The foregoing aspects and many of the attendant advantages of this invention will become more readily appreciated as the same become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:
Aspects of the present invention are directed at a software system for transmitting a data item from a sending client to a receiving client. For example, a data item may be transmitted over a communication channel concurrently with call data to enhance the ways in which parties to the call may communicate. Although the present invention will be described in connection with an IP telephony environment, it is equally applicable to any type of digital data exchange that includes audio. Accordingly, the disclosed embodiments and examples are illustrative in nature and should not be construed as limiting.
With reference to
Generally described, the IP telephony environment 100 may include an IP data network 108 such as the Internet, an intranet network, a wide area network (WAN), a local area network (LAN) and the like. The IP telephony environment 100 may further include VoIP service providers 126, 132 providing VoIP or other data exchange services to VoIP clients 124, 125, 134. A VoIP call conversation may be exchanged as a stream of data packets corresponding to voice information, media information, and/or contextual information. As will be discussed in greater detail below, the contextual information includes metadata (information of information) relating to the VoIP conversation, the devices being used in the conversation, the contact point of the connected VoIP clients, and/or individuals that are identified by the contact point (e.g., employees of a company). Moreover, the contextual information may include data items such as electronic documents, graphical representations, instructions for making the data items available on a client device, and/or data items for accessing functionality available from the client device.
The IP telephony environment 100 may also include third party VoIP service providers 140. The VoIP service providers 126, 132, 140 may provide various calling features, such as incoming call-filtering, text data, voice and media data integration, and the integrated data transmission as part of a VoIP call conversation. VoIP clients 104, 124, 125, 136 may create, maintain, and provide information relating to rules and preferences for receiving data items and exposing functionality provided from the client device. In addition, the VoIP service providers 126, 132, 140 may also generate, maintain, and provide a separated set of metadata information of various preferences that depend on the individual(s) in which a call connection has been established.
VoIP service providers 132 may be coupled to a private network such as a company LAN 136, providing IP telephone services (e.g., internal calls within the private network, external calls outside of the private network, and the like) and multimedia data services to several VoIP clients 134 communicatively connected to the company LAN 136. Similarly, VoIP service providers, such as VoIP service provider 126, may be coupled to Internet Service Provider (ISP) 122, providing IP telephone services and VoIP services for clients of the ISP 122.
In one embodiment, one or more ISPs 106, 122 may be configured to provide Internet access to VoIP clients 104, 124, 125 so that the VoIP clients 104, 124, 125 can maintain conversation channels established over the Internet. The VoIP clients 104, 124, 125 connected to the ISP 106, 122 may use wired and/or wireless communication lines. Further, each VoIP client 104, 124, 125, 134 can communicate with Plain Old Telephone Service (POTS) 115 via PSTN 112, or Private Branch exchange (PBX) 113. A PSTN interface 114 such as a PSTN gateway may provide access between POTS/PSTN and the IP data network 108. The PSTN interface 114 may translate VoIP data packets into circuit switched voice traffic for PSTN and vice versa. The PSTN 112 may include a land line device 116, a mobile device 117, and the like.
Conventional voice devices, such as land line 116 may request a connection with the VoIP client and an appropriate VoIP device associated with the VoIP client will be selected to establish a call connection with the conventional voice devices. In one example, an individual associated with the VoIP client may specify which devices are to be used in connecting a call based on a variety of conditions (e.g., connection based on the calling party, the time of day, etc.). Moreover, the individual may identify which types of data items may be transmitted on a conversation channel given the device that is being used. For example, restrictions may be established so that, for example, memory intensive data items (e.g., images, video, etc.) are not directly transmitted to a client device that utilizes a limited bandwidth connection (e.g., wireless phone).
It is understood that the above mentioned configuration in the environment 100 is merely exemplary. It will be appreciated by one of ordinary skill in the art that any suitable configurations with various VoIP entities can be part of the environment 100. For example, VoIP clients 134 coupled to LAN 136 may be able to communicate with other VoIP clients 104, 124, 125, 134 with or without VoIP service providers 132 or ISP 106, 122. Further, an ISP 106, 122 can also provide VoIP services to its client.
Referring now to
The unique client identifier may be used similar to a telephone number in PSTN. However, instead of dialing a typical telephone number to ring a specific PSTN device, such as a home phone, the unique client identifier is used to reach a contact point, such as an individual or company, which is associated with the VoIP client. Based on the arrangement of the client, the appropriate device(s) will be connected to reach the contact point. In one embodiment, each VoIP device included in the VoIP client may also have its own physical address in the network or a unique device number. For example, if an individual makes a phone call to a POTS client using a personal computer (VoIP device), the VoIP client identification number in conjunction with an IP address of the personal computer will eventually be converted into a telephone number recognizable in PSTN.
The device 300 may further include a software application component 310 for the operation of the device 300 and a VoIP Service application component 308 for supporting various VoIP services. The VoIP service application component 308 may include applications such as data packet assembler/disassembler applications, a structured hierarchy parsing application, audio Coder/Decoder (CODEC), video CODEC and other suitable applications for providing VoIP and other services. The CODEC may use voice profiles to filter and improve incoming audio.
With reference to
There are a variety of protocols that may be selected for use in exchanging information between VoIP clients, VoIP devices, and/or VoIP service providers or other VoIP entities. For example, when Session Initiation Protocol (SIP) is selected for a signaling protocol, session control information and messages will be exchanged over a SIP signaling path/channel and media streams will be exchanged over Real-Time Transport Protocol (RTP) path/channel. For the purpose of discussion, a communication channel, as used herein, generally refers to any type of data or signal exchange path/channel. Thus, it will be appreciated that depending on the protocol, a connection set-up phase and a connection termination phase may require additional steps in the conversation flow 400.
For ease of explanation, we will utilize the example in which both the first VoIP client 406 and the second VoIP client 408 each only includes one VoIP device. Accordingly, the discussion provided herein will refer to connection of the two VoIP devices. The individual using the device of the first VoIP client 406 may select or enter the unique client identifier of the client that is to be called. Provider 1402 receives the request from the device of the first VoIP client 408 and determines a terminating service provider (e.g., Provider 2404 of the second VoIP client 408) based on the unique client identifier included in the request. The request is then forwarded to Provider 2404. This call initiation will be forwarded to the device of the second VoIP client. A conversation channel between the device of the first VoIP client 406 and a device of the second VoIP client 408 can then be established. As described in further detail below, with reference to
In an illustrative embodiment, before the devices of the first VoIP client 406 and the second VoIP client 408 begin to exchange data packets, contextual information may be exchanged. As will be discussed in a greater detail below, the contextual information may be packetized in accordance with a predefined structure that is associated with the conversation. Any device associated with the first VoIP client 406, the service provider of the first VoIP client 406, or a different device/service provider may determine the structure based on the content of the contextual information. In one embodiment, the exchanged contextual information may include information relating to the calling VoIP client 406, the device, and the VoIP client 408 being called. For example, the contextual information sent from the called VoIP client 406 may include priority list of incoming calls from various potential calling VoIP clients including VoIP client 406, rules and preferences for exchanging data items and accessing functionality available from the VoIP clients, and the like.
Available media types, rules of the calling client and the client being called, and various data items may also be part of the contextual information that is exchanged during the connection set-up phase. The contextual information may be processed and collected by one of the devices of the first VoIP client 406, one of the devices of the second VoIP client 408, and/or by VoIP service providers (e.g., Provider 1402 and Provider 2404), depending on the nature of the contextual information. In one embodiment, the VoIP service providers 402, 404 may add/or delete some information to/from the client's contextual information before forwarding the contextual information, perform filtering on incoming or outgoing contextual information, and the like.
In response to a request to initiate a conversation channel, the second VoIP client 408 may accept the request for establishing a conversation channel or execute other appropriate actions such as rejecting the request or causing contextual information such as a data item to be “buffered” by the Provider 2404. The appropriate actions may be determined based on the obtained contextual information. When a conversation channel is established, a device of the first VoIP client 406 and a device of the second VoIP client 408 start communicating with each other by exchanging data packets. As will be described in greater detail, the data packets, including conversation data packets and contextual data packets, are communicated over the established conversation channel between the connected devices.
Conversation data packets carry data related to a conversation, for example, a voice data packet, or multimedia data packet. Contextual data packets carry information relating to data other than the conversation data. Once the conversation channel is established, either the first VoIP client 406 or the second VoIP client 408 can request to terminate the conversation channel. Moreover, either of the clients 406 or 408 may generate commands to transmit additional contextual information during a call such as data items that are irrelevant to the conversation. Some contextual information may be exchanged between the first VoIP client 406 and the second VoIP client 408 after the termination.
In one embodiment of the present invention, a structured hierarchy may be predefined for communicating contextual information over a VoIP conversation channel. The contextual information may include any information relating to VoIP clients, VCD devices, conversation channel connections (e.g., call basics), conversation context (e.g., call context), and the like. More specifically, the contextual information may include client preference, client rules including rules for accessing functionality available from the VoIP clients, restrictions on sending and receiving data items, client's location (e.g., user location, device location, etc.), biometrics information, the client's confidential information, VoIP device's functionality, VoIP service providers information, media type, media parameters, calling number priority, keywords, information relating to application files, and the like. The contextual information may be processed and collected at each VoIP client and/or the VoIP service providers depending on the nature of the contextual data. In one aspect, the VoIP service providers may add, modify, and/or delete VoIP client's contextual data before forwarding the contextual information. For example, client's confidential information will be deleted by the VoIP service provider associated with that client unless the client authorizes such information to be transmitted. In some cases, a minimal amount of contextual information or no contextual information may be exchanged.
With reference to
In another embodiment, each VoIP client may have a set of predefined structured hierarchies stored in a local storage of any devices or a dedicated local storage which all devices can share. The predefined structured hierarchies may be declared and agreed upon between VoIP clients before contextual information is exchanged. In this manner, the need to provide the structure of the contextual data packets may be eliminated and thus the amount of transmitted data packets corresponding to the contextual data is reduced. Further, by employing the predefined structured hierarchies, data packets can be transmitted in a manner, which is independent of hardware and/or software.
Upon retrieving the identified structured hierarchy, VoIP Client 608 is expecting to receive a data stream such that data packets corresponding to the data stream are defined according to the identified structured hierarchies. VoIP Client 606 can begin sending contextual information represented in accordance with the identified structured hierarchies. In one embodiment, VoIP Client 608 starts a data binding process with respect to the contextual information. For example, instances of the identified structured hierarchies may be constructed with the received contextual information.
With reference to
In an illustrative embodiment, a third party service provider 610 may receive contextual information of VoIP Clients 606, 608 from VoIP service providers 602, 604. For discussion purposes, assume that each client only has one device associated therewith and the connection occurs between those two devices. Additionally, VoIP Client 606 has Provider 1602 for the VoIP service provider and a third party provider 610 is available for additional VoIP services. While this example utilizes two VoIP service providers and two VoIP clients, any number and combination of VoIP clients and/or service providers may be used with embodiments of the present invention. In one embodiment, devices of VoIP Client 606 and VoIP Client 608 have established a conversation channel via Provider 1602 and Provider 2604.
During a VoIP conversation, Provider 2604 may identify contextual information which will be obtained from VoIP Client 608. VoIP Client 608 collects the identified contextual information and identifies structured hierarchies which will be used to carry the identified contextual information. The collected contextual information is transmitted from VoIP Client 608 to Provider 2604. Provider 2604 is the receiving party and VoIP Client 608 is the sending party in this transmission of the contextual information. Provider 2604 may store all or part of the received contextual information, filter the contextual information, and the like. Further, Provider 2604 may collect more information, if necessary, and update the received contextual information based on the information. In one embodiment, Provider 2604 may add service provider information relating to services provided for VoIP Client 608, such as billing information, rates, and the like. Similarly, Provider 2604 may delete and/or modify contextual data from the received contextual information.
In an illustrative embodiment, the information regarding the identified structured hierarchies is also transmitted to Provider 2604. The information regarding the identified structured hierarchies may include the information about which structured hierarchies are used to carry the contextual information, how to identify the structured hierarchies, and the like. Provider 2604 transmits the information regarding the identified structured hierarchies and the contextual information to Provider 1602. In this example, Provider 2604 is now the sending party and Provider 1602 is the receiving party of the contextual information. Provider 1602 may collect more contextual information, if necessary, and update the received contextual information. Moreover, Provider 1602 may add, delete, and/or modify a contextual data before forwarding the received contextual information to VoIP Client 606. Provider 1602 transmits the contextual information to VoIP Client 606. Likewise, VoIP Client 606 may further collect contextual information and transmit the collected contextual information and corresponding structured hierarchies information to VoIP Client 608 via Provider 1602 and Provider 2604.
As will be discussed in greater detail below, it is to be understood that a VoIP entity can be both a sending party and a receiving party at the approximate same time. For example, Provider 1602 may also receive a first set of contextual information from VoIP Client 606 while receiving a second set of contextual information relating to VoIP Client 608 from Provider 2604. Upon receipt of the contextual information, Provider 1602 transmits the first set of contextual information to Provider 2604 while receiving the second set of contextual information from Provider 2604. Likewise, VoIP Clients 606,608 can receive contextual information from their service providers while transmitting contextual information to their service providers. As such, it is contemplated that contextual information will be continuously exchanged among VoIP entities (e.g., Provider 1602, VoIP Client 606, Provider 2604, VoIP Client 608) before, during, and after a conversation over a two-way communication channel.
In one embodiment, Provider 1602 sends the information regarding the identified structured hierarchies and the contextual information to VoIP Client 606. As mentioned above, VoIP Client 606 further processes the received contextual information in accordance with the identified structured hierarchies. For example, upon receipt of the information regarding the identified structured hierarchies, VoIP Client 606 looks up predefined structured hierarchies to select the identified structured hierarchies for the contextual information.
In one embodiment, the structured hierarchies may be defined by Extensible Markup Language (XML). However, it is to be appreciated that the structured hierarchies can be defined by any language suitable for implementing and maintaining extensible structured hierarchies. Generally described, XML is well known for a cross-platform, software, and hardware independent tool for transmitting information. Further, XML maintains its data as a hierarchically-structured tree of nodes, each node comprising a tag that may contain descriptive attributes. XML is also well known for its ability to follow extendable patterns that may be dictated by the underlying data being described. Typically, a XML namespace is provided to give the namespace a unique name. In some instances, the namespace may be used as a pointer to a centralized location containing default information about the namespace.
In a particular embodiment, VoIP Client 606 may identify a XML namespace for contextual information. For example, the XML namespace attribute may be placed in the start tag of a sending element. It is to be understood that XML namespaces, attributes, and classes illustrated herein are provided merely as an example of structured hierarchies used in conjunction with various embodiments of the present invention. After VoIP Client 608 receives the XML namespace information, the VoIP Client 606 transmits a set of contextual data packets defined in accordance with the identified XML namespace to VoIP Client 608. When a namespace is defined in the start tag of an element, all child elements with the same prefix are associated with the same namespace. As such, VoIP Client 608 and VoIP Client 606 can transmit contextual information without including prefixes in all the child elements, thereby reducing the amount of data packets transmitted for the contextual information.
With reference now to
Now with reference to
By way of example only, a caller may identify parties that will be included in the call conversation from an electronic “address book” provided by the application program. Then, once the parties to the call conversation have been identified, hardware or software based controls may be used to initiate the call. In this regard, a VoIP client may use various devices to send or receive data over a communication channel. The application program may be configured to manage communication between and provide enhanced functionality for the devices. In this regard, a sending party may use a feature-rich VoIP client that consists of a personal computer communicatively connected to a VoIP enabled telephone, for example. The sending party may identify parties that will be included in the call conversation and initiate the call by activating one or more software controls (e.g., button, menu item, etc.) made available from the application program. Once a communication channel has been established, conversational data may be input and received using the VoIP telephone. Alternatively, hardware controls available from the VoIP telephone (e.g., dial pad) may be used to initiate the call. As this example illustrates, aspects of the present invention may be applied in VoIP clients with any number of different device configurations and capabilities.
In one embodiment, controls available from an application program allow the sending party to identify and send a data item when the call is initiated. For example, an application program may provide functionality for browsing a file system or network location so that a sending party may identify a data item that will be sent to a receiving party when a call is initiated. Moreover, as described in further detail below, packaged data items may also be selected inside an application program. In any event, any number of different types of data items may be identified and transmitted as a call is initiated. As described in further detail below, a data item transmitted concurrently with a call may be in any number of different formats including audio, text, image, and/or procedural, etc. Moreover, when a data item is received processing may be performed on the contextual information so that the data item may be made available to the receiving party. For example, if a sending party causes a word processing document to be sent when a call is initiated, an application program available from the receiving client may be configured to process the received contextual information and automatically present the word processing document as the call is received.
As illustrated in
It should be well understood that a communication channel between sending and receiving parties may be established across any number of different VoIP entities (e.g., clients, client devices, service providers, third party service providers, etc.). Stated differently, the contextual information exchanged between the clients associated with a sending and receiving party, at block 804, may be received by one or more intervening VoIP entities that forward the contextual information. Thus, the contextual information exchanged at block 804 may be forwarded multiple times before being received at the appropriate client.
At block 806, the command handling routine 800 remains idle until a command to transmit a data item from a sending party to a receiving party is received. As mentioned previously, aspects of the present invention allow a sending party to select and send a data item when a call is initiated. Similarly, a sending party may also select and cause a data item to be transmitted to a receiving party while a call conversation is on-going. For example, a party to a conference call may receive an electronic document when a call is initiated, update the document during the call, and subsequently send the updated version of the document to one or more receiving parties. Those skilled in the art and others will recognize that when a command to transmit a data item is received, event data may be obtained. As described in further detail below, the event data obtained by the command handling routine 800 may identify, among other things, the data item that is the object of the command, the identity of the receiving parties, and the like. In one embodiment, the command is generated at block 806 when a sending party interacts with a user interface to issue the command. In another embodiment, a sending party may cause the command to be automatically based on rules which are me depend on variables. For example, a sending party may establish a rule to automatically send a selected data item when a call from a particular individual is received. More generally, those skilled in the art and others are will recognize that any number of different types of rules may be established for automatically sending a data item.
Typically, a data item transmitted to a receiving party concurrently with conversation data originates from a party to the call. However, a data item may also originate from any intervening VoIP entity such as a third party service provider that receives and forwards call data. In this regard, an intervening VoIP entity may be configured to add/remove contextual information to a call conversation based on pre-defined rules. For example, an intervening VoIP entity may cause additional contextual information to be transmitted over an existing communication channel in order to cause a “broadcast message” with emergency information to be made available to parties involved in a call. Moreover, those skilled in the art and others will recognize that other instances exist where it may be desirable for an intervening VoIP entity to add/remove other types of contextual information.
Any number of different controls, including both hardware and software based controls, may be used to generate the command that is received at block 806. For example, a device such as a VoIP telephone may be configured with hardware controls that enable a sending party to cause a data item to be transmitted to a receiving party. By way of another example, an application program may provide software-based controls that enable a sending party to select and send a data item. In this instance, features may be provided that allow the sending party to differentiate between parties who will receive the data item. For example, in accordance with one embodiment, software controls are provided that allow a sending party to send a data item to a selected receiving party without the data item being received by a non-selected party.
Upon the command being received, the command handling routine 800 processes the contextual information received during the call set-up phase to assess the capabilities, preferences, and rules of the receiving client, at block 808. As mentioned previously, a party to a call may employ any number of different types of clients, with each client having potentially different device configurations and capabilities. For example, some feature-rich clients are able to present or process date items that adhere to any number of different formats including, but not limited to, audio, text, image, and/or procedures. Other clients are more limited and, for example, may only be able to send/receive audio data. Since the capabilities, preferences, and rules associated with the client being used by the receiving party may affect how and whether the data item will be presented, the capabilities, preferences, and rules associated with the client are identified. In accordance with one embodiment, the capabilities, preferences, and rules associated with the client are identified from contextual information represented in the Device Type Class 920, described in further detail below with reference to
In one embodiment, packaged data items of graphical representations and/or animations may be transmitted during a call. For example, using controls provided by the present invention, a sending party may select a graphical representation and/or animations from a package of data items that includes, but is not limited to, smiles, frowns, winks, or other facial expression that depict a human emotion. In this regard, the contextual information exchanged in the call set-up phase (at block 804) may identify the packages of data items available from the sending and receiving client. In one embodiment, the processing performed at block 808 includes identifying the packages of data items that are locally available on the receiving client. If a specified data item is locally available on the receiving client, the actual data item is not transmitted in response to receiving the appropriate command. Instead, a reference to the data item is transmitted which enables the receiving client to recall and present the data item. In one embodiment, graphical representations and/or animations of human emotions relating to a conversation context are represented by the Call Basics Class 904, described in further detail below with reference to
In another embodiment, packaged data items for accessing functionality exposed by a receiving client may be transmitted during a call. Using controls provided by the present invention, a sending party may generate a remote procedure call to cause a specified action to occur on a receiving client. For example, a device associated with the receiving client, such as wireless phone, may maintain functionality to vibrate, signify that a call is incoming by playing an identified audio file, display an image, etc. Those skilled in the art and others will recognize that, functionality provided by a device may be exposed from a programming interface. In one embodiment, remote procedure calls that cause a device associated with receiving client such as a wireless phone to vibrate, play a received audio file, display an image, etc. may be issued from a sending client. The functionality may be accessed at any point when a communication channel is established including when is initiated or while conversation data is being exchanged. In this regard, the contextual information exchanged in the call set-up phase (at block 804) may identify the functionality exposed by a receiving client.
At block 810, a determination is made regarding whether the data item that is the object of the command, received at block 806, may be accessed locally from the receiving client. In some instances, a data item is either not locally available on the receiving client or may only be accessed from the sending client. For example, in one embodiment, a sending party may issue a command to multiplex an audio file in a call for the purpose of providing “background music.” The sending party identifies an audio file and selects a control to transmit the audio file and call data in the form of the single multiplexed data stream. In this and other instances when a data item is only available from a sending client, the result of the test performed at block 810 is “NO” and the command handling routine 880 proceeds to block 814, described below. Conversely, a data item may be locally available on a receiving client. For example, graphical representations and/or animations that depict human emotions or other packaged data items and related procedures may be distributed to a plurality of clients. In this instance, if a package that includes the selected data item was distributed to the receiving client, then a determination is made that the data item is available locally. In this and other instances, when the selected data item is available locally on the receiving client, the result of the test performed at block 810 is “YES” and the command handling routine 800 proceeds to block 812.
At block 812, a tag describing a data item that will be made available to a receiving party is embedded in the data stream being transmitted to the receiving client. If block 812 is reached, a determination was made that the data item selected by a sending party may be accessed locally from the receiving client. In this instance, the selected data item will not be transmitted. Instead, a “tag” or segment of text that describes the selected data item and related procedures is transmitted as contextual information between the sending and receiving clients. Those skilled in the art and others will recognize that a tag which conforms to XML or other standardized format may be used to describe the semantics of identifying and presenting the data item on the receiving client. For example, the tag embedded in the data stream at block 812 may include the addresses of the destination and sending clients, processing instructions, the identity of the selected data item, and the like. As described in further detail below, when a tag embedded in a data stream is received, the certain instructions may be executed for the purpose of presenting the data item to the receiving party. Then, the command handling routine 800 proceeds to block 816, where it terminates.
At block 814, the command handling routine 800 causes the actual data item to be included in a data stream being transmitted to the receiving client. Stated differently, data packets with the appropriate header information and data item represented in the payload are transmitted to the receiving client if block 814 is reached. In one embodiment, contextual information in the form of electronic documents (e.g., word processing documents, spreadsheets, PowerPoint presentations, and the like), graphical representations and/or animations (pictures, images, icons, etc.), procedure calls, and/or any other data type that may be represented digitally, etc., may be transmitted in the data stream. In another embodiment, the contextual information is continually embedded or multiplexed with the data stream that is being transmitted. For example, as mentioned previously, a sending party may issue a command to multiplex an audio file in a call for the purpose of providing “background music.” In this instance, an audio file identified by the sending party is continually multiplexed with conversational data that is transmitted to a receiving client. Then, the command handling routine 800 proceeds to block 816, where it terminates.
Now with reference to
As illustrated in
At block 856, a data lookup is performed to identify any restrictions that may exist in presenting the data item on the receiving client. As mentioned previously, any number of different clients may be used in a call, with each client having different capabilities. In some instances, a receiving client may not be able to present the type of data item that was transmitted by a sending client. For example, a sending party may issue a command to transmit an electronic document or an image to a receiving party. If the receiving party is using a limited-feature client device such as a POTS telephone, the data items are not capable of being presented. In this instance, when a receiving client is not capable of presenting a data item, the processing routine 850 may identify a file name for the data item and notify the receiving party that the data item was sent. Moreover, an intervening VoIP entity may make the stored data item available to a receiving party sometime later in a voicemail message or other electronic communication.
A data item that is not capable of being presented on a receiving client may be “buffered” and subsequently made available to a receiving party. In this regard, it is also contemplated that the request to present a data item may not be processed at all but stored for future use on a device, local storage of a service provider, or the like. In this regard, a sending party may establish a rule to have a data item transmitted to the receiving party at the occurrence of a specified event. Stated differently, the rules for sending a data item may be based on any number of different variables. For example, a sending party may establish a rule to cause a specified data item to be transmitted after a specified period of time or regularly schedule intervals, when the receiving party is identified as being “online,” using a feature-rich client capable of presenting a data item, etc.
Restrictions may be placed on presenting a data item to a receiving party based on policies. For example, anti-malware software may be configured to search network traffic being sent to a receiving client. If a data item sent to the receiving client is characteristic of malware (e.g., viruses, worms, spyware, Trojans, etc.) a restriction may be placed on presenting or otherwise executing instructions associated with the data item. Similarly, the receiving party may define restrictions on presenting certain types of data items that depend on variables. By way of example only, if the receiving party is using a wireless telephone that maintains a limited bandwidth connection, restrictions may be defined so that a memory intensive data item (e.g., image, video, etc.) may not be transmitted to the wireless telephone. Instead, the data item may be buffered by an intervening VoIP entity and accessed at a later time when, for example, the receiving party is using a client that maintains a higher bandwidth connection. By way of another example, a user with elevated privileges (e.g., parents) may place restrictions on the types of data items that other users (e.g., children) may receive from a sending party.
Restrictions may be placed on presenting a data item based on rules established by a receiving party. For example, as mentioned previously, a sending party may issue a command to cause an audio file to be sent and played on a receiving client. However, a receiving party may establish a rule to allow audio files to be played based on variables such as only allowing an audio file to be played during pre-defined periods of time. These examples illustrate that aspects of the present invention are highly configurable and other types of restrictions, and/or rules may be defined without departing from the scope of the claimed subject matter.
At decision block 858, the processing routine 850 determines whether additional processing will be performed based on the restrictions, if any, identified at block 856. As mentioned previously, restrictions may be established when malware is identified, a policy or rule is defined, etc. In these instances when a data item is not allowed to be presented, a determination is made that the result of the test performed at block 858 is “NO,” and the processing routine 850 proceeds to block 868, where it terminates. In instances when a restriction that prevents instructions associated with a data item from being executed does not exist, the processing routine 850 proceeds to block 860.
At block 860, a data structure lookup is performed to identify preferences on how a data item will be made available to a receiving party. In one embodiment, preferences may be established by a receiving party or default that define how different types of data items are presented or otherwise made available. In this regard, if the data item received adheres to a specified file type (e.g., ”.doc”), preferences may be defined that cause a particular application program (e.g., Microsoft Word®) to be launched so the data item may be immediately accessed by a receiving party. Moreover, preferences that depend on variables may affect which data items are presented to a receiving party. In this regard, a receiving party may establish a rule to associate and play an audio file when a particular individual initiates a call. Regardless of the data item received from sending party in this instance, the preference established by the receiving party may override which audio file is played as the call is initiated. However, those skilled in the art will recognize that other preferences may be defined which depend on any number of different types of variables.
As illustrated in
At block 864, the data item identified in the request received at block 854 is recalled from storage available to the receiving client. As mentioned previously, a tag that describes a data item and related functionality may be transmitted as contextual information between the sending and receiving clients. In this regard, the tag may describe the semantics associated with the data item, including the identity of the data item and/or package where the data item may be located, instructions for presenting the data item to the receiving party, and the like. At block 864, text included in the tag received from the sending client is parsed to identify where the data item is stored. Then, the data item is recalled so that it may be presented or otherwise made available.
At block 866, the command generated by the sending party is satisfied when a data item is presented or otherwise made available on the receiving client. Presenting the data item may include applying preferences established by a receiving party or provided by default. For example, as mentioned previously, presenting the data item may include identifying an appropriate application program, launching the application program, and using the application program to display the data item. Similarly, if the receiving party is currently interacting with an appropriate application program, presenting the data item may include “refreshing” a graphical user interface, thereby causing the data item to be displayed. Moreover, presenting the data item may include issuing a procedure call to a program interface that is accessible from the receiving client. For example, functions may be issued to cause a client device to vibrate, play an identified audio file, display an image, etc. Then, the processing routine 850 proceeds to block 868, where it terminates.
With reference to
With reference to
With reference to
With reference to
With reference to
While illustrative embodiments have been illustrated and described, it will be appreciated that various changes can be made therein without departing from the spirit and scope of the invention.