This disclosure relates generally to computer based systems for collaboration and unified communications.
A large number of services on the Internet offer varying types of collaborative mechanisms. Similarly, a large number of social networking websites enable creation and maintenance of one-on-one and group relationships.
The disclosure is generally directed to improved methods and apparatus for bringing together a number of people into a social or business network with one or more common interests (a “sphere of trust”). One of the obstacles to doing so is the various methods of contact and standards for each of the communications alternatives available to each user. In addition, users may not wish to have their communications connectivity information be made public, even to those within the same sphere of trust.
Different aspects of a preferred embodiment of an exemplary application of the invention help to enable bringing together people with a common interest into an on-line virtual collaboration social or work unit or sphere of trust that allows participants to contact others within the sphere, using a method designated by the participant being contacted, without the participants needing to be aware of the underlying communications infrastructure or method of contact, and without any of the participants having to sharing connectivity information. In a preferred embodiment, the infrastructure can be any method of contact available to the users, including but not limited to, the public Internet, instant messaging, public or private telephony systems, or wireless communication technologies.
A preferred embodiment of the invention is described below in reference to a virtual meeting room service. A virtual meeting room service is an example to which various teachings of the invention can be advantageously employed. Unless otherwise expressly stated in a claim, the invention is not limited to a virtual meeting room service and could be embodied in other types of social and/or professional networking services and platforms.
In the following description, like numbers refer to like elements.
Referring to
Each room represents a group of users who are part of a sphere of trust between members. Typically, these users might be employees of an organization who are working together on a project or an issue. It contemplates the possibility of internal members as well as external members, who are outside the usual sphere of trust, such as experts or other participants with various level of ability to interact with the internal members.
Web page 100 includes in area 102 representations of each individual who is a member of the meeting room. The representations could be, for example, simply a name or other identifier. Associated with each member representation are indications of availability and presence. If a member is “available,” it means that the member has provided contact information for members of this room to contact the member. Contact information includes, for example, standard telephone numbers, universal location identifiers, instant messaging (IM) addresses, and email addresses. The communication medium could be text, voice or video. The actual contact information is not, however, displayed. “Presence” means that the person is present in the virtual meeting room. In the embodiment described herein, presence is detected or determined by whether a member is logged into the server. This presence detection mechanism could be augmented or replaced by a mechanism to test whether a member is, in fact, present at a computer, without a client interface open. Examples include automated log-off in the event of inactivity for a specified period of time and programs to detect whether the window of the web browser or client application is activated or in front.
It is preferred that area 102 represents a virtual environment that mimics an appropriate real-world meeting environment. In this example, areas 104 hold photographs or other graphical representations of members. The name of each individual and the company or organization with which the individual is affiliated are also displayed next to the photograph. The photos are arranged around the representation of a conference table 106. Next to each photograph are three icons. Icon 108 indicates whether or not the person is available to be contacted by members of the virtual meeting room. Icon 110 represents whether the person is present in the virtual meeting room. Icon 112 indicates whether the person is busy. In the preferred embodiment, icon 112 is indicated as being busy only when the member is on a call with another member of the same room, and not when they might be on a call with a member of a different room.
Web browser pages can be customized so that users feel comfortable with the use, operation, look, and feel of the service. Furthermore, more elaborate virtual environments can be utilized. For example, an avatar capable of moving around the room could represent each of the members. Presence could be indicated by moving the avatar into the room; absence could be indicated by a still photograph or icon. A conversation occurring between only certain members of a room could be represented by avatars for those members moving to one side of the room.
In a preferred embodiment, members may upload or post files or links to files (for example, in an external document repository) for sharing. These files are made available only to members of the room. Files that are uploaded are listed on a window that is displayed within section 114 of the main web page when the tab “Document” is selected. Included with the name of the file are preferably also the date of posting, the name of the member posting it, and comments describing the file. Files can be downloaded or, optionally, viewed within the browser. Members preferably also are enabled to search internal or external document repositories and post a reference to the document so that other members can view the document within the context of the room. A “browse” selector 115 is provided so that the member can search for documents on any connected repository. Audio files (recordings) can be attached as a document, as well as telephone conversation recordings. All documents are accessible (sight and sound) to all members of the room, unless marked by an internal member from being viewed by an external member of the room.
Members that are currently logged into the virtual meeting room server can post text messages using the text messaging section 116. Messages posted by members are displayed in section 116 of the main browser screen and made available to all members. Although not illustrated, a preferred embodiment allows messages to be directed to designated members, which will be displayed only to those members. In essence, these are private messages. Finally, a preferred embodiment also includes an on-line chat mechanism. Although not illustrated in
The virtual meeting room service preferably is capable of allowing a member to integrate the capabilities of the virtual meeting room service with commercial desktop applications, such as calendars, meeting applications, and word processors. For example, by selecting to import reminders from a room to a calendar application, the member can be reminded of assigned tasks in the sphere even when he or she is not logged into the method's application.
In one preferred embodiment, the processes may include a “stealth” mode, for executive and/or other authorized users. In this mode, a member can view all, or selected, activities occurring in one or more spheres without knowledge of the other members of the sphere.
Each user can be a member of more than one room. If the user is member of more than one room, the rooms are indicated on tabs 118. Selecting one of the other rooms will display an interface for that room.
In its preferred embodiment, the virtual meeting room is persistent, meaning that its state is preserved even when all members are logged out, or even as members are added and deleted. The state is typically preserved until the room is deleted. All documents, messages, reminders and history and other elements are preferably part of the state of the room unless otherwise specified.
If a user has sufficient rights, a member can manage the room and add and delete users by selecting the “Manage Room” link 120. Selecting link 122 allows a member to configure the member's contact information and other preferences.
Referring now to
A member securely logs into the server and configures methods for contacting the member, if any, at step 204. The methods of contact include all the ways that the user may want to be considered available to the other users within the room. Examples of the methods of contact include, but are not limited to, standard telephone numbers, universal location identifiers, Instant Messaging (IM) addresses, or email addresses.
Once the member has defined methods for contacting the member, the member defines one or more profiles, which consists of one or more of the methods of contact just configured. Each profile has a unique name that is configurable by the member. The member then specifies the profile that the member wishes to be made known to the other users within the room. Preferably, a member's availability can be configured to be global—applied to all rooms in which he or she is a member—or individually by sphere.
Returning to
When one member wishes to contact another member, the member desiring to initiate contact selects (using normal keystroke or mouse selection techniques) an icon associated with the other member in the interface. A request to connect to the member is received by the server, as indicated by step 208. The server looks up the method of contact specified for each member on the connection. Then, it attempts first to connect to the member initiating the connection using the methods of contact contained in initiating member's profile, as indicated by step 212. Once that is successful, it initiates, as indicated by step 214, a connection to the other member. If that connection is successful, a communication bridge is established at step 216. Neither member needs to have any knowledge of the method of contact contained in the other's profile. Furthermore, this information is preferably not shared with any other member. In the example illustrated by the figure, the connection is a voice call. However, the communications session can be over any type of communication infrastructure, such as the PSTN (including cellular or mobile networks), PBX, wireless and/or wired computer networks (LAN, WAN, and Internet) or combinations of them, whether by voice, instant messaging or chat, video or other application.
Additional members can similarly be added to the connection. All members can be permitted to communicate on the same connection if the bridging facility is capable of supporting them. Steps 218, 220 and 222 illustrate an example of this process. One of the members already on the connection initiates a connection to one of the other members by simply selecting the member's icon. The server initiates a call to that third member, using that member's specified method of contact, and bridges the member in once the member answers, or terminates the connection if the member does not answer. Any member on the connection can request dropping a member (including itself) from the connection by selecting its icon, as indicated by steps 224 and 226. Allowing any member once on a connection to add new members and to drop members, rather than just the connection organizer, avoids problems when a connection organizer decides to drop off before the conference among the members is completed. As indicated by step 228, once all parties drop off the connection, the bridge is terminated.
In this example, the virtual meeting room server communicates through a web server 408 or a SOAP (Simple Object Access Protocol) interface 410. The web server interface responses to HTTP requests from web browsers, such as web browser instance 409, which is running on a computer connected to the virtual room server through Internet 406. The web browser could also be on a computer on the same local area network (LAN) or wide area network (WAN) as the virtual meeting room server. The SOAP interface communicates with non-browser implementations of clients. One example is desktop client instance 411. Like the web browser instance, it is running on a computer connected to SOAP interface 410 through the Internet 406, but could also be on the same computer or on a different computer on the same LAN or WAN as the virtual meeting room server. Other interfaces could be implemented as well, depending on the nature of the client. GR session layer 412 is an abstraction layer that provides syntax and protocol mapping in order to enable the core logic of the server to interact with different interfaces, such as the web server and the SOAP interface.
The core logic of the server is implemented as modules to allow for expansion of additional modules. In this example, text messaging module 414 implements the messaging service described above. Room service 416 implements processes for creating and managing virtual rooms. User functions, including for example, the logic for interfacing with a user to receive methods of contact and generating the status, and storing contact information are implemented by user service 418. Voice service 420 provides logic for interacting with members and sending commands to call controller 422 to initiate, terminate and bridge voice calls. This communication is indicated by dashed line 424. In this example, remote method invocation (RMI) is used to communicate between the voice service module and the call controller 422. However, other methods and protocols can be used. History service 428 manages recording and tracking of the events for each virtual room. Document service 430 manages the files posted or otherwise available to each room. File types that can be posted or stored are not limited strictly to documents per se. Any form of data that can be stored as a file can be stored as a document and managed by the document service. Examples of file types include those storing voice, video, audio, recorded conferences, executable programs and database reports.
Each of these services stores data in one or more databases. In this example a relational database management system (RDBMS) 431 is being used, but other types of database systems could be employed. Database adapters 432, 434, 436, 438, 440 and 442 provide class to table conversion for respective services modules. File system 444 stores files for the document service 430. The document service works through the RDBMS to access the file system. This file system can be on the same computer or on a different computer. It may also take the form of a document repository or archiving application. File service can be set up to access more than one type of file system, which can be located on other computers, either on the same LAN or WAN as the virtual meeting room server, or on another network.
To set up bridges for voice calls between members using a process such as the one described in connection with
The figure illustrates an example call routing of the type described in
In this example, the call controller 422 is assumed to be on the same computer or on a computer on the same local network as the server. However, a call controller hosted by a third party can also be utilized. The ability to use desktop software telephones can also be supported. Signaling interfaces to PBX, presence servers, and other standards compliant communications equipment could also be included. The virtual room server includes, or makes use of otherwise installed, email gateways (not indicated) so that members can be invited to a new or existing member, or be contacted as their preferred method of contact from members of a sphere.
Metrics or statistics are preferably gathered and analyzed so that, if so desired, use of the method can be metered and charged for use. Examples of various metrics and statistics gathered include the creation, activity within, and closure of a virtual room. These metrics can be used to search for patterns, or bill for feature use.
The virtual meeting room server 402 can exist in several instances on multiple computers. Furthermore, its components can be distributed among several computers. Components, such as the web server, RDBMS, and SOAP interface, could be shared with other processes if desired.
Some additional advantages of exemplary, preferred embodiments described above include one or more of the following. The preferred embodiments provide a secure environment that can be hosted internally or externally to the enterprise or service provider. The client side software is relative simple, and requires only a commercially available browser. The service is scalable to very large sizes, up to millions of users, as a communications infrastructure overlay. It provides user call control that enables multi-party calls. Document posting, external document searching, and external document repository searching can be made available. History of all events and activities occurring within the room are automatically recorded. A number of different functions can be provided, such as alerts, reminders, notes and text messaging capability.
Although an exemplary embodiment of the present invention has been described in detail, those skilled in the art will understand that various changes, substitutions, variations, and improvements of the invention disclosed herein may be made without departing from the spirit and scope of the invention in its broadest form.
None of the description in the present application should be read as implying that any particular element, step, or function is an essential element which must be included in the claim scope: the scope of patented subject matter is defined only by the allowed claims. Moreover, none of these claims are intended to invoke paragraph six of 35 USC § 112 unless the exact words “means for” or “steps for” are followed by a participle.
This application claims the benefit of U.S. provisional application No. 60/870,359, filed Dec. 15, 2006 and U.S. provisional application No. 60/871,423, filed Dec. 21, 2006, each of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60870359 | Dec 2006 | US | |
60871423 | Dec 2006 | US |