The present invention is generally directed to interactive voice response systems and particularly to customizable interactive voice response systems.
Interactive Voice Response (IVR) systems provide a set menu of options to callers and navigation paths from one menu option to another depending on the customer's menu choice. Customers respond to an IVR prompt using touch-tone telephones or speak their response if the IVR has an automatic speech response (ASR) interface. The company paying for the IVR typically provides requirements for the IVR design and maintains the IVR. The menu of options may provide information about the company, access to employees, access to customer account information, and access to an operator, etc.
Should the customer select 1 for new account information (step 40), the customer would have heard the prompt “Press or say 1 for information on Santa Claus accounts. Press or say 2 for information on Certificates of Deposit. Press or say 3 for information on opening an ABC Bank credit card. Press or say 4 for information on opening an Individual Retirement Account. Press or say 5 for rates on Certificates of Deposit. Press or Say 6 for rates on Individual Retirement Accounts.” (Step 80).
If the customer selected 3 to access bank information (step 60), the customer would have heard the prompt, “Press or say 1 for Bank Hours. Press or say 2 for Holiday Hours. Press or say 3 for Directions to the Bank. Press or say 4 to Access the Employee Directory. Press or say 5 to Speak to an Operator.” (Step 88).
Many customers experience frustration with IVR systems that have a lengthy number of menu options, such as, those presented in
At least one known IVR may dynamically customize menus based on past options selected by the customer. This IVR presents personalized menu selections based on information about previous customer behavior from legacy systems, extracts insights about customers based on recent recorded choices and behavior, and matches available service options to recent preferences. Thus, the IVR presents personalized menu selections to sell the customer more products or services that the customer may be interested to hear about based on the customer profile. However, this IVR does not provide the customer the capability to personalize the IVR menus to suit his needs as he sees fit. The customer may not want or appreciate waiting through an interminable menu system and listening to advertisements trying to sell him additional products he no longer wants or needs.
IVR menus, however, do not provide customers the ability to customize an IVR menu to satisfy their particular needs and thereby improve their user experience, such as by instructing the IVR to store a navigation path as a shortcut to a particular type of transaction the next time the customer accesses the IVR. Alternatively, IVR menus do not allow a customer the ability to require different levels of authentication for menus or the ability to hide IVR menu options, while providing the IVR owner with ultimate control over the menu options that may be customized. After all, customer A may not want to listen to all the menu options that customer B needs to listen to since each customer may access the IVR for different reasons.
At least one company writes software to provide an ATM customer the ability to have a “Favorite Transaction” feature, where the user configures a frequently used transaction and accesses this feature at the touch of a button after PIN authentication. For example, if a customer routinely withdraws $100 and wants a receipt, the software will allow the customer to configure this option, thus reducing the customer's time at the ATM. However, such capability is typically limited to specific ATMs with the software to allow a customer to configure this option, i.e., specific local clients, and hence not via any audio interface or from a web interface.
Alternatively on many web browsers, “Favorites” lists a shortcut /URL to a favorite website. Similarly, many desktops allow the user to customize toolbars as a shortcut to different actions in desktop software. However, customization is only for a local client and not on a server based account.
These and other needs are addressed by the present invention. The present invention is directed generally to user customizable or configurable interactive voice response unit or IVR. As used herein, an IVR refers to a computational component that provides voice prompts to a user and/or converts user input in response to the voice prompts into one or more computer commands or data (e.g., effect menu and/or option selections, provide information such as names or words, etc.) For example, an IVR can capture and “understand” touchtone (DTMF) keypad input or voice responses from a user.
In one embodiment, a method for customizing an IVR is provided that includes the steps of receiving, from the user, a request to change the menu structure, effecting the requested change to the menu structure (such as by saving the change to one or more configuration files), and associating the changed menu structure with the requesting user (such as by referencing a user account or identifier with the requested changes). As will be appreciated, the menu structure includes a plurality of menus, each menu comprising a plurality of options that are selectable by a user. The plurality of menus and each menu's respective plurality of options typically define a multi-level, tree-like structure and thus a plurality of differing potential navigation paths for the user through the menu structure. Each menu and its associated options are located at a respective level in the tree-like structure. Thus, the various menus are positioned at different levels in the structure.
The user configurable IVR can provide the user with two or more of the following options:
(a) creating a new navigation path;
(b) hiding a menu option;
(c) editing a new navigation path;
(d) adding an authentication requirement to a selected menu; and
(e) deleting an authentication requirement from a selected menu.
When the requested change is the creation of new navigation path, the IVR creates a new navigation path at a location selected by the user, saves the new navigation path in a configuration file associated with the user, and records a prompt from the user to indicate the new navigation path. This typically involves saving a current position vector of the user in a file associated with the user. The user may access the new navigation path by entering a shortcut code that is associated with the path. This permits the user to shortcut parts of the original navigation path instead of having to select from every menu/option every time the user accesses the same feature.
For example, the user may access a bank's IVR system to check the balance on one or more accounts. Once the user has logged and identified himself, instead of only being able to access a set of generic menu options, the user can choose to set up a customized code which will perform an entire set of operations. So if the user must always select a set of options such as “dial 1 for phone banking”, “2 for lost or stolen cards”, “3 for latest award schemes”, then after dialing “1”, “dial 1 for statement account”, “2 for passbook”, “3 for credit card”, then after dialing “3”, “dial 1 for account balance”, “2 for transaction history”, etc., the user is instead offered initially to dial “6” to go straight to the account balance for the account.
When the requested change is to hide a menu and/or option, the IVR adds the menu and/or option to a set of menus and/or options to hide in a selected navigation path and saves the modified set of menus and/or options in a configuration file associated with the user. The IVR can be configured to determine whether the menu and/or option is eligible to be hidden and only perform the requested change when the menu and option may be hidden. In this way, a user can eliminate ever having to listen to menu options that they are not interested in. Rather than just recording entire paths through the IVR, users can simply prune options at each menu level so that navigation is quicker. For example, after each level of the IVR tree has been navigated the user can elect not to hear certain options the next time they use the IVR or restore all options in case they want to add some back in.
When the requested change is to add an authentication requirement associated with the menu and/or option, the IVR prompts the user to enter authentication information and prompts the user to attach a file, enter a pathname to the file, and/or record a message to play to an authenticated user. This feature permits the user to restrict certain actions to different levels of authentication. In this way, a user might make bank account withdrawals unavailable over the phone (unless a secret code is entered) but permit deposits so that debtors can access the account to make deposits to it.
When the requested change is to delete an authentication requirement associated with menu and/or an option, the IVR prompts the user to enter authentication information and only deletes the authentication requirement when the authentication information is successfully validated.
In a typical application, the menu structure is associated with a server-based account of the user. In that event, the IVR authenticates the user before permitting the user to make any changes.
The IVR is typically associated with a number of user accounts. Each user account corresponding to a unique user. Each user has a corresponding set of changes to the menu structure. The various sets of changes to the menu structure are usually different from one another.
The present invention can offer a number of advantages. For example, users no longer are required to repeatedly navigate the same path through a series of IVR menus. This ability saves the users time and avoids errors, thereby providing higher levels of customer convenience and satisfaction.
These and other advantages will become apparent in the discussion below.
System 300 includes IVR 200, telephony server 210 and additionally any of the following, if necessary, web server 220, host database 250, unified messaging or voice mail server 260, router 270 where all of these components communicate via LAN 225. The telephony server 210 manages the switching of telephone calls for internal users, such as, call center agents or employees (not shown), and answers and transfers inbound and outbound telephone calls from the PSTN 230 or Internet 280. The telephony server 210 has analog and digital port boards (not shown) to support legacy analog and digital telephones as well as an IP board to support IP desktop telephones or IP softphone application software.
The unified messaging server 260 stores voice, fax or email messages on its message store or presents one location to access voice, fax or email messages. The unified messaging server 260 has software to interface with IVR 200 and telephony server 210 to allow the internal or external customer to retrieve voice, fax, or email messages from their telephone. Alternatively, a voice mail server 260 allows the internal or external customer to retrieve only voice and fax messages from their telephone. The customer 240, 290 dials the telephone access number to the unified messaging or voice mail server 260. The telephony server 210 transfers the call to the unified messaging access number and the IVR 200 provides the customer with menu options and prerecorded digitized audio prompts such as those shown in
For situations where large amounts of processing power are not required, the IVR 200 and unified messaging server or voice mail server 260 may be co-resident. For situations where larger amounts of processing power are required, the IVR 200 and unified messaging or voice mail server 260 may reside on separate servers.
The host database 250 stores customer account information and may be co-resident with the IVR 200 for situations where a separate database is not necessary to store small amounts of customer account information. If a separate database is necessary, reducing the number of disk accesses to the local database will improve performance.
IVR 200 provides the customer 240, 290 with menu options and prerecorded digitized audio prompts telling the customer 240, 290 to use the DTMF capability on the customer's telephone or use the IVR's 200 speech recognition capability to select a menu option or request information. The IVR 200 may use its text-to-speech (TTS) capability to provide the customer 240, 290 information stored, for example, in a file or on a web page anywhere on the Internet 280. As may be the case, for example, if a customer desires to access real time information, such as back rates or stock quotes posted on a web page.
When IVR 200 provides information from a web page, IVR 200 uses a VXML (voice extensible markup language) interpreter, which provides the functionality for parsing and processing the VXML documents that may be stored on web server 220 or anywhere on the Internet 280. The VXML interpreter enables VXML applications to perform functions such as prompting users with TTS and prerecorded digitized audio; collecting user input with speech recognition and DTMF input; recording user speech; and providing basic telephony control, such as transfer and hang-up. The IVR 200 also uses software to interface between the VXML interpreter and the IVR 200 platform software to manage the voice and data transmissions required by the VXML application. This allows the IVR 200 to provide data and telephony functions required by the VXML application, such as, prompting users with TTS and prerecorded digitized audio, collecting user input with speech recognition and DTMF input, etc.
The web server 220 may store the VXML documents, which provide the software code controlling the VXML applications. Alternatively, VXML documents may reside anywhere on the Internet as long as they are accessible by the VXML interpreter in IVR 200. Otherwise, VXML documents may reside on a local file system (not shown) or on the IVR 200.
IVR 310 includes resource cards 350 to handle digit collection from dual tone multi-frequencies (DTMF) telephones and automatic speech recognition (ASR) resources to understand customer responses when the customer chooses to speak their responses, voice processing resources to record customer's prompts, and basic telephony control such as transfer, hanging-up and answering the telephone call. Additionally, the IVR includes text-to-speech (TTS) resources to convert text in a file or on a web page into digitized audio. Of course, additional voice processing, DTMF, TTS and ASR resources may reside on another server, if necessary due to processing needs.
In the preferred embodiment, the customer may use an audio interface to respond to prerecorded digitized audio prompts either using the telephone touch tones or speech recognition. Additionally, the customer may use a visual interface, such as web browser, to personalize the IVR to suit his needs. The IVR owner may allow the customer to log into his server account via the Internet and provide the customer a link to an HTML page that allows the customer to personalize the same menus the customer may personalize via the audio interface. The IVR owner still retains control over the menus the customer may personalize while providing an additional value added service. As for any additional prompts that need recording, the customer may enter the text on-line and allow the IVR 310 TTS capability to convert the text to speech. Alternatively, the customer may have a recording device such as a microphone at his personal computer (“PC”) or workstation to record a prompt, for example, as a .WAV file that is downloaded and stored in the IVR hard disk drive 340.
When the customer is using an audio or web interface to customize the IVR 310, the following suggestions to improve system performance are applicable. The IVR 310 may consider suggesting to limit the length of time the customer uses to record a particular prompt.
In hide item mode, (enter *2 using the telephone keypad or say *2), the IVR allows the customer to hide menu options so that navigation through the menu is quicker. Note the IVR owner may decide not to allow the customer to hide a particular menu option. For example, the IVR owner certainly would not want the customer to hide the menu items requesting the customer or internal user to enter a PIN or password at the very beginning of the IVR menu to access a server based account. There is an example of this mode provided in
In configuring authentication code (enter *8 using the telephone keypad or say *8), the IVR allows the customer to add an authentication requirement to any menu level or delete a previously configured authentication requirement. This is especially useful in many situations. For example, a manager allows his administrative assistant to log into his unified messaging account and retrieve the number of new voice, email, and fax messages. The administrative assistant reports the numbers to him before he begins his work day. The manager, however, does not want his administrative assistant to listen, save, forward, delete or reply to his new or saved messages. The manager can add a level of authentication to prevent the administrative assistant from doing anything but retrieving the number of new voice, email, and fax messages. There is an example provided in
Returning to
At step 425, the IVR collects an input from the customer or internal user. If the customer or user entered *0 to enter the shortcut editing mode, the next step in the IVR is step 435.
The following is an example of how a customer creates a shortcut. As would be the case if a customer does not trust performing money transfers from one bank account to another online but prefers to perform this type of transaction using an audio interface, such as, the telephone. Rather than have to wait through an interminable number of generic menu options as in
1. Customer performs steps 10-30. Customer desires to transfer funds between existing accounts and hence presses or says 2. (
2. IVR retrieves customer's shortcut configurations, if any, from host database or IVR hard disk drive. (
3. IVR plays shortcut usage instruction prompt- “To run a short cut at any time press or say * 1. To create shortcut code at any time, press or say *9. To hide items in current menu, press or say *2. To enter shortcut editing mode, press or say *0. To set extra security press *8.” (
4. Customer hears the prompt “Press or say 1 for checking account information. Press or say 2 for loan information. Press or say 3 for savings account information. Press or say 4 to transfer funds.” (
5. Customer presses or says 4 to transfer funds. (
6. Customer presses or says *9 which adds current position in IVR vector to the user's shortcut configuration. (
7. IVR requests user to record an appropriate shortcut prompt. (
The IVR will decide which actual digit the user will need to select to access the shortcut. This provides the customer the benefit of not having to worry about which digit to select and avoids conflicts resulting from the selection of inconsistent digits (e.g., same digit is entered twice for the two different options). The IVR will say “Press or say <option number>to” then insert the user recorded prompt.
8. The IVR goes back to next step in IVR vector (
9. Customer enters * 1 to run shortcut code detect. (
10. The IVR plays the list of saved shortcode prompts and prompts the customer to select one or exit. In this case, the IVR plays “Press or say <option number selected by IVR>to skip to transfer funds. Make a selection or exit by pressing or saying **.” (
11. Customer selects shortcut by pressing or saying <option number>. (
The next time the customer desires to transfer money from one ABC bank account to another ABC bank account these are the menus he will encounter:
1. Customer performs steps 10-30 in
2. IVR retrieves customer's configuration file, which includes shortcuts, hidden options and levels of authentication from host database. (
3. IVR plays shortcut usage instruction prompt—“To run a short cut at any time press or say * 1. To create shortcut code at any time, press or say *9. To hide items in current menu, press or say *2. To enter shortcut editing mode, press or say *0. To set extra security press *8.” (
4. Customer hears the prompt “Press or say <option number>to skip to transfer funds.” Note the customer does not have to wait for the rest of the prompts in step 82 to be spoken before making a selection.
5. The customer presses or says <option number>to skip to transfer funds.
6. The customer proceeds to step 85, “Press or say 1 if you know the account number you want to transfer funds from. Press or say 2 for a listing of account numbers and select an account number from the list.” All menu options following this menu remain unchanged.
Using the previous example in
1. Continuing from the previous example, the customer presses or says *0 to enter the shortcut editing mode. (
2. The IVR plays the welcome message for the shortcut editing mode: “To hear the list of shortcut prompts, press or say *1. To exit shortcut editing mode, press or say *4.” (
3. The customer presses or says *1 to hear the first shortcut prompt. The IVR also prompts the user to either delete or change the shortcut prompt: “To delete the shortcut prompt, press or say *2. To change the shortcut prompt press or say *3. (FIG. 4, step 610).
4. As the customer wants to change the prompt and record another prompt, the customer presses or says *3. (
5. Customer presses *4 (
If the customer had entered or said *1 (step 690) after hearing the prompt in step 665, the IVR plays the current menu option and prompts the customer to press or say *1 to hide this menu option, otherwise the customer should press or say ** to skip to the next menu option. If the customer enters or says * 1, the menu option just heard is added to the list of hidden menu options in step 695. The IVR determines whether there are more menu options in the current menu the customer can hide in step 700. If there are more menu options the IVR owner will allow the customer to hide, the IVR plays the next menu option the customer can hide in step 705. If there are no more menu options the customer may hide in the current menu, the IVR returns to normal navigation in step 710.
Using the previous example in
1. After the customer selects the newly created shortcut to skip to transfer funds, then the customer will hear the following two options at the next menu level of the navigation path: “Press or say 1 if you know the account number you want to transfer funds from. Press or say 2 for a listing of account numbers and to select an account number from the list.” (
2. Since the customer knows the account number he wants to transfer funds from, the customer wants to hide the second menu option which provides the listing of account numbers. To do so, the customer presses or says *2 to enter the hide item mode. (
3. The IVR plays the following welcome message for the hide item mode: “Press or say *1 to hide a menu option from the current menu. Press or say *2 to hear hidden menu options in current menu. Press or say *4 to exit and return to normal navigation.” (
4. The customer enters or says *1. (
5. The IVR plays the menu options the customer can hide: “Press or say 1 if you know the account number you want to transfer funds from. Press or say *1 if you want to hide this menu option. Press or say ** to skip to next menu option.”
6. The customer presses or says ** to skip to next menu option and the IVR determines there are more menu options the customer can hide. (
7. There are no more options to hide. (
If the customer enters or says *2 after hearing the prompt in step 725, the IVR detects this in step 740 and prompts the customer to enter the identification and PIN/password in step 745. This ensures the customer is the person deleting the authentication requirement. If the IVR validates the identification and PIN/password in step 750, the authentication requirement is deleted from the user configuration in step 755 and the IVR returns to normal navigation in step 765. If the IVR does not validate the identification and PIN/password in step 750, the IVR returns to normal navigation in step 765.
The top-level menus of an unified messaging IVR in
1. Manager dials the telephone access number to log into his unified messaging account and authenticates himself by entering his account number and 4-digit pin. (
2. IVR retrieves the manager's shortcuts, hidden options, and authentication levels if any, from the host database or IVR hard disk drive. (
3. IVR plays shortcut usage instruction prompt: “To run a short cut at any time press or say *1. To create shortcut code at any time, press or say *9. To hide items in current menu, press or say *2. To enter shortcut editing mode, press or say *0. To set extra security press or say *8.” (
4. The IVR plays the prompt: “Press or say 1 to access voice mail. Press or say 2 to access email. Press or say 3 to access fax messages. You may press or say # to return to this menu.” (
5. The manager presses or says 1 to access voice mail. (
6. The manager presses or says *8 to enter the configure authentication code. (
7. The IVR enters configure authentication code. (
8. The manager presses *1 to add an authentication requirement to this level of the menu. (
9. The IVR prompts the manager to record a message or attach a file or pathname of a file (if using a web browser to customize the IVR) the content of which is spoken to the authenticated user. (
10. After a timeout since the manager did not enter information in step 760, the IVR returns to normal navigation. (
11. The manager presses # to return to the main menu. (
The IVR plays: “Press or say 1 to listen to voice mail. Press or say 2 to listen to email. Press or say 3 to access fax messages. Press or say # to return to this menu.” (
12. The manager presses or says 2 to listen to email. (
13. The manager presses or says *8 to enter configure authentication code. (
14. The IVR enters configure authentication code. (
15. The manager presses *1 to add an authentication requirement to this level of the menu. (
16. The IVR prompts the manager to record a message or attach a file or pathname of a file (if using a web browser) the contents of which are spoken to the authenticated user. (
17. After a timeout since the manager did not enter information in step 760, the IVR returns to normal navigation. (
18. The manager presses # to return to the main menu. (
The IVR plays: “Press or say 1 to listen to voice mail. Press or say 2 to listen to email. Press or say 3 to access fax messages. Press or say # to return to this menu.” (
19. The manager presses or says 3 to access fax messages. (
20. The manager presses or says *8 to enter the configure authentication code. (
21. The IVR enters configure authentication code. (
22. The manager presses *1 to add an authentication requirement to this level of the menu. (
23. The IVR prompts the manager to record a message or attach a file or pathname of a file (if using a web browser) the contents of which are spoken to the authenticated user. (
24. After a timeout since the manager did not enter information in step 760, the IVR returns to normal navigation. (
25. Now the manager hangs up to exit the unified messaging account. The IVR saves changes to database. (
When administrative assistant logs into her manager's unified messaging account to retrieve voice mail messages:
1. Administrative assistant dials the telephone access number to her manager's unified messaging account and authenticates herself by entering his account number and 4-digit pin. (
2. IVR retrieves customer's shortcuts, hidden options and levels of authentication, if any, from host database or IVR hard disk drive. (
3. IVR plays shortcut usage instruction prompt: “To run a short cut at any time press or say *1. To create shortcut code at any time, press or say *9. To hide items in current menu, press or say *2. To enter shortcut editing mode, press or say *0. To set extra security press or say *8.” (
4. Administrative assistant hears the prompt: “Press or say 1 to access voice mail. Press or say 2 to access email. Press or say 3 to access fax messages. Press or say # to return to this menu.” (
5. Administrative assistant presses or says 1 to access voice mail. The IVR plays the following prompt “You have # new voice mail messages and # saved voice mail messages.” (
6. Next, the IVR plays “Enter an identification and PIN or password.” Which prevents the administrative assistant from listening to the voice mail messages.
6. The administrative assistant may press or say # to return to the main menu. (
The administrative assistant cannot delete the authentication requirement. The configure authentication code (
The following is an example of using multiple features of the present invention to customize an existing IVR. For example, a university professor wants to provide midterm and final grades to students calling his office via his voice mail system. Professor adds a new shortcut option to his voice mail prompt to allow students to retrieve midterm and final grades. See
Steps 1-7 discusses how the professor created the shortcut, steps 8-10 discusses how he ran the shortcut, and steps 11-14 discusses how the professor configured the new level of authentication he added to the menu:
1. Professor dials the telephone access number to his voice mail account and authenticates himself by entering his account number and 4-digit pin. (
2. IVR retrieves customer's shortcuts, hidden options and levels of authentication, if any, from the host database or IVR hard disk drive. (
3. IVR plays shortcut usage instruction prompt: “To run a short cut at any time press or say *1. To create shortcut code at any time, press or say *9. To hide items in current menu, press or say *2. To enter shortcut editing mode, press or say *0. To set extra security press or say *8.” (
4. Professor hears the prompt: “Press or say 1 to hear Professor Black's office hours. Press or say 2 to speak with Professor Black. Press or say 3 to speak with my administrative assistant.” (
5. Professor presses or says *9 (
6. IVR requests professor to record an appropriate shortcut prompt. (
7. The IVR goes back to next step in IVR vector. (
8. Professor enters *1 to run shortcut code detect. (
9. The IVR plays the list of saved shortcode prompts and prompts the Professor to select one or exit. (
10. Professor selects shortcut by pressing or saying <option number selected by IVR>. (
11. Professor presses or says *8 to enter the authentication code. (
12. IVR plays prompt “Press or say *1 to add an authentication requirement to access this menu. Press or say *2 to delete a level of authentication to menu.” (
13. Professor presses or says *1 to add a level of authentication to this menu. (
14. The IVR prompts Professor to record a message or attach a file or pathname of file (if using a web browser) to play to the authenticated user. The professor records a message including the entire list of student ids and their grades that is played if the IVR authenticates the student's identification and PIN/password. (
15. The IVR returns to next step in IVR vector. (
16. Professor hangs up and the IVR saves changes to database. (
When student dials the professor's office number:
1. Student hears the prompt “Press or say 1 to hear Professor's office hours. Press or say 2 to speak with Professor. Press or say 3 to speak with my administrative assistant. Press or say <option number>to retrieve grades.” Note the student does not have to wait for the prompt to end before making a selection.
2. The student presses or says <option number>to retrieve grades.
3. The IVR prompts the student for his identification and PIN/password. The student enters his student id and social security number. The IVR authenticates the identification and PIN/password with the saved identification and PIN/password. If correct, the IVR plays the message that included the list of student ids and their grade.
As will be appreciated, in
A number of variations and modifications of the invention can be used. It would be possible to provide for some features of the invention without providing others.
For example in one alternative embodiment, the logic of the present invention is implemented as software, hardware (e.g., logic circuit), or as a combination thereof.
The present invention, in various embodiments, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. Those of skill in the art will understand how to make and use the present invention after understanding the present disclosure. The present invention, in various embodiments, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease and\or reducing cost of implementation.
The foregoing discussion of the invention has been presented for purposes of illustration and description. The foregoing is not intended to limit the invention to the form or forms disclosed herein. Although the description of the invention has included description of one or more embodiments and certain variations and modifications, other variations and modifications are within the scope of the invention, e.g., as may be within the skill and knowledge of those in the art, after understanding the present disclosure. It is intended to obtain rights which include alternative embodiments to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges or steps to those claimed, whether or not such alternate, interchangeable and/or equivalent structures, functions, ranges or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.
Number | Name | Date | Kind |
---|---|---|---|
5479490 | Nakashima | Dec 1995 | A |
5608788 | Demlow et al. | Mar 1997 | A |
5671328 | Fitzpatrick et al. | Sep 1997 | A |
5737393 | Wolf | Apr 1998 | A |
5748843 | Peck et al. | May 1998 | A |
5832059 | Aldred et al. | Nov 1998 | A |
5835571 | Johnson | Nov 1998 | A |
5873064 | De Armas et al. | Feb 1999 | A |
5912952 | Brendzel | Jun 1999 | A |
5920841 | Schottmuller et al. | Jul 1999 | A |
6064730 | Ginsberg | May 2000 | A |
6101472 | Giangarra et al. | Aug 2000 | A |
6157848 | Bareis et al. | Dec 2000 | A |
6263375 | Ortega | Jul 2001 | B1 |
6272216 | Vaios | Aug 2001 | B1 |
6504917 | Flint et al. | Jan 2003 | B1 |
6519246 | Strahs | Feb 2003 | B1 |
6658414 | Bryan et al. | Dec 2003 | B2 |
6748066 | Espejo et al. | Jun 2004 | B1 |
6978129 | Peon et al. | Dec 2005 | B1 |
7130391 | Janakiraman et al. | Oct 2006 | B2 |
7220941 | Niedereder et al. | May 2007 | B2 |
20030043978 | Gallagher | Mar 2003 | A1 |
20040054538 | Kotsinadelis | Mar 2004 | A1 |