2005 | A1 |
20060003745 | Gogic | Jan 2006 | A1 |
20060025114 | Bales et al. | Feb 2006 | A1 |
20060025140 | Bales et al. | Feb 2006 | A1 |
20060031470 | Chen et al. | Feb 2006 | A1 |
20060059361 | Paden | Mar 2006 | A1 |
20060062356 | Vendrow | Mar 2006 | A1 |
20060171511 | Liu et al. | Aug 2006 | A1 |
20060173959 | McKelvie et al. | Aug 2006 | A1 |
20060239419 | Joseph et al. | Oct 2006 | A1 |
20060251222 | Abramson et al. | Nov 2006 | A1 |
20060253584 | Dixon et al. | Nov 2006 | A1 |
20060281443 | Chen et al. | Dec 2006 | A1 |
20070038483 | Wood | Feb 2007 | A1 |
20070066284 | Gatzke et al. | Mar 2007 | A1 |
20070127632 | Swingle et al. | Jun 2007 | A1 |
20070127663 | Bae | Jun 2007 | A1 |
20070140443 | Woodring | Jun 2007 | A1 |
20070143106 | Dunsmuir | Jun 2007 | A1 |
20070173233 | Vander Veen et al. | Jul 2007 | A1 |
20070180032 | Pearson | Aug 2007 | A1 |
20070180504 | Hung | Aug 2007 | A1 |
20070207785 | Chatterjee et al. | Sep 2007 | A1 |
20070213050 | Jiang | Sep 2007 | A1 |
20070223666 | Teague | Sep 2007 | A1 |
20070239833 | Alperin et al. | Oct 2007 | A1 |
20070287453 | Wang | Dec 2007 | A1 |
20080008163 | Castell et al. | Jan 2008 | A1 |
20080008299 | Didcock et al. | Jan 2008 | A1 |
20080056459 | Vallier et al. | Mar 2008 | A1 |
20080062246 | Woodworth et al. | Mar 2008 | A1 |
20080062938 | Gil-soo et al. | Mar 2008 | A1 |
20080081609 | Burgan et al. | Apr 2008 | A1 |
20080140767 | Rao et al. | Jun 2008 | A1 |
20080167007 | Novick et al. | Jul 2008 | A1 |
20080167010 | Novick et al. | Jul 2008 | A1 |
20080167014 | Novick et al. | Jul 2008 | A1 |
20080188204 | Gavner | Aug 2008 | A1 |
20080200152 | Moore | Aug 2008 | A1 |
20080207176 | Brackbill et al. | Aug 2008 | A1 |
20080243513 | Bucchieri et al. | Oct 2008 | A1 |
20080260118 | Lyle | Oct 2008 | A1 |
20080298459 | Yang et al. | Dec 2008 | A1 |
20080300873 | Siminoff | Dec 2008 | A1 |
20090149220 | Camilleri et al. | Jun 2009 | A1 |
20090239507 | Sigmund et al. | Sep 2009 | A1 |
20090253407 | Sigmund et al. | Oct 2009 | A1 |
20090253412 | Sigmund et al. | Oct 2009 | A1 |
20090253413 | Sigmund et al. | Oct 2009 | A1 |
20100159886 | Sigmund et al. | Jun 2010 | A1 |
20100159888 | Sigmund et al. | Jun 2010 | A1 |
20100159889 | Sigmund et al. | Jun 2010 | A1 |
20100159890 | Sigmund et al. | Jun 2010 | A1 |
20100159891 | Sigmund et al. | Jun 2010 | A1 |
20100166161 | Dhawan et al. | Jul 2010 | A1 |
20100167699 | Sigmund et al. | Jul 2010 | A1 |
20100189229 | Sigmund et al. | Jul 2010 | A1 |
20100195807 | Sigmund et al. | Aug 2010 | A1 |
20100222024 | Sigmund et al. | Sep 2010 | A1 |
20130010937 | Sigmund et al. | Jan 2013 | A1 |
20130012173 | Sigmund et al. | Jan 2013 | A1 |
20130040614 | Sigmund et al. | Feb 2013 | A1 |
Number | Date | Country |
---|---|---|
0 631 452 | Dec 1994 | EP |
1 113 631 | Jul 2001 | EP |
1 434 415 | Jun 2004 | EP |
1 599 022 | Nov 2005 | EP |
2005 0001246 | Jan 2005 | KR |
WO 9745991 | Dec 1997 | WO |
WO 9803005 | Jan 1998 | WO |
WO 0073947 | Dec 2000 | WO |
WO 02065745 | Aug 2002 | WO |
WO 2004046895 | Jun 2004 | WO |
WO 2007081929 | Jul 2007 | WO |
WO 2007095510 | Aug 2007 | WO |
WO 2007096866 | Aug 2007 | WO |
WO 2008034555 | Mar 2008 | WO |
WO 2009029296 | Mar 2009 | WO |
WO 2009029297 | Mar 2009 | WO |
WO 2009029298 | Mar 2009 | WO |
WO 2009029313 | Mar 2009 | WO |
WO 2009029314 | Mar 2009 | WO |
WO 2009029323 | Mar 2009 | WO |
WO 2009029324 | Mar 2009 | WO |
WO 2009029328 | Mar 2009 | WO |
WO 2009029330 | Mar 2009 | WO |
WO 2010002382 | Jan 2010 | WO |
Entry |
---|
Notice of Allowance mailed on Dec. 30, 2013 in U.S. Appl. No. 12/160,931. |
Office Action mailed Jan. 21, 2014 in U.S. Appl. No. 13/654,480. |
Office Action mailed Oct. 22, 2013 in U.S. Appl. No. 13/930,210. |
U.S. Office Action dated May 22, 2012 in U.S. Appl. No. 12/485,335. |
U.S. Office Action dated Apr. 24, 2012 in U.S. Appl. No. 12/160,940. |
U.S. Notice of Allowance dated Jun. 21, 2012 in U.S. Appl. No. 12/161,021. |
U.S. Office Action dated Jun. 6, 2012 in U.S. Appl. No. 12/161,033. |
U.S. Notice of Allowance dated Jul. 17, 2012 in U.S. Appl. No. 12/161,076. |
U.S. Office Action dated Jul. 18, 2012 in U.S. Appl. No. 12/161,035. |
U.S. Notice of Allowance dated Jul. 24, 2012 in U.S. Appl. No. 12/161,033. |
U.S. Office Action dated Jul. 30, 2012 in U.S. Appl. No. 12/161,027. |
U.S. Office Action dated Aug. 30, 2012 in U.S. Appl. No. 12/160,931. |
U.S. Notice of Allowance dated Feb. 28, 2013 in U.S. Appl. No. 12/161,064. |
U.S. Office Action dated Feb. 28, 2013 in U.S. Appl. No. 13/654,480. |
U.S. Appl. No. 13/751,505, filed Jan. 28, 2013 to Sigmund et al. |
U.S. Appl. No. 13/785,710, filed Mar. 5, 2013 to Sigmund et al. |
U.S. Notice of Allowance dated Jan. 31, 2013 in U.S. Appl. No. 12/485,961. |
U.S. Notice of Allowance dated Dec. 27, 2012 in U.S. Appl. No. 13/616,198. |
U.S. Notice of Allowance dated May 26, 2011 in U.S. Appl. No. 12/201,945. |
U.S. Official Action dated Sep. 19, 2011 in U.S. Appl. No. 12/477,971. |
U.S. Official Action dated Apr. 25, 2012 in U.S. Appl. No. 12/477,971. |
U.S. Official Action dated Oct. 13, 2011 in U.S. Appl. No. 12/485,335. |
U.S. Official Action dated Apr. 27, 2012 in U.S. Appl. No. 12/160,931. |
U.S. Official Action dated Dec. 22, 2010 in U.S. Appl. No. 12/160,940. |
U.S. Official Action dated May 31, 2011 in U.S. Appl. No. 12/160,940. |
U.S. Official Action dated Apr. 26, 2012 in U.S. Appl. No. 12/160,946. |
U.S. Official Action dated Jan. 12, 2011 in U.S. Appl. No. 12/161,021. |
U.S. Official Action dated Jun. 1, 2011 in U.S. Appl. No. 12/161,021. |
U.S. Official Action dated Dec. 15, 2011 in U.S. Appl. No. 12/161,021. |
U.S. Official Action dated Nov. 29, 2010 in U.S. Appl. No. 12/161,027. |
U.S. Official Action dated May 10, 2011 in U.S. Appl. No. 12/161,027. |
U.S. Official Action dated Nov. 23, 2011 in U.S. Appl. No. 12/161,027. |
U.S. Official Action dated Dec. 27, 2010 in U.S. Appl. No. 12/161,033. |
U.S. Official Action dated May 31, 2011 in U.S. Appl. No. 12/161,033. |
U.S. Official Action dated Nov. 29, 2011 in U.S. Appl. No. 12/161,033. |
U.S. Official Action dated Dec. 23, 2010 in U.S. Appl. No. 12/161,035. |
U.S. Official Action dated Jun. 2, 2011 in U.S. Appl. No. 12/161,035. |
U.S. Official Action dated Dec. 2, 2011 in U.S. Appl. No. 12/161,035. |
U.S. Official Action dated Jan. 24, 2011 in U.S. Appl. No. 12/161,064. |
U.S. Official Action dated Jul. 8, 2011 in U.S. Appl. No. 12/161,064. |
U.S. Official Action dated Jan. 30, 2012 in U.S. Appl. No. 12/161,064. |
U.S. Official Action dated Jan. 19, 2011 in U.S. Appl. No. 12/161,076. |
U.S. Official Action dated Jul. 1, 2011 in U.S. Appl. No. 12/161,076. |
U.S. Official Action dated Jan. 17, 2012 in U.S. Appl. No. 12/161,076. |
International Search Report & Written Opinion dated Sep. 18, 2008 in PCT Application PCT/US08/67612. |
International Search Report & Written Opinion dated Aug. 1, 2008 in PCT Application PCT/US08/61493. |
International Search Report & Written Opinion dated Nov. 12, 2008 in PCT Application PCT/US08/65046. |
International Search Report & Written Opinion dated Mar. 13, 2009 in PCT Application PCT/US08/68738. |
International Search Report & Written Opinion dated Oct. 29, 2008 in PCT Application PCT/US08/67176. |
International Search Report & Written Opinion dated Sep. 4, 2008 in PCT Application PCT/US08/54074. |
International Search Report & Written Opinion dated Sep. 3, 2008 in PCT Application PCT/US08/61592. |
International Search Report & Written Opinion dated Sep. 4, 2008 in PCT Application PCT/US08/67152. |
International Search Report & Written Opinion dated Nov. 6, 2008 in PCT Application PCT/US08/67591. |
International Search Report & Written Opinion dated Aug. 28, 2008 in PCT Application PCT/US08/61437. |
Office Action mailed on Aug. 16, 2013 in U.S. Appl. No. 13/654,480. |
Office Action mailed on Jun. 4, 2013 in U.S. Appl. No. 13/785,710. |
U.S. Office Action dated Oct. 4, 2012 in U.S. Appl. No. 12/485,484. |
U.S. Office Action dated Oct. 2, 2012 in U.S. Appl. No. 12/485,961. |
U.S. Office Action dated Sep. 14, 2012 in U.S. Appl. No. 12/161,064. |
U.S. Notice of Allowance dated Nov. 21, 2012 in U.S. Appl. No. 12/477,971. |
U.S. Notice of Allowance dated Nov. 23, 2012 in U.S. Appl. No. 12/485,335. |
U.S. Notice of Allowance dated Oct. 25, 2012 in U.S. Appl. No. 12/160,940. |
U.S. Office Action dated Oct. 11, 2012 in U.S. Appl. No. 12/160,946. |
U.S. Notice of Allowance dated Nov. 16, 2012 in U.S. Appl. No. 12/161,027. |
Office Action mailed Jun. 18, 2014 in U.S. Appl. No. 13/613,525. |
Number | Date | Country | |
---|---|---|---|
20110085646 A1 | Apr 2011 | US |