Not applicable.
The field of the invention is telephony systems and more specifically a system and method for managing large numbers of IVR calls for clients in a hosted IVR system.
In an effort to reduce costs while still providing good service, many businesses have implemented interactive telephony (IT) systems that receive and handle customer phone calls in various ways. For instance, a customer calling a first bank may want to determine an account balance, authorize payment of two bills and also speak to a banking representative about how to arrange a wire transfer of funds from a second bank to the first bank. The account balance and bill payment activities can be handled using an IT system whereby a computer verbally interacts with a customer who responds in voice or via the number pad on a telephone device or another keyboard and the computer guides the customer through a “phone tree” to an application that will verbally announce the account balance and another application that enables the customer to authorize payment or the two bills. After the balance is obtained and the bills are paid, the customer can use the IT system to connect to a bank representative to discuss the wire transfer. Thus, most of the customer's needs can be achieved via a computer without requiring the customer to hold for a bank representative and without requiring human interaction. Overall these systems provide better customer service at a reduced cost and therefore increase competitiveness of the business.
Early IT systems were complex to set up and required highly skilled employees or consultants to develop different functionalities and therefore were relatively expensive to implement, maintain, and modify. For example, early systems required businesses to hire employees or consultants skilled in voice networking, codecs and hardware and services to bridge servers to public phone infrastructures and to train programmers in new software applications, tools and development environments that were, in most cases unrelated to the products and services provided by the businesses. In addition, businesses had to make large capital investments in hardware to run their IT systems.
One solution which appreciably reduces the costs of developing, maintaining and altering an IT system has been provided by third parties that act as intermediaries or gateways between a business and customers. To this end, instead of requiring a business to develop a complete IT application program, the intermediate third party develops reusable functional modules for carrying out different functions required by the IT application program. A business maintains high level application logic on a business server (e.g., a server operated by the business) and links to the functional modules on the third party server each time the application logic requires the process performed by one of the functional modules. Thus, for instance, one functional module may be designed to obtain a number input via a customer voice message where options include the numbers one through five for routing customers to different sections of a phone tree. Each functional module is accessible via a simple application program interface (API). Unless indicated otherwise, a third party server used to maintain and develop IT systems will be referred to as a gateway server and a business that uses a gateway server to provide IT services to customers will be referred to as an “end user” or “telephony client”.
In addition to unloading expertise and hardware costs associated with an IT system onto an expert third party, existing gateway type systems have enabled web developers working for telephone clients to use their existing skills and tools to develop IT applications which makes IT application development as easy as web programming. For instance, in at least some cases a gateway enables a familiar web site visitor model to interact with a web developer's application. Within the model, developers reuse existing tools and techniques including familiar concepts like HTTP redirects, accessing functional modules through an API and mime-type responses to construct complex IT applications.
In operation, when a customer calls a telephony client (e.g., a business that has contracted with a gateway for IT services), the gateway server intercepts the call, identifies the telephony client associated with the phone number used to initiate the call and uses a URL to link to a server controlled by the telephony client that starts the IT process. The gateway server and client server communicate via HTTP requests from the gateway server to the client server and HTTP responses from the client server to the gateway server where the requests provide information to the client server and the responses indicate next functional modules to perform per the high level IT application run by the client server.
While existing gateway type systems have proven useful in reducing expertise and capital outlays required by end users when implementing IT systems, existing gateway systems have several shortcomings. First, because the IT application logic is maintained by each telephone client that uses a gateway system, each telephone client still has to dedicate resources to the IT system. As an IT application becomes more complex, the resources required for a telephone client to maintain the IT application become greater. Similarly, as a business grows and more customers use a telephone client's IT system, the client has to dedicate more resources to capabilities to handle larger numbers of simultaneous calls from customers.
Second, IT application development still requires training in web programming tools. While many programmers are already trained in web application programming, many small businesses do not have programmers on staff and therefore third party consultants are often needed to develop an IT application which increases cost and may limit the ability of some small telephone clients to take advantage of a gateway system.
Third, there is delay each time a message is transmitted from a gateway to a telephone client server that runs an IT application. While the delays are short in many cases, the delays can be bothersome in at least some cases and therefore any solution that can reduce latency during a call would be useful.
Fourth, during programming an IT application using a gateway there is no easy way to test a portion of an IT application so that the developer can get a sense of what a customer will experience when the IT application is deployed. On the fly testing of application functions would be extremely useful and would enable a an application developer to test different activities and develop a better overall IT application for an telephone client.
It has been recognized that the gateway server in existing gateway type IT systems can be replaced by a platform server that performs many of the functions of a telephone client server in gateway type systems. Thus, for instance, the platform server can provide an application developers interface for use by client application developers for developing IT applications and can store and run essentially complete IT applications for telephone clients.
One advantage to having a platform server host entire IT applications is that telephone clients do not have to dedicate extensive resources (e.g. hardware) to their IT systems either initially or continually as their business and IT needs increase with larger customer bases. Another advantage to having a platform server host an entire IT application is that latency in call processes can be eliminated or at least substantially reduced by eliminating the need for requests and responses between a gateway server and an end user server.
In at least some cases a library of pre-canned functional modules are provided by the platform server that can be used to streamline and expedite the IT application development process. For instance, exemplary functional modules may include a “play” module used to play an audio clip or audio file instructing a customer to perform some action (e.g., “Please enter one to obtain an account balance, enter two to pay off a bill, enter three to transfer money, enter . . . ”, a “gather digit” function for obtaining a number entered by a customer, a “say” function causing a voice synthesizer to generate speech corresponding to a text message, etc.
It has also been recognized that a graphical user interface (GUI) can be provided for telephone client application developers that is intuitive and can be used to develop IT application programs. In at least some cases the GUI may enable developers that have no understanding of web development tools to specify a complete IT application. After a developer specifies at least a portion of an IT application, in at least some embodiments the developer may be able to simulate the effects of the specified portion to test out the functionality of the system.
After a complete IT application has been specified via the GUI, the application can be “published” or compiled. To publish the application, a processor takes the visual representation of the application from the GUI and generates executable program code used to implement the IT application. The executable code is stored by the platform server to be executed whenever a customer places a call to an associated telephone client for service. In at least some embodiments the GUI may enable a developer to create a flow chart or block diagram that intuitively shows the flow of an IT application as the application is being developed.
In some cases the system will allow an application developer to use a standard scripting language with pre-defined API extensions to specify IT application code. One particularly advantageous language is the LUA programming language which is a light weight multi-paradigm scripting language. Here, a developer who knows the API extensions can program on their own local computer and then push the LUA program to the platform server. In other cases the platform server will provide a browser based interface for LUA programming and will store the resulting program for a telephone client immediately upon creation.
In some cases a developer may be able to choose between a GUI and a scripting language interface. In some cases after a GUI visual flow is published, the resulting code may be accessible via the scripting language interface to be modified.
These and other objects, advantages and aspects of the invention will become apparent from the following description. In the description, reference is made to the accompanying drawings which form a part hereof, and in which there is shown a preferred embodiment of the invention. Such embodiment does not necessarily represent the full scope of the invention and reference is made therefore, to the claims herein for interpreting the scope of the invention.
The various aspects of the subject disclosure are now described with reference to the drawings, wherein like reference numerals correspond to similar elements throughout the several views. It should be understood, however, that the drawings and detailed description hereafter relating thereto are not intended to limit the claimed subject matter to the particular form disclosed. Rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the claimed subject matter.
As used herein, the terms “component,” “system” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computer and the computer can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers or processors.
The word “exemplary” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs.
Furthermore, the disclosed subject matter may be implemented as a system, method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer or processor based device to implement aspects detailed herein. The term “article of manufacture” (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick). Additionally it should be appreciated that a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN). Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
Referring now to the drawings wherein like reference numerals correspond to similar elements throughout the several views and, more specifically, referring to
Referring still to
Client server 14 is operated by a telephony client (e.g., a service provider's customer) and may perform various processes and run various software programs required for the client to run its business. For instance, in the case of a full service automotive dealer, the software programs may manage automobile inventory, a service department, a parts department, a sales department, an accounting department, a procurement department, etc. As another instance, in the case of a bank, the software programs may manage customer saving accounts, bank loan accounts, real estate assets, legal matters, security, etc. Server 14 generates data while running programs and that data is stored in client database 20. The data in database 20 is accessed by server 14 for various purposes.
Client interface 15 can be any type of computer including a desktop, a laptop, a tablet type computing device, a smart phone, etc. The exemplary device 15 includes a keyboard for entering information and also a display screen 22. Device 15 is linked to client server 14 and can be used to run various applications required to manage the client's business. In addition to running business management applications, interface 15 may also be used by a client's employee or a third party contractor (hereinafter “a client developer”) working for the client to develop an interactive telephony application. To this end, a client developer may use interface 15 to link to platform server 12 and access a browser based application development interface via screen 22 that can be used to specify a complete IT application as will be described in detail hereafter.
Referring still to
Platform server 12 is also linked to platform database 18 which stores development programs for developing tenant IT applications, applications specified using the development programs and data generated using the development programs and data generated when running the IT applications as well as other software used to manage overall server operation. To this end, database 18 stores application development programs 30 used by tenant developers to develop customized IT applications. The application development programs include functional modules collectively identified by numeral 31 that can be used by a developer to specify pre-canned functions for an application. For instance, if a developer wants an IT application to annunciate a greeting and initial instructions when a call is received, a “say” functional module 31 may be instantiated as part of an application where text entered into the functional module after selection is converted into a voice message when that functional module occurs in the flow of the application. As another instance, if a developer wants to collect a number entered into a keypad on a customer's device 16, a “gather digit” functional module 31 may be instantiated to obtain an entered digit and provide the digit to the application program for further processing. The functional modules are designed to be intuitive and will, in at least some cases, be limited in number so that learning how to use the modules is a trivial task for most client employees.
Referring still to
Application column 40 lists a separate application for each of the numbers in column 36. For instance, an “IVR Application 1” corresponds to number “1111” in column 36, an “IVR Application 2” corresponds to number “1222” in column 36 and so on. Each of the applications is associated with a different interactive telephony process.
Data column 42 includes data that has been entered by a tenant application developer for each of the applications in column 40 where the data is useable to modify application functionality without altering the application itself. For instance, the data in column 42 can be used to specify a language (e.g., English, Spanish, etc.) to be used by the application, to set parameters to be used when the application is run, etc. For example, for the first instance of IVR Application 2 in column 40, the data in column 42 specifies the English language, for the first instance of Advanced App 1 in column 40, data in column 42 specifies two variable values Foo and Bar and for the second instance of Advanced App 1 in column 40 data in column 42 specifies that a male voice should be used when voice messages are broadcast. As shown in
Referring again to
By storing the IT application code files independent of identity of the developing client, IT applications may be used by more than one client. For instance, a service provider may want to enable a second client to use a first application developed by a first client. In this case, the service provider may simply enter the unique application ID for the first application (e.g., the application developed by the first client) into an application table associated with the second client. This action makes the first application available for the second client to use but, in at least some cases, will disable the second client from being above to edit the first application.
Referring yet again to
While
Referring again to
Referring still to
Referring still to
Any executable application code file will include commands that are part of the LUA or other programming language as well as other commands that were specified by a client developer or that result from actions by a client's customer linked to a call. Any code commands that were specified by a client developer or result from actions by a client's customer are considered un-trusted. All un-trusted code is passed through the sandbox API 63 where the un-trusted code is run in a secure manner that prohibits actions that are not known and supported by the system. To this end, the sandbox API performs security checks on the un-trusted code and makes sure the code is using API functions correctly. Where un-trusted code cannot be deciphered, the code is ignored and an error message may be generated. Where un-trusted code is understood, the code is either passed on to one of the voice control, the utilities or the web services APIs 64, 65 or 71, respectively, to be processed, or the function specified by the code is mapped into correctly formatted API calls that the system can use and the correctly formatted calls are passed on to API's 64, 65 or 71. For example, if executable code includes the command “channel.play (‘filename.mp3’)”, a LUA interpreter running the code would pass the play command on to the sandbox API. In the sandbox API, the play command is performed which takes in the argument ‘filename.mp3’ and makes sure that the file specified by the argument exists. If the file specified does not exist, the command is ignored. If the file specified exists, the sandbox API maps the command to the voice control API that actually plays the file.
Utilities API 65 is used to perform functions that have been defined by other sources such as a third party. For instance, a date parser functional module may be provided by a third party to be called via a utility API. A program to convert HTML documents to another form may be provided by another third party to be called via an API. Other utilities APIs are contemplated.
Web services API 71 is used to control web service calls to external services. For instance, if an application requires retrieval of data managed by a client server 14, a web service call may be generated using API 71 to link to server 14 to access the required data. As another instance, if a client customer wants to transfer money from one account to another, API 71 may be used to update or alter at least some data in a client's database 20 to reflect the transfer. The web services API may also be used to obtain data or change data maintained by a third party.
Referring now to
Referring again to
Referring now to
Visual flow space 164 is a space in which the developer can create the visual flow of an IT application by adding programming functions to the space, connecting the functions and adding properties to the functions. A set of functions are represented as separate blocks in tool bar 160 including a “Play” block 166, a “Say” block 168, a “Gather Digit” block 170, a “Gather Voice” block 172, a “Transfer” block 174, a “Web Service” block 176 and a “Hang-up” block 178. Other function blocks are contemplated and, where a full set of function blocks cannot be presented in the tool bar 160, a vertical scrolling tool 180 may be provided to scroll through the blocks.
Each of the blocks 166 through 178 can be selected to instantiate an instance of the associated function within visual flow space 164 to add the associated function to the application being developed. Block selection may include selecting a block with cursor 200 and dragging the block into space 164, double clicking on a block to create an instance of the block in space 164, etc. Once a block instance has been created, the block can be moved about in space 164, can be linked to other blocks, can be deleted, etc. At least some of the blocks can be customized by setting different characteristics as will be explained in greater detail below.
Referring still to
The web service block 176 can be used by server 12 to access other functions performed by other servers. For instance, referring again to
In addition to being useful for retrieving data, a web service call may be used to modify, delete or add to data maintained by a third party. For instance, a customer may use an IT application to change a delivery data for furniture being delivered to the customer's home. Here, a web service call may be used to alter data in a delivery database. Other web services are contemplated.
Hang-up block 178 causes platform server 12 to hang up a customer call.
Connector tool toolbar 162 includes connector tools that can be used to link function block instances within space 164 together to form a visual flow. Only one exemplary connector tool 182 is shown but other tools are contemplated. Here, once a tool 182 is selected, cursor 200 takes on additional functionality and may be used to draw lines between blocks to specify process flow.
Publish icon 190 is selectable to submit the visual flow within space 164 to server 12 to be compiled into LUA execution code. Quit icon 192 can be selected to exit the developer's software program.
Referring again to
In other embodiments, instead of expanding a placed cell to indicate additional properties that may be set, other interface tools may be used. For instance, in some cases when some additional information is required for a function like text to be voiced, upon placing the block a sub-window may be opened requesting entry of the text to be voiced or other required information. In other cases a sub-window may be opened upon clicking on a block instance or upon hovering cursor 200 over the instance to access tools for setting properties.
Referring again to
Referring to
Referring again to
To deploy application code for use, a developer has to push the executable code to the platform server for storage. When a developer attempts to push new code to the platform server, the server 12 requires the developer to securely log into the system and add the application and an associated number to the tenant's call routing table (see again
In
Referring again to
Exemplary LUA execution code that may be published from a visual flow or may be directly entered via the LUA scripting interface that corresponds to the simple process shown in
Referring now to
While a simple process is described above in relation to
Referring to
In at least some embodiments it is contemplated that as a client developer uses one of the interfaces to specify a telephony application, the developer may be able to run the application in intermediate form to experience what a customer would experience when using the system. To run an application, an application code file has to be generated. Thus, when the GUI interface is used, the visual flow of an application has to be compiled prior to testing. In the case of the scripting interface, the code file already exists and therefore no compilation is required.
Referring to
Referring again to
Referring again to
A new interactive telephony or interactive voice recognition telephony system has been described where client developers can use either a GUI interface or a scripting language interface to develop LUA code or other familiar language code to specify customized and complex interactive telephony applications. Pre-developed functional modules are provided by a service provider that facilitate routinely useful functions which can be called via API calls from within applications. The telephony application programs are not run by clients themselves. Rather, after deployment, the application programs are stored and run by a platform server maintained by a telephony service provider. The service provider receives calls to the telephony client and facilitates client specified applications so the client need not dedicate substantial resources to facilitate interactive telephony services. The service provider uses web services to access client stored data and/or to change client stored data when necessary.
While the invention may be susceptible to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and have been described in detail herein. However, it should be understood that the invention is not intended to be limited to the particular forms disclosed. For example, while the system is described above as one where a telephony client can develop an interactive telephony application using a browser based interface provided by a platform server operated by a service provider independent of the client, in other embodiments it is contemplated that a client may use a local LUA scripting interface that is independent of the service provider to develop LUA code. Here, the client developer can should be familiar with a set of API calls used to access code for performing functional sub-processes that are supported by the system so that those calls can be used within the LUA code. After a complete LUA code file is specified using the local interface, the client developer can push the code file to the service provider's server for storage, association with numbers in the client's routing table and ultimate deployment to be used to field calls from customers.
As another example, as briefly discussed above, the processes and functions performed by the platform server 12 may be distributed and performed by a set of cooperating servers. For instance, application development may be handled by one server, data storage may be handled by another server, running application code may be facilitate by a third server and so on. One important aspect here is that none of the platform server operations are performed by the telephony client.
Referring again to
In at least some embodiments it is contemplated that a software tool called Docker may be used to provide call containers 60 (see
In general, Docker containers work well for companies that run a relatively small number of programs (e.g., 5-10) where program startup time need not be extremely fast (e.g., a few seconds start up time is acceptable) and where the programs need to be isolated and run for long periods of time. For instance, a company may open 10 containers and persistently run ten application programs, one in each of the 10 containers. Here, if an eleventh container is needed for some reason, an eleventh container can be instantiated for use, typically within a short period. Container instantiation includes a container staging process (e.g., a staging state) at the end of which a container is in an idle (i.e., ready) state and available for activation to run an application program.
In the case of a telephony service provider operating a platform server as described above, one problem is that call volume fluctuates wildly at times and can be unpredictable. For instance, during the course of a day, call volume may fluctuate from high to low several times and, at times, may fluctuate from high to low and back within a matter of just a few seconds. Here, if containers are instantiated just in time when required for newly received calls, telephony client customers can experience an objectionable delay in IVR performance when a large number of containers need to be staged at substantially the same time.
One solution to the staging associated delay is to maintain large number of surplus idle containers ready for immediate activation when new calls are received so that there are always available idle containers to handle call volume spikes. For instance, a telephony service provider may have a rule of thumb that the provider wants to maintain at least 20% more idle containers available for use over their highest number of previously simultaneously handled calls. For example, where a maximum number of calls simultaneously handled by platform server 12 in the past has been 10,000, the provider may maintain at least 12,000 containers active or idle all the time. Here, after a container completes a call application (e.g., after a client customer ends a call process), the container may be returned to the idle state inventory for subsequent use in handling another received call.
Unfortunately, maintaining idle containers requires hardware overhead and therefore there is an appreciable cost associated with systems that maintain excessively large idle container inventories. For instance, while 10,000 or more call containers may be needed during high volume periods, less than 1,000 containers may be needed during low volume periods and therefore, where 12,000 containers are maintained idle or active at all times, during low volume periods 11,000 containers may be idle.
One other problem with container based systems is that container reuse can cause one call process to contaminate and cause a malfunction in a subsequent call process that is handled by the same container. For instance, in at least some cases, at least a sub-set of data from a first call may persist within an idle container or an application state may persist in an idle container after a call application has been completed and when a subsequent call application is performed by the same container. Not surprisingly, this data or application state persistence can causes errors in handling of subsequent calls.
One solution for handling the data/state persistence problem associated with reuse of a container that is consistent with at least some embodiments of the present disclosure is to “kill” the container after a single call application has been completed (e.g., after the application enters a “finished” state). Here, instead of reusing a previously “used” container (e.g., a container that has already run a call application for a single call) for a subsequent call, each call would be handled by an entirely new and unused container so that data and application state persistence would be impossible.
One solution for handling the problems associated with an excessively large idle container inventory is to monitor container states and dynamically control the number of idle containers in the idle container inventory so that there is always an idle container ready to handle a newly received call but where the total number of idle containers in inventory does not exceed the number required to handle an anticipated large spike in simultaneous calls.
The process for dynamically controlling the idle container inventory size can take many different forms. For instance, instead of following a rule of thumb to maintain 20% more idle containers available for use over a highest number of previously simultaneously handled calls, a different rule of thumb may be to maintain the greater of 300 idle containers and 20% more idle containers available for use over a current number of ongoing calls. Here, at least 300 idle containers would be maintained at all times but the number of idle containers would be increased if the total number of currently on going calls exceeds 1500 (e.g., 20% of 1501 is greater than 300). As another instance a different inventory requirement may require that the total number of idle containers in an inventory be tied temporally to historical call volume requirements. For instance, if it is known that a call spike occurs every morning from 8 AM to 10 AM, the inventory size may automatically be ramped up just prior to 8 AM to a level required to handle the anticipated spike. As one other instance, another inventory requirement may tie the number of idle containers in inventory to the maximum rate of call volume increase in the past, during a specific time period, a specific period during a day, during a specific sub-period during a week, to a specific sub-period of a year, etc. For instance, one inventory rule may be that the inventory during a 4 AM to 8 AM period be tied to the maximum rate of call volume increase in the past during the 4 AM to 8 AM time slot while the inventory during the 8 AM to 10 AM period is tied to the maximum rate of call volume increase in the past during the 8 AM to 10 AM time slot. In some cases the inventory requirement may change over time as a system server learns from real time control how an inventory number should change and be controlled to meet the ultimate goal of minimizing inventory size while still ensuring that idle containers exist in the inventory for every new call received. As one other instance, a very simple inventory requirement may be that at least 400 idle containers should be maintained in inventory at all times based on a monitored idle inventory count.
In still other cases some other condition associated with container states may be used as a trigger to increase idle container inventory. For instance, in some cases the state monitoring container may only increase idle container inventory whenever a new call requires staging of a new container to handle the call. Thus, for example, where an initial inventory of 300 idle containers is eventually used up or active to handle existing calls, when a 301st call is received and a new container has to be staged to handle the call, the state monitoring container may be programmed to stage another 300 containers to replenish the inventory. Here, while some calls may experience some delays, most calls would not as the inventory would only require staging of a new container for an already received call some of the time.
Another inventory rule may simply require that the state monitoring container count the number of activated containers and always maintain a running idle container count that exceeds the activated container count by a set number of containers (e.g., 300) without tracking the number of killed containers. Here, the inventory would always be 300. Many other inventory requirements or target rules are contemplated.
In some cases, the number of idle containers and the number of total open containers (e.g., staged, idle, active and finishing (e.g., at the end of an application)) may be tracked and compared to determine when additional idle containers need to be opened and when existing unused idle containers should be closed. For instance, each time one idle container is activated to run an application to handle a received call, the numbers of idle and open containers may be compared and the number of idle containers adjusted to meet a dynamic idle container inventory target. As another instance, each time one active container completes a call application and is killed, the numbers of idle and open containers may be compared to determine how to adjust (e.g., stage or kill) the number of idle containers in inventory.
To regulate the idle container inventory size, in at least some embodiments, at least one persistent state monitoring container (hereinafter “the state monitoring container”) may be instantiated to run a special call management application that tracks container states and manages staging new containers and killing unnecessary idle containers pursuant to a dynamic idle container number target, rule or requirement. Here, each call container may be programmed to track its own state and to report any or at least a subset of state changes to the state monitoring container immediately upon its occurrence. For instance, each application may include code causing a container to report out application initiation to the state monitoring container at the beginning of the application code so that the monitoring container knows when a container moves from the idle state to an active state. As another instance, each application may include code causing an associated container to report out when an application ends and that the container has again entered an idle state and should be killed off. Here, where the number of idle containers exceeds a dynamic goal, the state monitoring container may request that at least a sub-set of idle containers be killed (e.g., closed). Where the number of idle containers is less than a dynamic number target, the state monitoring container may cause the platform processor 12 to stage instantiation of additional idle containers for subsequent use.
When idle containers are to be killed, the state monitoring container can kill the containers in any of several different ways. For instance, the monitoring container may transmit a specific “kill” message to each separate idle container that is to be killed. As another instance, the state monitoring container may transmit a group message to a subset of containers (e.g., 300) indicating that if a receiving container is in the idle state, the container should be killed off. Here, where an initial group message achieves an idle container target number, the process of monitoring the goal would continue. Where an initial group message does not achieve a container goal within some pre-defined time period (e.g., some of the containers that receive the initial message are not idle and therefore do not act on the kill command), the monitoring container may transmit another group message to a different subset of containers requesting that idle containers be killed off within that subset. This triage process would continue until an instantaneous dynamic idle container inventory target is achieved.
In particularly advantageous embodiments, as described above, each container is only used once to perform a single call application after which the container is immediately killed. Here, where a “used” container is killed off, idle container number reduction can be accomplished by simply not staging new containers as applications are completed. In this case, the state monitoring container would still track the idle container number and compare that number to an idle container goal so that if the idle container number drops below an instantaneous goal, new containers could be staged rapidly to continually replenish the idle container inventory and meet the inventory number target. In some cases used containers would be killed pursuant to a command from the state monitoring container. In other cases it is contemplated that each application program could include a container killing code segment to automatically kill off the container at the end of an application program.
One advantage associated with a system where used containers are killed off automatically after an associated application is completed is that the problem of data persistence among consecutive applications run within the same container is entirely avoided. Thus, here, because applications are only performed in new and previously unused containers, there is no possibility of data, application state or code from a prior application contaminating a new application.
Referring once again to
While some systems may have a single state monitoring container 61 that monitors container states and numbers for all CCS's (e.g., 56a through 56d in
Referring now to
Once a new call is received at block 524, control passes to block 526 where the called number is used to identify a client call routing table (see again
At decision block 532 the number of idle containers in inventory 500 is compared to the low end of the idle container inventory target range (e.g., to the value 300 and 20% of the total number M of open containers). When the number of idle containers in inventory is greater than or equal to this low end range value, control passes to block 536. When the number of idle containers in inventory is less than the low end range value, control passes to block 534 where state monitoring container 61 stages a new idle container which is added to inventory 500. As shown, the low end of the inventory range is the greater of 300 and 20% of the total open (e.g., active and staging) containers. While only one container is staged at process block 534, in other embodiments it is contemplated that a plurality (e.g., 50 or some percentage (e.g., 15%) of the instantaneous number of open containers) of containers may be staged whenever the inventory target is not achieved at decision block 532.
Referring still to
Referring still to
In at least some cases a container running a call application will get hung up and run in an endless cycle for some reason. Here, in at least some embodiments it is contemplated that when an application stops progressing for some reason, the state monitoring container may recognize the hung up condition and perform some process to deal with the condition. For instance, in some cases, once some threshold level of certainty is reached that an application has ceased working is achieved, the state monitoring container may send a kill message to the container associated with the application causing the application to be killed or closed out. When a container handling a call is killed in this fashion, the call is simply ended and the client customer has to call back into the system and start the application process over in a new container.
In other cases it is contemplated that the state monitoring container may cause any hung up call to be rerouted to a different container in which a call cancel notification application is run. For instance, when a call gets hung up in one container, the calling customer may be linked to a new container in which an application simply plays the message “An error has occurred, please call back for service. Thank you.” Once the call is redirected to the new container, the container associated with the application that got hung up could be killed. Once the cancel notice message has been broadcast and the related application has ended, the container associated with the cancel notification can be killed.
In still other cases it is contemplated that each call application may track and store state information during a call which could be used to inform another instance of the application about application state when an application becomes hung up and that information could be used to drive the new instance of the application so that an associated call does not have to be reinitiated. For instance, an application may track the current step in the application process to which a customer progressed as well as data associated with customer's interactions with the application process up to the point at which the application became hung up. Here, when a first instance of the application gets hung up, upon the state monitoring container recognizing the hung up state, the monitoring container may open a new or second instance of the hung up application in a new container and then use the state and data from the first instance of the application to move to a point in the second instance of the application at which the hang up occurred so that the customer could proceed from that point instead of requiring the customer to call back into the system and restart the process anew. In at least some cases the application state information stored may include state information just prior to the time at which a hang up occurs so that if the hang up was due to the most recently developed state information in the first instance of the application, that information would not be ported to the second instance of the application.
In still other cases where an application gets hung up for some reason prior to completion of a call, the state monitoring server may simply start a second instance of the hung up application in a new second container and then kill the first container, thereby requiring the customer to restart the application process without having to recall into the system. Here, in some cases an intermediate container (e.g., one that operates after the initial container and prior to the second container) may be activated and the call routed thereto to provide some guiding instruction like “An error occurred, this process will start again from the beginning”, prior to routing the call to the second container to restart the application process.
Thus, the invention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the following appended claims. For instance, while the system is described above as one where a state monitoring container monitors all container states and regulates idle container inventory to a target number or range, in other cases it is contemplated that some other system operating characteristic may be monitored and factored into the decision of when to stage new containers. For instance, in some cases, the state monitoring container may simply monitor the number of calls received by a system and may tie new container staging to that operating characteristic as opposed to an actual inventory count. Thus, where 500 new calls are received in a few second period, the monitoring container may stage 500 or more new containers to be added to the idle inventory. As another instance, the state monitoring container may only stage new containers once an inventory has been depleted without consideration of the states of any other open containers. Thus, here, the monitoring container would only track the current inventory number and not all container states and replenishment would be based on inventory condition alone as opposed to states of all containers.
While the systems described above include a monitoring container that essentially always monitors for an event or condition that warrants a change (e.g., staging or killing) in the number of idle containers, in at least some embodiments it is contemplated that the monitoring container may only operate periodically to assess inventory condition and rejigger the number of idle containers in the inventory. For instance, the monitoring container may only check inventory level every 10 minutes. In some cases the frequency with which inventory is checked may change as a function of temporally proximate system operating characteristics. For instance, if high volume fluctuations are occurring during a period, the monitoring container may reduce the interval between inventory assessment and re-jiggering activities.
To apprise the public of the scope of this invention, the following claims are made:
This application is a continuation in part of U.S. patent application Ser. No. 15/586,824 which was filed on May 4, 2017 which is titled “METHOD AND SYSTEM FOR SPECIFYING AND PROCESSING TELEPHONY SESSIONS” which is a continuation of U.S. patent application Ser. No. 15/159,043 which was filed on May 19, 2016 which is titled “METHOD AND SYSTEM FOR SPECIFYING AND PROCESSING TELEPHONY SESSIONS” which is a continuation of U.S. patent application Ser. No. 14/605,373 which was filed on Jan. 26, 2015 which is titled “METHOD AND SYSTEM FOR SPECIFYING AND PROCESSING TELEPHONY SESSIONS” which claims priority to U.S. provisional patent application Ser. No. 61/946,034 filed on Feb. 28, 2014 and titled “METHOD AND SYSTEM FOR SPECIFYING AND PROCESSING TELEPHONY SESSIONS”. This application also claims priority to U.S. provisional patent application No. 62/367,348 which was field on Jul. 27, 2016 which is titled “CALL MANAGEMENT METHOD AND APPARATUS”. Each of the above applications is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61946034 | Feb 2014 | US | |
62367348 | Jul 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15159043 | May 2016 | US |
Child | 15586824 | US | |
Parent | 14605373 | Jan 2015 | US |
Child | 15159043 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15586824 | May 2017 | US |
Child | 15644967 | US |