The foregoing aspects and many of the attendant advantages of this invention will become more readily appreciated as the same become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:
Generally described, the present invention relates to the identification, extraction, and further use of content contained in a digital voice conversation, such as a Voice over Internet Protocol (VoIP) conversation. More specifically, the present invention relates to the use of “mined” data from a conversation to provide extended services, such as recommendations. “Mining” or “mining services” as used herein is the processing of a conversation to identify data (conversation and/or contextual) of interest. Mining may be performed during a conversation on data as it is being exchanged. Alternatively, mining may be performed on historical, or stored data (such data may relate to events or actions that have happened in the past, are currently happening, or will happen in the future). The identified data, referred to herein as “mined data,” may be used by other services or applications (such as a recommendation service), stored, forwarded, extracted from the conversation, replaced, supplemented with additional data, etc. Similar to mining, processing of mined data may be done real-time during a conversation. Alternatively, or in addition thereto, mined data may be stored and post-processed.
One technique for assisting in the mining of data is through the utilization of classes and attributes defined by “structured hierarchies” for representing contextual information over a conversation channel in an Internet Protocol (IP) network environment. “Structured hierarchies,” as used herein, are predefined organizational structures for arranging contextual information to be exchanged between two or more VoIP devices. For example, structured hierarchies can be defined by hierarchical organizations of various classes and attributes, such as XML namespaces.
With reference to
Generally described, the IP telephony environment 100 may include an IP data network 108, such as the Internet, a wide area network (“WAN”), a local area network (“LAN”), and the like. The IP telephony environment 100 may further include VoIP service providers 126, 132 providing VoIP services to VoIP clients 124, 125, 134. A VoIP call conversation may be exchanged as a stream of data packets corresponding to voice information, media information, and/or contextual information. As will be discussed in greater detail below, data may be mined from a conversation by a client, client device, service provider, a third party service (e.g., extended service or recommendation service), or any combination thereof. In one embodiment, one or more “mining profiles” may be defined for each client in a conversation and/or for third parties (e.g., service providers). A “mining profile” specifies types of data/content that is of interest to a client and/or a third party and what is to be done with that data/content once identified. For example, a client may create a mining profile that indicates that they are interested in shoes. That voice profile may be used to process a conversation and mine data packets that include discussions about shoes. The mined data packets may then be further processed to determine that the conversation is/was about Nike® shoes, and additional information regarding Nike® shoes (e.g., sales of Nike® shoes) may be obtained and provided. For example, a recommendation service may use the mined data to identify Nike® shoe sales, and recommend that the individuals participating in the conversation visit one of the sales. Additionally, as described below, a user may provide additional information to the recommendation service to receive more detailed/focused recommendations. For example, if the user has provided their shoe size, the recommendation service may identify a sale on Nike® shoes, contact the selling party to confirm it has the appropriate shoe size, and optionally place a hold on the shoe. The recommendation service may recommend to the individual the specific shoe that is for sale, and optionally provide the ability to buy the shoe through interaction with the recommendation service.
The IP telephony environment 100 may also include third party VoIP service providers 140. The VoIP service providers 126, 132, 140 may provide various calling features, such as incoming call-filtering, text data, voice and media data integration, mining services, and integrated data transmission as part of a VoIP call conversation. The VoIP service providers 126, 132, 140 may also generate, maintain, and provide mining profiles for clients communicating in a call conversation to assist in identifying data to be mined. As an alternative, or in addition thereto, VoIP clients 104, 124, 125, 136 may create, maintain, and provide mining profiles.
VoIP service providers 132 may be coupled to a private network, such as a company LAN 136, providing IP telephone services (e.g., internal calls within the private network, external calls outside of the private network, and the like), and multimedia data services to several VoIP clients 134 communicatively connected to the company LAN 136. Similarly, VoIP service providers, such as VoIP service provider 126, may be coupled to Internet service provider (ISP) 122, providing IP telephone services and VoIP services for clients of the ISP 122.
In one embodiment, one or more ISPs 106, 122 may be configured to provide Internet access to VoIP clients 104, 124, 125 so that the VoIP clients 104, 124, 125 can maintain conversation channels established over the Internet. The VoIP clients 104, 124, 125 connected to the ISP 106, 122 may use wired and/or wireless communication lines. Further, each VoIP client 104, 124, 125, 134 can communicate with Plain Old Telephone Service (POTS) 115 communicatively connected to a Public Switch Telephone Network (PSTN) 112. A PSTN interface 114, such as a PSTN gateway, may provide access between PSTN and the IP data network 108. The PSTN interface 114 may translate VoIP data packets into circuit switched voice traffic for PSTN and vice versa. The PSTN 112 may include a land line device 116, a mobile device 117, and the like.
Conventional devices, such as land line 116, may request a connection with the VoIP client based on the unique VoIP identifier of that client, and the appropriate VoIP device associated with the VoIP client will be used to establish a connection. In one example, an individual associated with the VoIP client may specify which device is to be used in connecting a call based on a variety of conditions (e.g., connection based on the calling party, the time of day, etc.).
It is understood that the above-mentioned configuration in the environment 100 is merely exemplary. It will be appreciated by one of ordinary skill in the art that any number and combination of suitable configurations with various VoIP entities can be part of the environment 100. For example, VoIP clients 134 coupled to LAN 136 may be able to communicate with other VoIP clients 104, 124, 125, 134 with or without VoIP service providers 132 or ISP 106, 122. Further, an ISP 106, 122 can also provide VoIP services to its client.
Referring now to
The unique VoIP identifier may be used similar to a telephone number in PSTN. However, instead of dialing a typical telephone number to ring a specific PSTN device, such as a home phone, the unique VoIP identifier is used to reach a contact point, such as an individual or company that is associated with the VoIP client. Based on the arrangement of the client, the appropriate device(s) will be connected to reach the contact point. In one embodiment, each VoIP device included in the VoIP client may also have its own physical address in the network or a unique device number. For example, if an individual makes a phone call to a POTS device using a personal computer (VoIP device), the VoIP client identification number in conjunction with an IP address of the personal computer will eventually be converted into a telephone number recognizable in PSTN.
The device 300 may further include a software application component 310 for the operation of the device 300 and a VoIP service application component 308 for supporting various VoIP services. The VoIP service application component 308 may include applications, such as data packet assembler/disassembler applications, a structured hierarchy parsing application, audio Coder/Decoder (CODEC), video CODEC, and other suitable applications for providing VoIP services. The software application component 300 may also include a mining component that utilizes one or more mining profiles to mine data from a conversation. A client may maintain and use more than one mining profile. For example, different mining profiles, identifying different types of content to be mined, may be established for personal, business, family, friends, etc., and may be selected and used based on the conversation. The mining component may utilize technologies, such as, but not limited to, speech recognition, keyword searching, image recognition, voice recognition, contextual data searching, and/or packet analysis, to mine data from a conversation.
With reference to
While this example utilizes two VoIP service providers and two VoIP clients, any number and combination of VoIP clients and/or service providers may be used with embodiments of the present invention. For example, only one service provider may be utilized in establishing the connection. In yet another example, communication between VoIP devices may be direct, utilizing public and private lines, thereby eliminating the need for a VoIP service provider. In a peer-to-peer context, communication between VoIP devices may also be direct without having any service providers involved.
There are a variety of protocols that may be selected for use in exchanging information between VoIP clients, VoIP devices, and/or VoIP service providers. For example, when Session Initiation Protocol (SIP) is selected for a signaling protocol, session control information and messages will be exchanged over a SIP signaling path/channel and media streams will be exchanged over Real-Time Transport Protocol (RTP) path/channel. For the purpose of discussion, a communication channel, as used herein, generally refers to any type of data or signal exchange path/channel. Thus, it will be appreciated that depending on the protocol, a connection set-up phase and a connection termination phase may require additional steps in the conversation flow 400.
For ease of explanation, we will utilize the example in which both the first VoIP client 406 and the second VoIP client 408 each only include one VoIP device. Accordingly, the discussion provided herein will refer to connection of the two VoIP devices. The individual using the device of the first VoIP client 406 may select or enter the unique VoIP identifier of the client that is to be called. If mining is to be done by the device of the first client, an appropriate mining profile may be selected. The mining profile may be manually selected by the individual. Alternatively, the mining profile may be automatically selected based on, for example, the device being used, the client being called, the location from which the call is being made, the time of day, etc.
Provider 1402 receives the request from the device of the first VoIP client 408 and determines a terminating service provider (e.g., Provider 2404 of the second VoIP client 408) based on the unique VoIP identifier included in the request. Additionally, if Provider 1402 is to mine data, the appropriate mining profile(s) is selected using any of the techniques discussed above. The request is then forwarded to Provider 2404. This call initiation will be forwarded to the device of the second VoIP client. A conversation channel between the device of the first VoIP client 406 and a device of the second VoIP client 408 can then be established. If either, or both, Provider 2404, or the second VoIP client are to mine data, the appropriate mining profile(s) for the second client may be identified for the conversation.
In an illustrative embodiment, before the devices of the first VoIP client 406 and the second VoIP client 408 begin to exchange data packets, contextual information may be exchanged. As will be discussed in a greater detail below, the contextual information may be packetized in accordance with a predefined structure that is associated with the conversation. Any device associated with the first VoIP client 406, the service provider of the first VoIP client 406, or a different device/service provider may determine the structure based on the content of the contextual information. In one embodiment, the exchanged contextual information may include information relating to the calling VoIP client 406, the device, the VoIP client 408 being called, and optionally, third-party services.
Available media types, rules of the calling client and the client being called, appropriate mining profiles of the calling client and the client being called, and the like may also be part of the contextual information that is exchanged during the connection set-up phase. The contextual information may be processed and collected by one of the devices of the first VoIP client 406, one of the devices of the second VoIP client 408, and/or by VoIP service providers (e.g., Provider 1402 and Provider 2404) depending on the nature of the contextual information. In one embodiment, the VoIP service providers 402, 404 may add and/or delete some information to/from the client's contextual information before forwarding the contextual information.
In response to a request to initiate a conversation channel, the second VoIP client 408 may accept the request for establishing a conversation channel or execute other appropriate actions, such as rejecting the request via Provider 2404. The appropriate actions may be determined based on the obtained contextual information. When a conversation channel is established, a device of the first VoIP client 406 and a device of the second VoIP client 408 start communicating with each other by exchanging data packets. As will be described in greater detail, the data packets, including conversation data packets and contextual data packets, are communicated over the established conversation channel between the connected devices. Some or all of the exchanged data packets may be mined for data matching requirements of the mining profiles.
Conversation data packets carry data related to a conversation, for example, a voice data packet or multimedia data packet. Contextual data packets carry information relating to data other than the conversation data. Once the conversation channel is established, either the first VoIP client 406 or the second VoIP client 408 can request to terminate the conversation channel. Some contextual information may be exchanged between the first VoIP client 406 and the second VoIP client 408 after the termination.
Before the device of the first VoIP client 406 and the device of the second VoIP client 408 begin to exchange voice data packets, contextual information may be exchanged between the first VoIP client 406 and the second VoIP client 408. Contextual information may be exchanged using a structured organization defined by the first VoIP client 406. In one embodiment, Provider 1402 may identify particular contextual information which Provider 1402 desires to obtain from the first VoIP client 406. The first VoIP client 406 may specify the corresponding structure based on the content of the contextual information. The identification of the structure for exchanging information and additional contextual information may be transmitted to the second VoIP client 408 via Provider 2404 and Provider 1402.
The contextual information may be processed and collected at a device of the first VoIP client, a device of the second VoIP client, and/or the VoIP service providers (e.g., Provider1 and Provider2) depending on the nature of the contextual information. For example, mining profiles may be selected and received by the service providers 402, 404 and only temporarily provided to the devices. Further, third party service provider(s) 410, 412 may also maintain mining profiles for use in mining data from the conversation. For example, the first VoIP client may have requested that a third party provider mine all conversations for particular content. Similarly, the service provider 410, 412 may be a company from which the first VoIP client is calling or a company in which the second VoIP client 408 is located. The companies may have mandatory mining profiles that are used to mine conversations for particular keywords that relate to trade secret information of that company. Upon identification of a conversation that includes those keywords, the mined data may be stored for later use and other processing may be performed (e.g., terminating the conversation, requiring further authentication/permission settings before continuing, etc.). In one embodiment, any of Provider 1402, Provider 2404, and third party service provider 410, 412 may add, modify, and/or delete contextual information before forwarding the contextual information to the next VoIP device(s), including other service providers.
In response to a request to initiate a conversation channel, the second VoIP client 408 may accept the request for establishing a conversation channel or reject the request via Provider 2404. When a conversation channel has been established, the devices of the first VoIP client 406 and the second VoIP client 408 start communicating with each other by exchanging data packets as discussed above. In one embodiment, contextual and/or conversation data packets may be forwarded to third party service providers 410, 412 from Provider 1402, Provider 2404, or from either VoIP client 406, 408. Further, the forwarded contextual and/or conversation data packets may be exchanged among various third party service providers 410, 412. Any of the VoIP clients 406, 408, service providers 402, 404, or the third party service providers 410, 412 may mine the contextual and/or conversation data packets based on selected mining profiles.
In one embodiment of the present invention, a structured hierarchy may be predefined for communicating contextual information over a VoIP conversation channel. The contextual information may include any information relating to VoIP clients, VoIP client devices, conversation channel connections (e.g., call basics), conversation context (e.g., call context), and the like. More specifically, the contextual information may include individual client mining profiles or mining profile identifiers, client rules, client's location (e.g., user location, device location, etc), biometrics information, the client's confidential information, VoIP client device functionality, VoIP service providers information, media type, media parameters, calling number priority, keywords, information relating to application files, and the like. The contextual information may be processed and collected at each VoIP client and/or the VoIP service providers depending on the nature of the contextual data.
In one aspect, the VoIP service providers may add, modify, and/or delete a VoIP client's contextual data before forwarding the contextual information. For example, a client's confidential information may be deleted by the VoIP service provider associated with that client unless the client authorizes such information to be transmitted. In some cases, a minimal amount of contextual information is transmitted outside of an intranet network. Additionally, as discussed below, some intranet networks, such as an office, may implement mining profile rules indicating what may be mined from a conversation and what may be included in a conversation for potential mining.
With reference to
In another embodiment, each VoIP client may have a set of predefined structured hierarchies stored in a local storage of any devices or a dedicated local storage which all devices can share. The predefined structured hierarchies may be declared and agreed upon between VoIP clients before contextual information is exchanged. In this manner, the need to provide the structure of the contextual data packets may be eliminated and thus the amount of transmitted data packets corresponding to the contextual data is reduced. Further, by employing predefined structured hierarchies, data packets can be transmitted in a manner which is independent of hardware and/or software. Additionally, the use of predefined structured hierarchies enhances the ability to efficiently mine data because the location of potentially relevant information is known.
Upon retrieving the identified structured hierarchies, VoIP Client 608 is expecting to receive a data stream such that data packets corresponding to the data stream are defined according to the identified structured hierarchies. VoIP Client 606 can begin sending contextual information represented in accordance with the identified structured hierarchies. In one embodiment, VoIP Client 608 starts a data binding process with respect to the contextual information. For example, instances of the identified structured hierarchies may be constructed with the received contextual information.
Referring to
As discussed below, mining profiles may be exchanged because one or both of the parties may desire to perform further post-processing of data after a conversation has completed. Parties may have limitations as to the types and extent of post-processing that may be performed. These limitations may be contained in an exchanged mining profile and applied to the data packets that are stored for post-processing. In an alternative embodiment, the mining profiles may be maintained and exchanged between Provider 1602 and Provider 2604 and that data may be mined and/or stored for later post-processing by the Providers 602, 604. Still further, if no post-processing is to be performed, the mining profiles may not be exchanged. Mining profiles may be selected, used, and exchanged at any point in a conversation. Additionally, mining profiles may be changed, replaced, or removed during a conversation. In one embodiment, approval by the individuals participating in the conversation may be required prior to changing or replacing mining profiles during the conversation.
Referring to
In one example, the extended service may be a service with which one or more of the clients has established a relationship and developed a mining profile for mining of the conversation and the providing of additional, related information. Alternatively, the extended service may be an independent party that mines conversations and provides additional services, such as recommendations, or advertisements, based on the content of the mined data.
Continuing with
Additionally, the extended service may identify advertisements for golf related products and services and, depending on the conditions (e.g., weather) expected for the event, provide recommendations to the clients, either during or after the call. For example, if the extended service determines that it will likely rain at Pebble Beach during the scheduled round of golf, it may identify sales for rain gear and recommend appropriate rain gear for purchase, rent, or reservation (and provide the location of the store and other details). Likewise, the golf course may provide information or advertisements to the clients. For example, it may provide the estimated time for completing the round, identification of demonstration clubs available for use, food, or beverage pre-ordering options, or other services that the golf course may provide (e.g., card detailing).
Multiple mining profiles may be applied to a conversation and the data packets may be mined and processed real-time with results of the processing being provided to the client(s) during the conversation. Rules may also be placed on the mining profiles, thereby modifying the amount and/or types of data that may be mined. Still further, data packets may be mined and processed at a later point in time (post-processing).
In addition to exchanging mining profiles, as discussed above, structured hierarchies may be specified for use during the conversation that assist in efficient mining of data packets by specifying the structure of the data that is transmitted. A VoIP Client 606 may also define additional classes and/or attributes to the set of predefined structured hierarchies. For example, VoIP Client 606 may identify structured hierarchies with additional attributes and classes for particular contextual information. VoIP Client 606 transmits information corresponding to the identified hierarchies and its additional attributes and classes to Provider 1602. Provider 1602 forwards the information corresponding to the identified structured hierarchies and its additional attributes and classes to Provider 2604. VoIP Client 608 receives the information regarding the identified structured hierarchies and its additional attributes and classes from Provider 2604. Alternatively, Provider 1602 forwards such information to VoIP Client 608. VoIP Client 608 updates the locally stored structured hierarchies based on the additional attribute and class information. As a result, the identified structured hierarchies are expanded at VoIP Client 606 and VoIP Client 608. VoIP Client 606 starts sending contextual information represented according to the expanded structured hierarchies to Provider 1602, which in return sends the received contextual information to Provider 2604. In one embodiment, upon receipt of the contextual information from Provider 2604, VoIP Client 608 processes the received contextual information by constructing an instance of the expanded structured hierarchies of the received contextual information.
In one embodiment, the structured hierarchies may be defined by Extensible Markup Language (XML). However, it is to be appreciated that the structured hierarchies can be defined by any language suitable for implementing and maintaining extensible structured hierarchies. Generally described, XML is well known for a cross-platform, software and hardware independent tool for transmitting information. Further, XML maintains its data as a hierarchically-structured tree of nodes, each node comprising a tag that may contain descriptive attributes. Typically, a XML namespace is provided to give the namespace a unique name. In some instances, the namespace may be used as a pointer to a centralized location containing default information about the namespace.
In a particular embodiment, VoIP Client 606 identifies a XML namespace for contextual information by placing the XML namespace attribute in the start tag of a sending element. After VoIP Client 608 receives the XML namespace information, the VoIP Client 606 transmits a set of contextual data packets defined in accordance with the identified XML namespace to VoIP Client 608. When a namespace is defined in the start tag of an element, all child elements with the same prefix are associated with the same namespace. As such, VoIP Client 608 and VoIP Client 606 can transmit contextual information without including prefixes in all the child elements, thereby reducing the amount of data packets transmitted for the contextual information. As will be appreciated, any technique for identifying the structured hierarchies may be used with embodiments of the present invention. The example of identifying an XML namespace through a start tag is provided as an example only and is not to be considered as limiting.
With reference to
With reference to
With reference to
With reference to
With reference to
The biometric information can include user identification information (e.g., fingerprint) related to biometric authentication, user stress level, user mood, etc. Additionally, the subset of the VoIP contextual information relating to the VoIP client may include location information (including a client defined location, a VoIP defined location, a GPS/triangulation location, and a logical/virtual location of an individual user), assigned phone number, user contact information (such as name, address, company, and the like), rules defined by the client, user preferences, digital rights management (DRM), a member rank of an individual user in an organization, priority associated with the member rank, and the like. The priority associated with the member rank may be used to assign priority to the client for a conference call. In one embodiment, a VoIP Client Class 830 may be defined as a sub-tree structure of a VoIP Namespace 800, which includes nodes corresponding to user biometrics 831, location 832, client rules 833, user identification 834, member priority 835, user preference 836, mining profile identification 837, and the like.
If it is determined at decision block 1305 that the received data packet is to be mined, at block 1307, client profiles for mining are selected. As discussed above, a client may create one or more profiles for use in a digital voice conversation that identify the types of content that is to be mined. For example, a client may create a personal mining profile that is used in personal conversations. Such a personal mining profile may include topics or categories identifying the types of content that is to be mined from the conversation itself. For example, if a client is interested in shoes, the personal mining profile may include an identifier to search for keywords or utilize speech recognition to identify conversations that include references to shoes or types of shoes. Additionally, contextual information of a conversation may be searched according to the structured hierarchies discussed above and the relevant portions of the contextual information utilized to determine if the content or the structure of the data packet includes references to shoes.
At decision block 1309, a determination is made as to whether one or more client mining profiles that are to be used to mine the data packet received at block 1303 exist. If it is determined at block 1309 that one or more client mining profiles do exist, at block 1311, those profiles are obtained. At decision block 1313, either after the one or more profiles are obtained at block 1311, or if it is determined at decision block 1309 that no profiles exist, it is determined whether external mining profiles that are to be used to mine the data packet received at block 1303 exist. External profiles may be, for example, but not limited to, profiles generated by clients or others that are to be used in mining the conversation. For example, a client may request a third party to mine conversations for that individual for particular content of interest. Additionally, external mining profiles may include, but are not limited to, security profiles managed by service providers, the government, companies, etc.
If it is determined at decision block 1313 that external mining profiles are to be used in mining the received data packet, at block 1315, those profiles are obtained. Upon obtaining the external mining profiles at block 1315, or if it is determined at decision block 1313 that there are no external mining profiles, at decision block 1317, it is determined whether there are any mining rules that are to be applied to the mining. Mining rules may be, for example, rules specified by a company from which a call is being generated. For example, if a client is making a call from a company, the company may have mining rules that do not allow any mining of conversations originating from that company or including conversations within that company. Alternatively, the mining rules may specify when calls may be made from a particular location, such as a company. If it is determined at decision block 1317 that mining rules exist, at block 1319, the mining profiles obtained at block 1311 and block 1315 are modified, based on those mining rules.
At block 1321, after the obtained mining profiles are modified at block 1319, or if it is determined at decision block 1317 that there are no mining rules, the data packets received at block 1303 is mined based on the obtained profiles. For example, if the mining profile specifies that a data packet (or a group of data packets) is to be mined using voice recognition and searching for keywords, and if content is identified that includes the relevant keywords, it may be marked or otherwise identified as a “mined data packet” that is to be further processed. Processing of mined data packets is described in further detail with respect to
In addition to mining data packets during a conversation, it may be determined at decision block 1323 as to whether any post-processing of the conversation or mined data packet is to be performed. If it is determined at decision block 1323 that post-processing is to be performed, at decision block 1325, it is determined whether there are any post-processing rules. If it is determined at decision block 1325 that there are post-processing rules, at block 1327 those post-processing rules are applied to the mined data packet. Post-processing rules may be, for example, rules as to what type of post-processing may be performed on the data packet, what may be done with the content that is mined from the data packet during post-processing, etc. However, if it is determined at decision block 1325 that there are no post-processing rules, or after post-processing rules are applied at block 1327, the profiles obtained at block 1311 and block 1315, which were possibly modified at block 1319, are applied and associated with the mined data packet that is to be post-processed. Data packets that are to be post-processed are associated with mining profiles and rules so that those profiles and rules can be identified and obtained when the post-processing of the data packets occurs. Alternatively, the mining profile may not be applied to the mined data packet. At block 1331 the mined data packets, post-processing rules, and optionally the applied profiles, are saved for post-processing. After the data packets and appropriate information is saved at block 1331 for post-processing, if it is determined at block 1323 that no post-processing is to be accomplished, or if it is determined at decision block 1305 that the received data packet is not to be mined, the VoIP mining routine 1300 completes, as illustrated by block 1333.
After the mined data packet or content has been altered at block 1407, or if it is determined at block 1405 that the data packet or content is not to be altered, at block 1409, the mined data packet is processed in any of a variety of ways. Mined data packets may be processed in a multitude of ways to provide additional services to a client. For example, content from a mined data packet may be used to feed another application or service, such as a diary, a task list, etc., that may be later accessed by a client to review the conversation or obtain additional information. Likewise, content from the mined data packet may be used to obtain other information related to the content. For example, referring again to the example of mining data packets containing content related to shoes, if the content was a conversation about Nike® shoes, a mining service provider may obtain additional information regarding Nike® shoes. For example, additional information may be sales of Nike® shoes, locations for purchasing Nike® shoes, quality of Nike® shoes, etc. This information may be stored with the conversation for later viewing by a client and/or provided to the client during the conversation.
In addition to feeding other applications, content from mined data packets may be used to redirect portions of a particular conversation. For example, if the content refers to a personal portion of conversation and is a high quality video, but the receiving device is a corporate device with no video capabilities, the video portion of that conversation may be rerouted to a different client device that provides the necessary capabilities and viewed or stored for later viewing on that device. Additionally, a network may utilize mined data packets for load balancing to reroute or reprocess conversations based upon the contents and size of those conversations as specified by the mined data packets.
As will be appreciated by one skilled in the relevant art, there is an endless number of processing techniques and varieties that may be used to process mined data packets and provide additional services to clients. Accordingly, the examples provided herein are for illustration only and not to be construed as limiting.
After the mined data packet is processed at block 1409, at decision block 1411, a determination is made as to whether additional mined data packets have been received that are to be processed. If it is determined at decision block 1411 that additional mined data packets exists for processing, the routine returns to block 1403 and continues. However, if it is determined at decision block 1411 that there are no additional mined data packets to be processed, the routine 1400 completes at block 1413.
Upon mining data packets at block 1505 or receiving previously mined data packets at block 1503, the routine 1500, at decision block 1507, determines if the mined data packets contain relevant content. Relevant content may be determined based on the type of service being provided by the extended service. For example, if the service being provided is a service for providing recommendations relating to particular items previously identified by the user as being of relevant interest, the mined data packets will be processed to determine if conversation data related to the category of interest is included. Upon determining that data packets contain relevant content at decision block 1507, at block 1509 the desired action related to the relevant content is performed. Continuing with the example of playing golf at Pebble Beach, if the desired action is to identify sales for golf equipment that are available at stores between the address of a client and the golf course, the extended service may identify stores having sales that match the criteria specified by the client and recommend an appropriate store to the client. In an alternative example, the relevant content may be combined with additional information obtained from the client (e.g., biometrics) and extended services may be provided based on that combination.
As illustrated in block 1511, the result of the action performed at block 1509 may be provided to the client in the form of information or a recommendation. Upon a determination at decision block 1507 that the packets do not contain relevant content or after providing information to a client at block 1511, at decision block 1513 a determination is made as to whether additional mined data packets exist. If it is determined at decision block 1513 that additional mined data packets exist, the routine returns to decision block 1507 and continues. However, if it is determined at decision block 1513 that additional mined data packets do not exist, the routine 1500 completes, as illustrated by block 1515.
While illustrative embodiments have been illustrated and described, it will be appreciated that various changes can be made therein without departing from the spirit and scope of the invention.