This application claims the benefits under 35 U.S.C. §119 of U.S. Provisional patent application Ser. No. 60/685,258, filed May 26, 2005, of the same title and to the same inventors, which is incorporated herein by this reference.
Cross reference is made to U.S. patent application Ser. No. 10/815,556, filed Mar. 31, 2004, entitled “USING AGENT PATTERNS FOR PREDICTIVE AGENT ASSIGNMENTS”, and Ser. No. 10/861,193, filed Jun. 3, 2004, entitled “DATA MODEL OF PARTICIPATION IN MULTI-CHANNEL AND MULTI-PARTY CONTACTS”, each of which is incorporated herein by this reference.
The present invention is directed generally to contact center administration and specifically to monitoring agent performance.
Contact centers, such as Automatic Call Distribution or ACD systems, are employed by many enterprises to service customer contacts. A typical contact center includes a switch and/or server to receive and route incoming packet-switched and/or circuit-switched contacts and one or more resources, such as human agents and automated resources (e.g., Interactive Voice Response (IVR) units), to service the incoming contacts. Contact centers distribute contacts, whether inbound or outbound, for servicing to any suitable resource according to predefined criteria. In many existing systems, the criteria for servicing the contact from the moment that the contact center becomes aware of the contact until the contact is connected to an agent are customer-specifiable (i.e., programmable by the operator of the contact center), via a capability called vectoring. Normally in present-day ACDs when the ACD system's controller detects that an agent has become available to handle a contact, the controller identifies all predefined contact-handling skills of the agent (usually in some order of priority) and delivers to the agent the highest-priority oldest contact that matches the agent's highest-priority skill. Generally, the only condition that results in a contact not being delivered to an available agent is that there are no contacts waiting to be handled.
The primary objective of contact center management, including call-distribution algorithms, is to ultimately maximize contact center performance and profitability. An ongoing challenge in contact center administration is monitoring of agent behaviors to optimize the use of contact center resources and maximize agent performance and profitably. Agents can take many actions to “beat the system” or skew contact center statistics to “hide” deviant agent performance. Such problem agents are distinguished from poorly performing agents because they try to take advantage of the system to benefit themselves. Problem agents may behave in such a way that their metrics indicate that they are high performing agents when in fact they are not. For instance, an agent can have a long contact during which he or she is chit-chatting and follow that contact with a short contact during which the agent fails properly to service the customer so that the average duration of the two contacts falls within contact center targets. Because deviant behaviors are often varied and infrequent, they are hard to detect and correct. It is even more difficult to understand the reason for the behavior. For example, is the agent dumping a call so he or she can go to break on time?
Current products for monitoring and reporting on contact center performance are generally unable to isolate problem behaviors and identify contextual patterns. Current contact center reporting products monitor and report on the performance of agents. Generally, these are summary statistics, such as how many contacts were handled, average handle time, and result codes. Call Management System or CMS™ by Avaya, Inc., reports on a few problem behaviors in isolation. These behaviors include transfers, redirects from time out, disconnects from hold, long hold, aux time, direct time, conferences, contacts of less than a determined time or “short contacts”, contacts of greater than a determined time or “long contacts”, long alerts, and long wrap-ups. Nice Analyzer™ allows one to do ad-hoc queries to search for events, such as abandons from hold. The products fail to provide a systematic method for discovering beneficial or problem behaviors, reporting on combinations of problems, facilitating an understanding of what might be happening around the behavior that is contributing to it, and allowing the administrator to identify the behavior by type of contact being handled, e.g., inbound vs. outbound, direct vs. ACD delivered, and internal vs. external.
These and other needs are addressed by the various embodiments and configurations of the present invention. The present invention is directed generally to the identification, analysis, and/or tracking of target behavior in a contact center.
In one embodiment, a method is provided that includes the steps of:
(a) processing a set of events to yield a corresponding measure;
(b) comparing the measure to a number of rule sets, each of the rule sets corresponding to a different type of target behavior; and
(c) when the measure matches the selected rule set, associating the measure with a type of target behavior corresponding to the selected rule set. As used herein, a “measure” refers to a set of events having a defined relationship.
In another embodiment, the set of events includes a number of causally related events occurring at different times, and each rule set describes filters relative to a number of dimensions.
Using real-time, historic and/or detailed reports, the method can identify and focus on positive and negative (or problem) agent behaviors. The measures being tracked are commonly not focused on overall performance but rather to specific occurrences of identified problem behaviors. For example, target behaviors include long contact, short contact, long alert, long initiate, long preview, long wrap up, short wrap up, transfer from, transfer in, blind transfer, transfer to a same routing point and/or queue, conference, redirect due to agent rejection, redirect due to time out, cancel due to agent rejection, cancel due to time out, agent release first, disconnect from hold, long hold, hold time, short aux, aux time, aux working time, aux non-working time, wrap up time, direct time, internal time, variation in active time, and variation in wrap up time. As will be appreciated, a “contact” can be a communication over any medium, such as voice, email, chat, fax, etc., and “aux” or auxiliary refers to work items that are not directly related to servicing contacts.
Combinations of events that collectively identify a target behavior can be identified and monitored. Examples include short contact-then-aux, short contact-then-logout, login-then-aux, repeated conference or transfer to the same person, and short and long contacts side-by-side.
The behaviors may be either contact-related or time-based. In either case, problem behavior is typically identified by a number or duration of instances of the behavior exceeding a predetermined or business determined threshold.
The present invention can provide the ability to identify target behaviors impacting the business, and allow managers to stop or reward the behavior. In particular, the invention can provide a systematic method for discovering problem behaviors, reporting on combinations of problems, facilitating an understanding of what might be happening around the behavior that is contributing to it, and allowing the administrator to identify the behavior by type of contact being handled, e.g., inbound vs. outbound, direct vs. ACD delivered, and internal vs. external. The benefits of identifying problem behaviors can be substantial. Problem behaviors can cause the loss of customers, represent the misuse of company resources by agents performing unauthorized activities or actions, and lower moral of those engaging in or observing the behaviors. Moreover, problem behaviors are often an early warning sign of dissatisfaction and agent turnover.
These and other advantages will be apparent from the disclosure of the invention(s) contained herein.
The above-described embodiments and configurations are neither complete nor exhaustive. As will be appreciated, other embodiments of the invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
As used herein, “at least one”, “one or more”, and “and/or” are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions “at least one of A, B and C”, “at least one of A, B, or C”, “one or more of A, B, and C”, “one or more of A, B, or C” and “A, B, and/or C” means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.
The invention will be illustrated below in conjunction with an exemplary communication system. Although well suited for use with, e.g., a system having an ACD or other similar contact processing switch, the invention is not limited to use with any particular type of communication system switch or configuration of system elements. Those skilled in the art will recognize that the disclosed techniques may be used in any communication application in which it is desirable to provide improved contact processing.
The term “switch” or “server” as used herein should be understood to include a PBX, an ACD, an enterprise switch, or other type of communications system switch or server, as well as other types of processor-based communication control devices such as media servers, computers, adjuncts, etc.
Referring to
The switch 130 and/or server 110 can be any architecture for directing contacts to one or more communication devices. Illustratively, the switch and/or server can be a modified form of the subscriber-premises equipment disclosed in U.S. Pat. Nos. 6,192,122; 6,173,053; 6,163,607; 5,982,873; 5,905,793; 5,828,747; and 5,206,903, all of which are incorporated herein by this reference; Avaya Inc.'s Definity™ Private-Branch Exchange (PBX)-based ACD system; MultiVantage™ PBX, CRM Central 2000 Server™, Communication Manager™, S8300™ media server, and/or Avaya Interaction Center™. Typically, the switch/server is a stored-program-controlled system that conventionally includes interfaces to external communication links, a communications switching fabric, service circuits (e.g., tone generators, announcement circuits, etc.), memory for storing control programs and data, and a processor (i.e., a computer) for executing the stored control programs to control the interfaces and the fabric and to provide automatic contact-distribution functionality. The switch and/or server typically include a network interface card (not shown) to provide services to the serviced communication devices. Other types of known switches and servers are well known in the art and therefore not described in detail herein.
Referring to
Referring to
The first communication devices 134-1, . . . 134-N are packet-switched and can include, for example, IP hardphones such as the Avaya Inc.'s, 4600 Series IP Phones™, IP softphones such as Avaya Inc.'s, IP Softphone™, Personal Digital Assistants or PDAs, Personal Computers or PCs, laptops, packet-based H.320 video phones and conferencing units, packet-based voice messaging and response units, packet-based traditional computer telephony adjuncts, and any other communication device.
The second communication devices 138-1, . . . 138-M are circuit-switched. Each of the communication devices 138-1, . . . 138-M corresponds to one of a set of internal extensions Ext1, . . . ExtM, respectively. These extensions are referred to herein as “internal” in that they are extensions within the premises that are directly serviced by the switch. More particularly, these extensions correspond to conventional communication device endpoints serviced by the switch/server, and the switch/server can direct incoming calls to and receive outgoing calls from these extensions in a conventional manner. The second communication devices can include, for example, wired and wireless telephones, PDAs, H.320 video phones and conferencing units, voice messaging and response units, traditional computer telephony adjuncts, and any other communication device.
It should be noted that the invention does not require any particular type of information transport medium between switch or server and first and second communication devices, i.e., the invention may be implemented with any desired type of transport medium as well as combinations of different types of transport channels.
The packet-switched network 162 can be any data and/or distributed processing network, such as the Internet. The network 162 typically includes proxies (not shown), registrars (not shown), and routers (not shown) for managing packet flows.
The packet-switched network 162 is in communication with an external first communication device 174 via a gateway 178, and the circuit-switched network 154 with an external second communication device 180. These communication devices are referred to as “external” in that they are not directly supported as communication device endpoints by the switch or server. The communication devices 174 and 180 are an example of devices more generally referred to herein as “external endpoints.”
In a preferred configuration, the server 110, network 162, and first communication devices 134 are Session Initiation Protocol or SIP compatible and can include interfaces for various other protocols such as the Lightweight Directory Access Protocol or LDAP, H.248, H.323, Simple Mail Transfer Protocol or SMTP, IMAP4, ISDN, E1/T1, and analog line or trunk.
It should be emphasized that the configuration of the switch, server, user communication devices, and other elements as shown in
As will be appreciated, the central server 110 is notified via LAN 142 of an incoming contact by the communications component (e.g.; switch 130, fax server, email server, web server, and/or other server) receiving the incoming contact. The incoming contact is held by the receiving communications component until the server 110 forwards instructions to the component to forward or route the contact to a specific contact center resource, such as the IVR unit 122, the voice mail server 118, and/or first or second communication device 134, 138 associated with a selected agent. The server 110 distributes and connects these contacts to communication devices of available agents based on the predetermined criteria noted above. When the central server 110 forwards a voice contact to an agent, the central server 110 also forwards customer-related information from databases 114 to the agent's computer work station for previewing and/or viewing (such as by a pop-up display) to permit the agent to better serve the customer. The agents process the contacts sent to them by the central server 110.
According to the invention, a target behavior identification module 232 is provided. The agent 232 is stored either in the main memory or in a peripheral memory (e.g., disk, CD ROM, etc.) or some other computer-readable medium of the center 100. The module 232 identifies and analyzes specific occurrences of identified target behaviors. The target behaviors may be behaviors that are considered by administration to be either beneficial or detrimental to contact center efficiency and profitability.
In one configuration, problem behaviors are tracked, identified, and/or analyzed by the module 232, by contact type and/or distribution method. Exemplary problem behaviors include the following:
1. long contacts or contacts in which the selected agent's active time spent communicating is greater than a specified time threshold;
2. short contacts or contacts in which the selected agent's active time spent communicating is less than a specified time threshold;
3. long alert or contacts in which the selected agent's alerting time was more than a specified time threshold;
4. long initiate or contacts in which the selected agent's time to dial the customer or otherwise initiating the contact was more than a specified time threshold;
5. long preview or contacts in which the selected agent's time to preview the work item or contact was more than a specified time threshold;
6. long wrap ups or contacts in which the selected agent's time to wrap up the contact was more than a specified time threshold;
7. short wrap ups or contacts in which the selected agent's time to wrap up the contact was less than a specified time threshold;
8. transfers from or contacts that were successfully transferred from the selected agent;
9. transfers in or contacts (such as from friends or acquaintances) that were successfully transferred to the selected agent;
10. blind transfers or contacts that were transferred to the selected agent prior to the far end or transferee accepting the transfer;
11. transfers to the same routing point or queue or contacts that were transferred by the selected agent back to the same routing point or queue that delivered the contact (e.g., with the hope of another selected agent being selecting to service the contact);
12. conferences or contacts to which the selected agent was a party and that had three or more simultaneous parties active at some point during the contact;
13. redirects or inbound contacts that were rejected by the selected agent after alerting started;
14. redirects due to time out or inbound contacts that were alerting to the selected agent and were redirected because they were not accepted within a time out period;
15. cancels or outbound contacts that were rejected by the selected agent before the far end accepted or answered the contact;
16. cancels due to time out or outbound contacts that were dropped because the far end did not accept the contact within the time out period;
17. agent releases first or contacts dropped by the selected agent with the customer being the last active party;
18. disconnects from hold or contacts put on hold by the selected agent that dropped prior to the selected agent reconnecting;
19. long holds or contacts that stayed on hold longer than a specified time threshold;
20. hold time or the sum of time intervals that contacts were put on hold by the selected agent;
21. short aux occurs when the selected agent stays in the aux (or auxiliary) state shorter than a specified time threshold;
22. aux time or the sum of all time intervals that the selected agent was in the aux state;
23. aux working time or the sum of all time intervals an selected agent was in aux states that are designated as working;
24. aux non-working time or the sum of all time intervals that the selected agent was in aux states that are designated as nonworking;
25. wrap up time or the sum of all time intervals that the selected agent was in the wrap-up state;
26. direct time or the sum of all time intervals that the selected agent was active on a contact distributed directly to the selected agent (i.e., not queued);
27. internal time or the sum of all time intervals in which the selected agent was active on a contact where all parties are internal to the system (i.e., have an interval address);
28. short contact-then-aux occurs when the selected agent has a contact whose active time slot and/or wrap-up time is less than a specified time threshold and the agent's next state is unstaffed (e.g., dumps a contact prior to break);
29. short contact-then-logout occurs when the selected agent has a contact whose active time and/or wrap-up time is less than a specified time threshold and the agent's next state is unstaffed (e.g., dumps a contact prior to break leaving);
30. login-then-aux occurs when the selected agent first logs in and immediately goes to the aux state (e.g., logs in but not ready to work);
31. short and long contacts side-by-side occurs when the agent manipulates contact durations to maintain a desired average serviced contact duration;
32. variation in active time occurs when across multiple contacts the selected agent has too little (less than a determined time threshold) or too much (in excess of a determined time threshold) variation in active time; and
33. variation in wrap-up time occurs when across multiple contacts the selected agent has too little (less than a determined time threshold) or too much (in excess of a determined time threshold) variation in wrap-up time.
34. Use of specific phrases in interacting with a customer (determined through content analysis or service observing).
In another configuration, beneficial behaviors are tracked, identified, and/or analyzed by the module 232, by contact type and/or distribution method. Exemplary beneficial behaviors include contacts, one-and-done, alerts, initiates, previews, wrap-ups, hold times having a duration within a specified time range (e.g., having a duration greater than a first selected threshold and less than a second selected threshold), and less than a selected threshold number of problem behaviors.
As will be appreciated, what is a problem behavior and what is a beneficial behavior frequently depends on the application. In different applications, the same behavior may be viewed in differing ways. Moreover, it is to be appreciated that the above lists of behaviors is not exhaustive. Other behaviors will be identified by those of ordinary skill in the art that are either problematic or beneficial.
The module 232 notifies contact center managers, in real time or periodically and using agent state and/or performance or problem behavior specific reports, when a selected agent has exhibited one or more of the target behaviors over a selected time period, such as one day or shift. Based on that notification, the module permits managers to drill down to a historical summary report to determine if a single target behavior or combination of target behaviors needs to be addressed or otherwise brought to the agent's attention. The same report can be used to review over a date range, such as a month, the total number of occurrences for or instances of each target behavior. From there, the manager can drill down and view data for each occurrence of a target behavior or can further refine the view by selecting only inbound or outbound contacts, direct or ACD distributed contacts, and/or interval or external contacts. Finally, the manager can further drill down to view a detailed trace for the agent or customer experience around the time the problem behavior occurred.
The module 232 preferably employs dimensional as opposed to relational modeling. As will be appreciated, dimensional modeling divides the world into measurements and context. Measurements are typically numeric and taken repeatedly. Numeric measurements are facts. Facts are surrounded by mostly textual context. Facts are very specific, well-defined numeric attributes and are collected in fact tables. The context surrounding facts is open-ended and verbose. Dimensions are selected groupings of context. Events are an occurrence or happening. Exemplary dimensions include work item (e.g., type, class, etc.), customer (e.g., identity, class, etc.), agent (e.g., identity, skills, etc.), routing (e.g., how work item was processed/routed, routing destination, etc.), class (e.g., inbound, outbound, internal, external, etc.), time (e.g., time stamp (date and time) of when an event occurred), state (e.g., state of agent, state of customer, state of work item, etc.), exit reason (e.g., reason for state change, etc.), and delivery method (e.g., direct, distributed, etc.) and/or an action involving one or more of the foregoing, such as arrival of a work item, agent state change, and the like. An event is typically associated with (structured) context. For example, events are typically associated with and/or are instances of the foregoing dimensions. A measure refers to a set of events having a defined relationship. Generally, an event is a point in time while a measure is a temporal duration or a count of event occurrences.
Examples of dimensions and measures are as follows: for problem behaviors one and two above, the dimensions are agent, agent state (active), date and time and the dimensional measure is the active time spent communicating; for problem behavior three above, the dimensions are agent, contact or agent state (alerting), date, and time and the dimensional measure is the altering time; for problem behavior four, the dimensions are agent, agent state (dialing), date and time and the dimensional measure is time spent dialing; for problem behavior five, the dimensions are agent, agent state (previewing), date and time and the dimensional measure is the time spent previewing the work item; for problem behavior six, the dimensions are agent, agent state (wrap-up), date, and time and the dimensional measure is the time spent wrapping up the contact; and so on.
The event processor 300 applies defined rules to group sets of dimensional events into dimensional measures. The operation of the processor 300 is a modified form of the event processing engine in CMS™ by Avaya Inc. The processor 300 is sensitive to the context associated with an event; thus, it can associate subsequent events of similar or related dimensionality.
The filtering agent 312 compares defined templates or rule sets against dimensional measures with a matching dimensional measure being considered to be an instance of a possible target behavior of a type defined by the matching template. The templates are user configurable. Templates commonly specify what dimensional measures are of interest and/or what the values (e.g., count and/or temporal duration) of the dimensional measures should be. Examples of templates are set forth above in problem behaviors 1-33. The reason that the matching dimensional event is considered to be a “possible” target behavior instance is that the dimensional event could have an innocent or acceptable explanation. The precise reason(s) for the occurrence of the matching dimensional event is typically investigated and determined only when a level of significance is associated with the matching behavior.
The threshold filter 320 determines whether or not a possible target behavior instance has a requisite level of significance warranting further investigation and determination by the target behavior monitor 328 (or contact center administrator/manager). This may be done either by comparing a total duration of all of the instances of a selected type of possible target behavior for a set of dimensions (e.g., over a selected time period interval) against a selected total duration threshold for that time interval or a count of the number of instances of a selected type of possible target behavior over a selected time interval against a selected count threshold for that time interval. When the selected threshold is exceeded, the possible target behavior instance is considered to be a target behavior instance warranting further investigation and determination by the target behavior monitor 328. When the selected threshold is not exceeded, the possible target behavior instance is not considered to be a target behavior instance warranting further investigation by the target behavior monitor 328.
As will be appreciated, differing types of target behavior can have differing thresholds. Some types of target behavior are considered generally to be more problematical or beneficial than others. Other types of target behavior are considered to more problematical or beneficial during particular time periods than others, e.g., during the busy hour, or with respect to particular types of work items than others, e.g., gold vs. bronze class. The differing levels of significance can be reflected by suitable adjustments to the thresholds. Thus, a first type of target behavior can have a first threshold under a first set of circumstances and a second different threshold under a second set of circumstances that differ from the first set.
As can be seen from
When a type of target behavior is considered to be significant, the target behavior monitor 328 may drill down or across, using context such as agent, routing point, date/time, state, etc., to greater detail to determine a potential cause or reason for the type of target behavior. The detail, for example, may be agent timeline(s) (e.g., a series of agent state changes as a fimction of time) and work item timeline(s) (e.g., a series of work item state changes as a function of time) that include dimensional events stored in dimensional event storage 336.
The operation of the module 232 will now be discussed with reference to
In box 1000, one or more dimensional events 304 arrives from the other components of the contact center, such as server 110, switch 130, and other servers 126.
In decision diamond 1004, the dimensional event processor 300 determines whether the end of the monitored time interval has arrived (i.e., whether the monitored time interval is over). If so, the processor 300, in step 1008, archives the received dimensional event(s), and, in step 1012, zeros out the various variables and awaits the arrival of a selected number of dimensional events in box 1000. If the interval is not over, the module 232 processes the events 304 into dimensional measures 308 and proceeds to step 1016.
In step 1016, the dimensional measure filtering agent 312 applies the rules or performs comparison matching against target behavior templates. When the selected dimensional measure 308 does not match a template, the module 232 awaits the arrival of the next dimensional event(s) in box 1000. When the selected dimensional measure 308 matches a template, an indicator is associated with the dimensional measure 308 data structures. The indicator typically identifies the type of target behavior corresponding to the matching template. The agent 312, in step 1024, updates the data structures accordingly.
In decision diamond 1028, the threshold filter 320 selects a threshold corresponding to the type of matching target behavior and determines whether the threshold is exceeded. As noted, the threshold may be either a count of the number of or a total duration identified instances of the target behavior over the selected time interval. If the threshold is not exceeded, the module 232 awaits the arrival of a selected number of dimensional events in box 1000. If the threshold is exceeded, the threshold filter 320, in step 1032, updates the formatting of data structures associated with the matching target behavior type and notifies the target behavior monitor 328. The formatting refers to the formatting of one or more fields in a notification or pertinent report. The formatting can be a font type or color or a color display for the field. For example, the field may show blank, yellow or red based on whether any one metric in the set of metrics associated with each light has exceeded a first or second threshold value. If any metric in the set exceeds the upper threshold for that metric, the light for the set displays red. If not and any metric exceeds the lower threshold, the light will be yellow. If not threshold is exceeded the light is blank.
The various reports used to track target behaviors will be discussed with reference to
The monitor 328 starts out with a group problem behavior summary table (either the table of
A number of variations and modifications of the invention can be used. It would be possible to provide for some features of the invention without providing others.
For example, the server and/or switch can be a software-controlled system including a processing unit (CPU), microprocessor, or other type of digital data processor executing software or an Application-Specific Integrated Circuit (ASIC) as well as various portions or combinations of such elements. The memory may be a random access memory (RAM), a read-only memory (ROM), or combinations of these and other types of electronic memory devices.
In another alternative embodiment, the module 232 prefilters events based on a set of rules followed by template matching. Prefiltering, for example, can group consecutive events or dimensions into related sets. For example, when a selected event is the dumping of a call a rule could require the next agent state to be associated with the event to determine if the call was dumped because the agent went on break or logged out. In a further example, when the selected event is a short or long call the rule could require the duration of the next work item to be associated with the event to determine whether the reason for a short or long call was a subsequent or preceding long or short call.
In other embodiments, the target behavior identification module 232 is implemented as depicted for target behaviors that are real-time in nature and/or as an application that queries a database and applies the rule sets to the data returned from the database filtered according to rules for behavior that are not real-time in nature (e.g., one might have different thresholds for an hour, day, week, month, etc., to identify a target behavior over different length time periods).
In another embodiment, information identifying target behaviors is stored in a separate data structure that combines disparate transactional data and rule sets into one structure for reporting and/or analysis of target behaviors.
The present invention, in various embodiments, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. Those of skill in the art will understand how to make and use the present invention after understanding the present disclosure. The present invention, in various embodiments, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease and\or reducing cost of implementation.
The foregoing discussion of the invention has been presented for purposes of illustration and description. The foregoing is not intended to limit the invention to the form or forms disclosed herein. In the foregoing Detailed Description for example, various features of the invention are grouped together in one or more embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the following claims are hereby incorporated into this Detailed Description, with each claim standing on its own as a separate preferred embodiment of the invention.
Moreover, though the description of the invention has included description of one or more embodiments and certain variations and modifications, other variations and modifications are within the scope of the invention, e.g., as may be within the skill and knowledge of those in the art, after understanding the present disclosure. It is intended to obtain rights which include alternative embodiments to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges or steps to those claimed, whether or not such alternate, interchangeable and/or equivalent structures, functions, ranges or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.
Number | Name | Date | Kind |
---|---|---|---|
4163124 | Jolissaint | Jul 1979 | A |
4510351 | Costello et al. | Apr 1985 | A |
4567323 | Lottes et al. | Jan 1986 | A |
4737983 | Frauenthal et al. | Apr 1988 | A |
4797911 | Szlam et al. | Jan 1989 | A |
4894857 | Szlam et al. | Jan 1990 | A |
5001710 | Gawrys et al. | Mar 1991 | A |
5097528 | Gursahaney et al. | Mar 1992 | A |
5101425 | Darland | Mar 1992 | A |
5155761 | Hammond | Oct 1992 | A |
5164981 | Mitchell et al. | Nov 1992 | A |
5164983 | Brown et al. | Nov 1992 | A |
5167010 | Elm et al. | Nov 1992 | A |
5185780 | Leggett | Feb 1993 | A |
5206903 | Kohler et al. | Apr 1993 | A |
5210789 | Jeffus et al. | May 1993 | A |
5274700 | Gechter et al. | Dec 1993 | A |
5278898 | Cambray et al. | Jan 1994 | A |
5289368 | Jordan et al. | Feb 1994 | A |
5291550 | Levy et al. | Mar 1994 | A |
5299260 | Shaio | Mar 1994 | A |
5309513 | Rose | May 1994 | A |
5311422 | Loftin et al. | May 1994 | A |
5325292 | Crockett | Jun 1994 | A |
5335268 | Kelly, Jr. et al. | Aug 1994 | A |
5335269 | Steinlicht | Aug 1994 | A |
5390243 | Casselman et al. | Feb 1995 | A |
5436965 | Grossman et al. | Jul 1995 | A |
5444774 | Friedes | Aug 1995 | A |
5467391 | Donaghue, Jr. et al. | Nov 1995 | A |
5469503 | Butensky et al. | Nov 1995 | A |
5469504 | Blaha | Nov 1995 | A |
5473773 | Aman et al. | Dec 1995 | A |
5479497 | Kovarik | Dec 1995 | A |
5499291 | Kepley | Mar 1996 | A |
5500795 | Powers et al. | Mar 1996 | A |
5504894 | Ferguson et al. | Apr 1996 | A |
5506898 | Costantini et al. | Apr 1996 | A |
5530744 | Charalambous et al. | Jun 1996 | A |
5537470 | Lee | Jul 1996 | A |
5537542 | Eilert et al. | Jul 1996 | A |
5544232 | Baker et al. | Aug 1996 | A |
5546452 | Andrews et al. | Aug 1996 | A |
5555299 | Maloney et al. | Sep 1996 | A |
5577169 | Prezioso | Nov 1996 | A |
5592378 | Cameron et al. | Jan 1997 | A |
5592542 | Honda et al. | Jan 1997 | A |
5594726 | Thompson et al. | Jan 1997 | A |
5603029 | Aman et al. | Feb 1997 | A |
5604892 | Nuttall et al. | Feb 1997 | A |
5606361 | Davidsohn et al. | Feb 1997 | A |
5611076 | Durflinger et al. | Mar 1997 | A |
5627884 | Williams et al. | May 1997 | A |
5642515 | Jones et al. | Jun 1997 | A |
5684872 | Flockhart et al. | Nov 1997 | A |
5684964 | Powers et al. | Nov 1997 | A |
5689698 | Jones et al. | Nov 1997 | A |
5703943 | Otto | Dec 1997 | A |
5713014 | Durflinger et al. | Jan 1998 | A |
5721770 | Kohler | Feb 1998 | A |
5724092 | Davidsohn et al. | Mar 1998 | A |
5740238 | Flockhart et al. | Apr 1998 | A |
5742675 | Kilander et al. | Apr 1998 | A |
5742763 | Jones | Apr 1998 | A |
5748468 | Notenboom et al. | May 1998 | A |
5749079 | Yong et al. | May 1998 | A |
5751707 | Voit et al. | May 1998 | A |
5752027 | Familiar | May 1998 | A |
5754639 | Flockhart et al. | May 1998 | A |
5754776 | Hales et al. | May 1998 | A |
5754841 | Carino, Jr. | May 1998 | A |
5757904 | Anderson | May 1998 | A |
5784452 | Carney | Jul 1998 | A |
5790642 | Taylor et al. | Aug 1998 | A |
5790650 | Dunn et al. | Aug 1998 | A |
5790677 | Fox et al. | Aug 1998 | A |
5794250 | Carino, Jr. et al. | Aug 1998 | A |
5796393 | MacNaughton et al. | Aug 1998 | A |
5802282 | Hales et al. | Sep 1998 | A |
5802510 | Jones | Sep 1998 | A |
5818907 | Maloney et al. | Oct 1998 | A |
5819084 | Shapiro et al. | Oct 1998 | A |
5825869 | Brooks et al. | Oct 1998 | A |
5826039 | Jones | Oct 1998 | A |
5828747 | Fisher et al. | Oct 1998 | A |
5836011 | Hambrick et al. | Nov 1998 | A |
5838968 | Culbert | Nov 1998 | A |
5839117 | Cameron et al. | Nov 1998 | A |
5864874 | Shapiro | Jan 1999 | A |
5875437 | Atkins | Feb 1999 | A |
5880720 | Iwafune et al. | Mar 1999 | A |
5881238 | Aman et al. | Mar 1999 | A |
5884032 | Bateman et al. | Mar 1999 | A |
5889956 | Hauser et al. | Mar 1999 | A |
5897622 | Blinn et al. | Apr 1999 | A |
5903641 | Tonisson | May 1999 | A |
5903877 | Berkowitz et al. | May 1999 | A |
5905793 | Flockhart et al. | May 1999 | A |
5909669 | Havens | Jun 1999 | A |
5911134 | Castonguay et al. | Jun 1999 | A |
5914951 | Bentley et al. | Jun 1999 | A |
5915012 | Miloslavsky | Jun 1999 | A |
5923745 | Hurd | Jul 1999 | A |
5926538 | Deryugin et al. | Jul 1999 | A |
5930786 | Carino, Jr. et al. | Jul 1999 | A |
5937051 | Hurd et al. | Aug 1999 | A |
5937402 | Pandit | Aug 1999 | A |
5940496 | Gisby et al. | Aug 1999 | A |
5943416 | Gisby | Aug 1999 | A |
5948065 | Eilert et al. | Sep 1999 | A |
5960073 | Kikinis et al. | Sep 1999 | A |
5963635 | Szlam et al. | Oct 1999 | A |
5963911 | Walker et al. | Oct 1999 | A |
5970132 | Brady | Oct 1999 | A |
5974135 | Breneman et al. | Oct 1999 | A |
5974462 | Aman et al. | Oct 1999 | A |
5982873 | Flockhart et al. | Nov 1999 | A |
5987117 | McNeil et al. | Nov 1999 | A |
5991392 | Miloslavsky | Nov 1999 | A |
5996013 | Delp et al. | Nov 1999 | A |
5999963 | Bruno et al. | Dec 1999 | A |
6000832 | Franklin et al. | Dec 1999 | A |
6011844 | Uppaluru et al. | Jan 2000 | A |
6014437 | Acker et al. | Jan 2000 | A |
6031896 | Gardell et al. | Feb 2000 | A |
6038293 | McNerney et al. | Mar 2000 | A |
6038296 | Brunson et al. | Mar 2000 | A |
6044144 | Becker et al. | Mar 2000 | A |
6044205 | Reed et al. | Mar 2000 | A |
6044355 | Crockett et al. | Mar 2000 | A |
6049547 | Fisher et al. | Apr 2000 | A |
6049779 | Berkson | Apr 2000 | A |
6052723 | Ginn | Apr 2000 | A |
6055308 | Miloslavsky et al. | Apr 2000 | A |
6064730 | Ginsberg | May 2000 | A |
6064731 | Flockhart et al. | May 2000 | A |
6084954 | Harless et al. | Jul 2000 | A |
6088441 | Flockhart et al. | Jul 2000 | A |
6108670 | Weida et al. | Aug 2000 | A |
6115462 | Servi et al. | Sep 2000 | A |
6128304 | Gardell et al. | Oct 2000 | A |
6151571 | Pertrushin | Nov 2000 | A |
6154769 | Cherkasova et al. | Nov 2000 | A |
6163607 | Bogart et al. | Dec 2000 | A |
6173053 | Bogart et al. | Jan 2001 | B1 |
6175564 | Miloslavsky et al. | Jan 2001 | B1 |
6178441 | Elnozahy | Jan 2001 | B1 |
6185292 | Miloslavsky | Feb 2001 | B1 |
6185603 | Henderson et al. | Feb 2001 | B1 |
6192122 | Flockhart et al. | Feb 2001 | B1 |
6215865 | McCalmont | Apr 2001 | B1 |
6226377 | Donaghue, Jr. | May 2001 | B1 |
6229819 | Darland et al. | May 2001 | B1 |
6230183 | Yocom et al. | May 2001 | B1 |
6233333 | Dezonmo | May 2001 | B1 |
6240417 | Eastwick et al. | May 2001 | B1 |
6259969 | Tackett et al. | Jul 2001 | B1 |
6263359 | Fong et al. | Jul 2001 | B1 |
6272544 | Mullen | Aug 2001 | B1 |
6275806 | Pertrushin | Aug 2001 | B1 |
6275812 | Haq et al. | Aug 2001 | B1 |
6275991 | Erlin | Aug 2001 | B1 |
6278777 | Morley et al. | Aug 2001 | B1 |
6292550 | Burritt | Sep 2001 | B1 |
6295353 | Flockhart et al. | Sep 2001 | B1 |
6298062 | Gardell et al. | Oct 2001 | B1 |
6307931 | Vaudreuil | Oct 2001 | B1 |
6324282 | McIllwaine et al. | Nov 2001 | B1 |
6332081 | Do | Dec 2001 | B1 |
6339754 | Flanagan et al. | Jan 2002 | B1 |
6353810 | Petrushin | Mar 2002 | B1 |
6356632 | Foster et al. | Mar 2002 | B1 |
6360222 | Quinn | Mar 2002 | B1 |
6366666 | Bengtson et al. | Apr 2002 | B2 |
6366668 | Borst et al. | Apr 2002 | B1 |
6389028 | Bondarenko et al. | May 2002 | B1 |
6389132 | Price | May 2002 | B1 |
6389400 | Bushey et al. | May 2002 | B1 |
6411682 | Fuller et al. | Jun 2002 | B1 |
6424709 | Doyle et al. | Jul 2002 | B1 |
6426950 | Mistry | Jul 2002 | B1 |
6427137 | Petrushin | Jul 2002 | B2 |
6430282 | Bannister et al. | Aug 2002 | B1 |
6434230 | Gabriel | Aug 2002 | B1 |
6446092 | Sutter | Sep 2002 | B1 |
6449356 | Dezonno | Sep 2002 | B1 |
6449358 | Anisimov et al. | Sep 2002 | B1 |
6449646 | Sikora et al. | Sep 2002 | B1 |
6453038 | McFarlane et al. | Sep 2002 | B1 |
6459787 | McIllwaine et al. | Oct 2002 | B2 |
6463148 | Brady | Oct 2002 | B1 |
6463346 | Flockhart et al. | Oct 2002 | B1 |
6463415 | St. John | Oct 2002 | B2 |
6463471 | Dreke et al. | Oct 2002 | B1 |
6480826 | Pertrushin | Nov 2002 | B2 |
6490350 | McDuff et al. | Dec 2002 | B2 |
6535600 | Fisher et al. | Mar 2003 | B1 |
6535601 | Flockhart et al. | Mar 2003 | B1 |
6553114 | Fisher et al. | Apr 2003 | B1 |
6556974 | D'Alessandro | Apr 2003 | B1 |
6560330 | Gabriel | May 2003 | B2 |
6560649 | Mullen et al. | May 2003 | B1 |
6560707 | Curtis et al. | May 2003 | B2 |
6563920 | Flockhart et al. | May 2003 | B1 |
6571285 | Groath et al. | May 2003 | B1 |
6574599 | Lim et al. | Jun 2003 | B1 |
6574605 | Sanders et al. | Jun 2003 | B1 |
6597685 | Miloslavsky et al. | Jul 2003 | B2 |
6603854 | Judkins et al. | Aug 2003 | B1 |
6604084 | Powers et al. | Aug 2003 | B1 |
6614903 | Flockhart et al. | Sep 2003 | B1 |
6650748 | Edwards et al. | Nov 2003 | B1 |
6668167 | McDowell et al. | Dec 2003 | B2 |
6675168 | Shapiro et al. | Jan 2004 | B2 |
6684192 | Honarvar et al. | Jan 2004 | B2 |
6700967 | Kleinoder et al. | Mar 2004 | B2 |
6704409 | Dilip et al. | Mar 2004 | B1 |
6707903 | Burok et al. | Mar 2004 | B2 |
6711253 | Prabhaker | Mar 2004 | B1 |
6735299 | Krimstock et al. | May 2004 | B2 |
6735593 | Williams | May 2004 | B1 |
6738462 | Brunson | May 2004 | B1 |
6744877 | Edwards | Jun 2004 | B1 |
6754333 | Flockhart et al. | Jun 2004 | B1 |
6757362 | Cooper et al. | Jun 2004 | B1 |
6766014 | Flockhart et al. | Jul 2004 | B2 |
6766326 | Cena | Jul 2004 | B1 |
6775377 | McIllwaine et al. | Aug 2004 | B2 |
6785666 | Nareddy et al. | Aug 2004 | B1 |
6822945 | Petrovykh | Nov 2004 | B2 |
6829348 | Schroeder et al. | Dec 2004 | B1 |
6839735 | Wong et al. | Jan 2005 | B2 |
6842503 | Wildfeuer | Jan 2005 | B1 |
6847973 | Griffin et al. | Jan 2005 | B2 |
6898190 | Shtivelman et al. | May 2005 | B2 |
6915305 | Subramanian et al. | Jul 2005 | B2 |
6947543 | Alvarado et al. | Sep 2005 | B2 |
6947988 | Saleh | Sep 2005 | B1 |
6963826 | Hanaman et al. | Nov 2005 | B2 |
6968052 | Wullert, II | Nov 2005 | B2 |
6981061 | Sakakura | Dec 2005 | B1 |
6985901 | Sachse et al. | Jan 2006 | B1 |
6988126 | Wilcock et al. | Jan 2006 | B2 |
7010542 | Trappen et al. | Mar 2006 | B2 |
7020254 | Phillips | Mar 2006 | B2 |
7035808 | Ford | Apr 2006 | B1 |
7035927 | Flockhart et al. | Apr 2006 | B2 |
7039176 | Borodow et al. | May 2006 | B2 |
7062031 | Becerra et al. | Jun 2006 | B2 |
7076051 | Brown et al. | Jul 2006 | B2 |
7100200 | Pope et al. | Aug 2006 | B2 |
7103562 | Kosiba et al. | Sep 2006 | B2 |
7110525 | Heller et al. | Sep 2006 | B1 |
7117193 | Basko et al. | Oct 2006 | B1 |
7136873 | Smith et al. | Nov 2006 | B2 |
7149733 | Lin et al. | Dec 2006 | B2 |
7155612 | Licis | Dec 2006 | B2 |
7158628 | McConnell et al. | Jan 2007 | B2 |
7162469 | Anonsen et al. | Jan 2007 | B2 |
7165075 | Harter et al. | Jan 2007 | B2 |
7170976 | Keagy | Jan 2007 | B1 |
7170992 | Knott et al. | Jan 2007 | B2 |
7177401 | Mundra et al. | Feb 2007 | B2 |
7200219 | Edwards et al. | Apr 2007 | B1 |
7203655 | Herbert et al. | Apr 2007 | B2 |
7212625 | McKenna et al. | May 2007 | B1 |
7215744 | Scherer | May 2007 | B2 |
7246371 | Diacakis et al. | Jul 2007 | B2 |
7257513 | Lilly | Aug 2007 | B2 |
7257597 | Pryce et al. | Aug 2007 | B1 |
7266508 | Owen et al. | Sep 2007 | B1 |
7283805 | Agrawal | Oct 2007 | B2 |
7295669 | Denton et al. | Nov 2007 | B1 |
7299259 | Petrovykh | Nov 2007 | B2 |
7324954 | Calderaro et al. | Jan 2008 | B2 |
7340408 | Drew et al. | Mar 2008 | B1 |
7376127 | Hepworth et al. | May 2008 | B2 |
7392402 | Suzuki | Jun 2008 | B2 |
7418093 | Knott et al. | Aug 2008 | B2 |
7499844 | Whitman, Jr. | Mar 2009 | B2 |
7545925 | Williams | Jun 2009 | B2 |
20010011228 | Shenkman | Aug 2001 | A1 |
20010034628 | Eder | Oct 2001 | A1 |
20010056349 | St. John | Dec 2001 | A1 |
20010056367 | Herbert et al. | Dec 2001 | A1 |
20020002460 | Pertrushin | Jan 2002 | A1 |
20020002464 | Petrushin | Jan 2002 | A1 |
20020010587 | Pertrushin | Jan 2002 | A1 |
20020012186 | Nakamura et al. | Jan 2002 | A1 |
20020019829 | Shapiro | Feb 2002 | A1 |
20020021307 | Glenn et al. | Feb 2002 | A1 |
20020035605 | McDowell et al. | Mar 2002 | A1 |
20020038422 | Suwamoto et al. | Mar 2002 | A1 |
20020065894 | Dalal et al. | May 2002 | A1 |
20020076010 | Sahai | Jun 2002 | A1 |
20020085701 | Parsons et al. | Jul 2002 | A1 |
20020087630 | Wu | Jul 2002 | A1 |
20020112186 | Ford et al. | Aug 2002 | A1 |
20020116336 | Diacakis et al. | Aug 2002 | A1 |
20020116461 | Diacakis et al. | Aug 2002 | A1 |
20020118816 | Flockhart et al. | Aug 2002 | A1 |
20020123923 | Manganaris et al. | Sep 2002 | A1 |
20020181692 | Flockhart et al. | Dec 2002 | A1 |
20020194002 | Petrushin | Dec 2002 | A1 |
20030014491 | Horvitz et al. | Jan 2003 | A1 |
20030028621 | Furlong et al. | Feb 2003 | A1 |
20030048893 | McIllwaine et al. | Mar 2003 | A1 |
20030073440 | Mukherjee et al. | Apr 2003 | A1 |
20030093465 | Banerjee et al. | May 2003 | A1 |
20030108186 | Brown et al. | Jun 2003 | A1 |
20030144900 | Whitmer | Jul 2003 | A1 |
20030144959 | Makita | Jul 2003 | A1 |
20030174830 | Boyer et al. | Sep 2003 | A1 |
20040008828 | Coles et al. | Jan 2004 | A1 |
20040015496 | Anonsen | Jan 2004 | A1 |
20040015506 | Anonsen et al. | Jan 2004 | A1 |
20040054743 | McPartlan et al. | Mar 2004 | A1 |
20040057569 | Busey et al. | Mar 2004 | A1 |
20040102940 | Lendermann et al. | May 2004 | A1 |
20040103324 | Band | May 2004 | A1 |
20040138944 | Whitacre et al. | Jul 2004 | A1 |
20040162998 | Tuomi et al. | Aug 2004 | A1 |
20040165717 | Mcllwaine et al. | Aug 2004 | A1 |
20040202308 | Baggenstoss et al. | Oct 2004 | A1 |
20040202309 | Baggenstoss et al. | Oct 2004 | A1 |
20040203878 | Thomson | Oct 2004 | A1 |
20040210475 | Starnes et al. | Oct 2004 | A1 |
20040240659 | Gagle et al. | Dec 2004 | A1 |
20040249650 | Freedman et al. | Dec 2004 | A1 |
20040260706 | Anonsen et al. | Dec 2004 | A1 |
20050021529 | Hodson et al. | Jan 2005 | A1 |
20050027612 | Walker et al. | Feb 2005 | A1 |
20050044375 | Paatero et al. | Feb 2005 | A1 |
20050065837 | Kosiba et al. | Mar 2005 | A1 |
20050071211 | Flockhart et al. | Mar 2005 | A1 |
20050071212 | Flockhart et al. | Mar 2005 | A1 |
20050071241 | Flockhart et al. | Mar 2005 | A1 |
20050071844 | Flockhart et al. | Mar 2005 | A1 |
20050091071 | Lee | Apr 2005 | A1 |
20050125432 | Lin et al. | Jun 2005 | A1 |
20050125458 | Sutherland et al. | Jun 2005 | A1 |
20050138064 | Trappen et al. | Jun 2005 | A1 |
20050154708 | Sun | Jul 2005 | A1 |
20050182784 | Trappen et al. | Aug 2005 | A1 |
20050289446 | Moncsko et al. | Dec 2005 | A1 |
20060004686 | Molnar et al. | Jan 2006 | A1 |
20060007916 | Jones et al. | Jan 2006 | A1 |
20060015388 | Flockhart et al. | Jan 2006 | A1 |
20060026049 | Joseph et al. | Feb 2006 | A1 |
20060056598 | Brandt et al. | Mar 2006 | A1 |
20060135058 | Karabinis | Jun 2006 | A1 |
20060167667 | Maturana et al. | Jul 2006 | A1 |
20060178994 | Stolfo et al. | Aug 2006 | A1 |
20060242160 | Kanchwalla et al. | Oct 2006 | A1 |
20060256957 | Fain et al. | Nov 2006 | A1 |
20060285648 | Wahl et al. | Dec 2006 | A1 |
20070038632 | Engstrom | Feb 2007 | A1 |
20070064912 | Kagan et al. | Mar 2007 | A1 |
20070083572 | Bland et al. | Apr 2007 | A1 |
20070112953 | Barnett | May 2007 | A1 |
20070127643 | Keagy | Jun 2007 | A1 |
20070156375 | Meier et al. | Jul 2007 | A1 |
20070192414 | Chen et al. | Aug 2007 | A1 |
20070201311 | Olson | Aug 2007 | A1 |
20070201674 | Annadata et al. | Aug 2007 | A1 |
20070230681 | Boyer et al. | Oct 2007 | A1 |
20080056165 | Petrovykh | Mar 2008 | A1 |
Number | Date | Country |
---|---|---|
2143198 | Jan 1995 | CA |
2174762 | Mar 1996 | CA |
0501189 | Sep 1992 | EP |
0 740 450 | Oct 1996 | EP |
0770967 | May 1997 | EP |
0772335 | May 1997 | EP |
0 829 996 | Mar 1998 | EP |
0 855 826 | Jul 1998 | EP |
0 866 407 | Sep 1998 | EP |
0863651 | Sep 1998 | EP |
899673 | Mar 1999 | EP |
988108 | May 2000 | EP |
1035718 | Sep 2000 | EP |
1091307 | Apr 2001 | EP |
1150236 | Oct 2001 | EP |
2273418 | Jun 1994 | GB |
2290192 | Dec 1995 | GB |
2001-053843 | Feb 2001 | JP |
WO 02099640 | Dec 2002 | JP |
2006-054864 | Feb 2006 | JP |
WO 9607141 | Mar 1996 | WO |
WO 9728635 | Aug 1997 | WO |
WO 9856207 | Dec 1998 | WO |
WO 9917522 | Apr 1999 | WO |
WO 0180094 | Oct 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20060271418 A1 | Nov 2006 | US |
Number | Date | Country | |
---|---|---|---|
60685258 | May 2005 | US |