The use of telephone and e-mail systems to communicate is more popular now than ever. With the proliferation of communications devices, the need for fast and accurate contact identification is necessary. Contacts are represented by an identifier, such as a telephone number in the situation of a telephone call and an e-mail address in the situation of an e-mail message. Although electronic systems can easily (and preferably) represent contacts using a contact identifier, people do not naturally refer to others by their phone numbers or e-mail addresses. Instead, people primarily recognize others by their names or nicknames and prefer that such name or nickname is incorporated into the user interface. For instance, a person would recognize a call from his mom based on the name “Mom,” while a system would recognize that call based on the phone number, and the name “Mom” is essentially ignored from the perspective of the system.
When a person receives a phone call, the display usually indicates at least the originating phone number. This is the phone number that a device would recognize in order to route the call if one were to dial that number. If this phone number was saved in the receiver's list of contacts, other specific information corresponding to the originating phone number may appear. For example, the phone might display the name of the caller or a nickname of the caller. It might pose a problem if the system incorrectly identified the wrong contact or failed to identify a contact that was in fact stored in the receiver's list of contacts. In addition, a slow identification system could delay notification for the phone call, causing the caller to hang up, be sent to voicemail, or wait an unnecessarily long time. A similar situation occurs with the use of e-mail applications as well, where a person would most likely prefer to interact with the contact name (e.g., Jane Doe) rather than the e-mail address (e.g., tennispro3@hotmail.com).
Such contact information may be stored in a mobile phone or computer application. Not only can the device use this information to identify incoming calls, but a user may use this information to call contacts in their directory. Since many people use electronic communications for all purposes, social and business, and typically depend on their use at least numerous times throughout the day, it is important that these systems are reliable.
The following presents a simplified summary in order to provide a basic understanding of some aspects of the claimed subject matter. This summary is not an extensive overview, and is not intended to identify key/critical elements or to delineate the scope of the claimed subject matter. Its sole purpose is to present some concepts of the subject matter in a simplified form as a prelude to the more detailed description that is presented later.
The claimed subject matter relates generally to contact identification, and more particularly to systems and methods for matching incoming contact identifiers with stored contacts. An alphabetized index of translated contact identifiers and corresponding contacts is maintained in a data store. The contact identifiers are translated according to type. If the contact identifier is a phone number, the translated phone number appears as the digits in reverse order. For example, the phone number 4082345678 would appear as 8765432804. If the contact identifier is an e-mail address, the translated e-mail address appears as the portion before the “@” delimiter (i.e., the user identification) in plain order and the portion after the “@” delimiter (i.e., the domain name) in reverse order. For example, the e-mail address jdoe@mit.edu would appear as jdoe@ude.tim. The index can be updated through various instruments, including: the contact lookup component, the user, or an external component (e.g., an Internet or intranet search).
A contact lookup component receives an incoming contact identifier, translates the contact identifier to match the format of the entries in the index, locates the position of the contact identifier in the index, determines a corresponding contact match, and returns or displays the contact name. When the contact lookup component locates the position of the contact identifier in the index and discovers that an entry already exists, an exact match has been found. When the contact lookup component discovers that an entry does not exist in that position, the two adjacent entries are evaluated by an artificial intelligence component to determine the best contact match. Through this, a less efficient and more time consuming exact and exhaustive search is not required.
For instance, the evaluation can proceed by comparing the leading strings of the contact identifiers. In one example, an incoming contact identifier jdoe@mit.edu (reformatted to jdoe@ude.tim), could be compared to the two closest entries: jdoe@stanford.edu (reformatted to jdoe@ude.drofnats) and jdoe@ai.mit.edu (reformatted to jdoe@ude.tim.ia). The artificial intelligence component could determine that by comparing the leading string of jdoe@ude.tim with the leading strings of jdoe@ude.drofnats and jdoe@ude.tim.ia, jdoe@ude.tim has more characters in common with jdoe@ude.tim.ia (i.e., jdoe@ude.tim) than jdoe@ude.drofnets (i.e., jdoe@ude.). The evaluation would then conclude that jdoe@ude.tim.ia is a sufficient and best match and return a match of the contact corresponding to jdoe@ai.mit.edu for the incoming contact identifier jdoe@mit.edu. Alternatively, if the artificial intelligence component determines that neither match is sufficiently accurate, the contact lookup component can return no match and/or provide the user with information resulting from the artificial intelligence analysis. The user may choose to record or disregard this information for future use.
The claimed subject matter may be implemented on numerous user interfaces, such as PDAs, mobile phones, landline phones, laptop computers, and desktop computers. The data store may be reserved for one user (e.g., personal data in a mobile phone) or shared among many users (e.g., shared data within a company).
To the accomplishment of the foregoing and related ends, certain illustrative aspects of the claimed subject matter are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the claimed subject matter may be employed, and such matter is intended to include all such aspects and their equivalents. Other advantages and novel features may become apparent from the following detailed description when considered in conjunction with the drawings.
The claimed subject matter is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. It may be evident, however, that such subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the embodiments.
As used in this application, the terms “component” and “system” are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a computer component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
Further, as utilized herein, the term “contact” refers to a label, name, or nickname that indicates a person or object in human terms (e.g., John Doe). A “contact identifier” represents the contact in machine readable terms, such as an address (e.g., jdoe@mit.edu) or a phone number (e.g., 4082345678).
In
In one example, the contact lookup component 110 receives an incoming contact identifier as a phone number, 4082345678. Using the data store 120, the contact lookup component 110 recognizes this phone number as belonging to John Doe, and outputs a corresponding contact of John Doe by displaying the name on a screen and outputting an audio signal pre-assigned by a user. This audio can be a specific preference unique to the contact (e.g., John Doe).
In another example, the contact lookup component 110 receives an incoming contact identifier as an e-mail address, jdoe@mit.edu. Referencing the data store 120, the contact lookup component 110 discovers that no matching contact/contact identifier pairs exist, but determines that jdoe@ai.mit.edu likely refers to the same contact and outputs John Doe. In this case, the contact lookup component selects a notification method based on the current situation and decides to indicate a visual output, rather than an audio output, because it is midnight. Such preference is a general setting applied to all incoming messages from all contacts.
Referring to
The translator component 210 transforms the contact identifier to match the format of the entries in the data store. If the contact identifier is a phone number, the translator component 210 reverses all digits of the phone number. For instance, incoming phone number 4082345678 is translated to appear as 8765432804. If the contact identifier is an e-mail address, the translator component 210 reverses only those characters (constituting the domain name) that appear after the “@” delimiter and leaves the remaining order (constituting the user identification) the same. For instance, incoming e-mail address jdoe@mit.edu is translated to appear as jdoe@ude.tim.
The locator component 220 receives the translated contact identifier from the translator component 210 and proposes possible contact matches. First, the locator component identifies the position in the alphabetized index in the data store 120 where the translated contact identifier would appear. If an entry already exists in that position, the locator component 220 has found an exact match and outputs that match. If an entry does not exist in that position, the locator component 220 outputs the entry immediately before and immediately after the position as prospective matches.
The artificial intelligence component 230 receives the prospective matches from the locator component 220 and decides which match is a sufficient and best match. When the locator component 220 has not found an exact match, the artificial intelligence component 230 evaluates the two nearest matches and employs a leading string comparison. For instance, a translated incoming contact identifier of jdoe@ude.tim compared to jdoe@ude.drofnats and jdoe@ude.tim.ia would return a match of jdoe@ude.tim.ia because its leading string (i.e., jdoe@ude.tim) is a closer match than the leading string of jdoe@ude.drofnats (i.e., jdoe@ude.). In addition, the artificial intelligence component may also access the data store 120 for further information to perform its analysis. In other words, given particular data and context, the artificial intelligence component 230 (as illustrated by the above example) can perform inferences in connection with determining an appropriate contact identity to provide to a user. As used herein, the term “inference” refers generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example. The inference can be probabilistic—that is, the computation of a probability distribution over states of interest based on a consideration of data and events. Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources. Various classification schemes and/or systems (e.g., support vector machines, neural networks, expert systems, Bayesian belief networks, fuzzy logic, data fusion engines . . . ) can be employed in connection with performing automatic and/or inferred action in connection with the subject invention.
In view of the exemplary systems shown and described above, methodologies that may be implemented in accordance with the claimed subject matter will be better appreciated with reference to the flow charts of
Furthermore, acts described in connection with the methodologies may be described in the general context of computer-executable instructions, such as program modules, executed by one or more components. Generally, program modules include routines, programs, objects, data structures, etc., that perform particular tasks or implement particular abstract data types. Typically, the functionality of the program modules may be combined or distributed as desired in various instances of the embodiments.
In
Additional analysis may be undertaken at 360 to determine whether a match has been found. A matching mechanism can utilize other types of comparison other than a leading string comparison, such as a partial subset evaluation, a message content evaluation, and a message context evaluation. A partial subset evaluation compares any subset of characters in no particular order. A message content evaluation analyzes the message in conjunction with the contact information to identify a match. For example, if a contact has more than one match option, evaluating the content of the corresponding message may help identify which of the options would be a closer match. A message that involves meetings or conferences may help indicate that the sender is a business contact rather than a social contact. Likewise, a message where the “to” field includes other identified social contacts is most likely from a sender that is also a social contact. A message context evaluation takes into account the circumstances in which the message is sent. For instance, where a contact has more than one potential match, a message sent on a Sunday would likely indicate that the sender is a social contact. In another example, the time of day a message is received can help identify a contact match. For two potential contact matches A and B, if contact A usually sends messages in the morning and contact B usually sends messages in the evening, a message received in the morning can indicate that the message was sent by contact A.
Continuing to
The display area for the incoming contact identifier 705 indicates the actual incoming phone number of the call (i.e., 4082345678). Although the displayed phone number can include hyphens for user readability purposes, the phone number may be displayed in other formats (e.g., 408234 5678, (408)234-5678, or 4082345678). The display area for contact match and call information 710 indicates the contact name and corresponding phone number concluded as a match of the incoming contact identifier, as well as the date and time of the incoming call. In this example, incoming phone number 408-234-5678 was received on Aug. 20, 2005 at 2:15 PM and best matched the stored contact identifier 234-5678 belonging to the contact John Doe. The display area for the proximate entries in the contact list 715 shows the entries around the target position that pose a possible match. For instance, the position of the incoming identifier would have been situated between the John Doe and Snoopy Doe entries. A few entries above the position and a few entries below the position (as arranged in the index) are displayed, and the actual concluded match is highlighted (i.e., John Doe). However, taking into account physical space considerations, the user interface 700 may omit any or all portions of display areas 710 and 715 as preferred. The implementation on a laptop or computer screen may allow all portions to be displayed, while the implementation on a mobile phone or PDA may require a condensed display.
The command buttons 720, 725, 730, 735, 740, 745, and 750 represent actions a user can select in response to the current phone call. The user can choose to answer the call 720, ignore the call 725, return the call 730, place a new call 735, add an entry to the contact list 740, edit an entry in the contact list 745, or exit the current display 750. The command buttons can be expanded or limited in consideration of physical space constraints and convenience preferences.
As shown in
The display area for the incoming contact identifier 805 shows the actual incoming e-mail address for the message (i.e.,johndoe@mit.edu). The display area for contact match and message information 810 indicates the contact name and corresponding e-mail address sufficiently matching the incoming identifier, as well as the date and time of the message. For example, an incoming message from e-mail address johndoe@mit.edu was received on Aug. 20, 2005 at 2:15 PM and best matched the stored contact identifier johndoe@ai.mit.edu belonging to the contact John Doe. The display area for the proximate entries in the contact list 815 displays the entries surrounding the target position. In this example, the position of the incoming identifier would have been situated after the John Doe “stanford.edu” entry and before the John Doe “ai.mit.edu” entry. Entries above and below this position, as arranged in the index, are displayed, and the actual match determined by the artificial intelligence component is highlighted (i.e., John Doe). Again, if there are physical space constraints or preferences, the user interface 800 may omit any or all portions of display areas 810 and 815 as preferred. Therefore, the implementation may display all portions of the user interface on a laptop or computer screen, but leave out some parts on a mobile phone or PDA.
The command buttons 820, 825, 830, 835, 840, 845, 850, 855, 860, 865, and 870 indicate possible actions a user can select with respect to the current e-mail message. The user can choose to add an entry to the contact list 820, edit an entry in the contact list 825, read the message 830, delete the message 835, reply to the sender 840, reply to the sender and all recipients of the message 845, forward the message 850, display information from the next message 855, display information from the previous message 860, compose a new message 865, or exit the current display 870.
As illustrated,
In order to provide a context for the various aspects of the disclosed subject matter,
With reference to
The system bus 1118 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 11-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
The system memory 1116 includes volatile memory 1120 and nonvolatile memory 1122. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer 1112, such as during start-up, is stored in nonvolatile memory 1122. By way of illustration, and not limitation, nonvolatile memory 1122 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory 1120 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
Computer 1112 also includes removable/non-removable, volatile/non-volatile computer storage media.
It is to be appreciated that
A user enters commands or information into the computer 1112 through input device(s) 1136. Input devices 1136 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 1114 through the system bus 1118 via interface port(s) 1138. Interface port(s) 1138 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 1140 use some of the same type of ports as input device(s) 1136. Thus, for example, a USB port may be used to provide input to computer 1112 and to output information from computer 1112 to an output device 1140. Output adapter 1142 is provided to illustrate that there are some output devices 1140 like displays (e.g., flat panel and CRT), speakers, and printers, among other output devices 1140 that require special adapters. The output adapters 1142 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 1140 and the system bus 1118. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 1144.
Computer 1112 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 1144. The remote computer(s) 1144 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 1112. For purposes of brevity, only a memory storage device 1146 is illustrated with remote computer(s) 1144. Remote computer(s) 1144 is logically connected to computer 1112 through a network interface 1148 and then physically connected via communication connection(s) 1150. Network interface 1148 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit-switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
Communication connection(s) 1150 refers to the hardware/software employed to connect the network interface 1148 to the bus 1118. While communication connection 1150 is shown for illustrative clarity inside computer 1112, it can also be external to computer 1112. The hardware/software necessary for connection to the network interface 1148 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems, power modems and DSL modems, ISDN adapters, and Ethernet cards or components.
It is to be appreciated that the systems and/or methods of the embodiments can be facilitated with computer components and non-computer related components alike. Further, those skilled in the art will recognize that the systems and/or methods of the embodiments are employable in a vast array of electronic related technologies, including, but not limited to, computers, servers, phones, and/or handheld electronic devices, and the like.
What has been described above includes examples of the embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of the embodiments are possible. Accordingly, the subject matter is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.