The invention relates generally to communications and more specifically to communication applications.
In computing, a softphone is a software program for making telephone calls over the Internet using a general purpose computer, rather than using dedicated hardware. Often a softphone is designed to behave like a traditional telephone, sometimes appearing as an image of a phone, with a display panel and buttons with which the user can interact. A softphone is usually used with a headset connected to the sound card of the PC, laptop, or the like, or with a USB phone.
Traditionally, softphone applications have had embedded support only for voice and video communication. When a specialized communication medium is required, such as Teletypewriter or Teletype (TTY), the softphone must be operated in a mode that places it in conjunction with a separate special-purpose endpoint device. It may be possible to provide embedded support for TTY into a softphone. However, if TTY communications are required, then a text chat window will need to be populated on the softphone.
The use of a text chat window is not necessarily that difficult to implement. However, in order to prevent the Graphical User Interface (GUI) of the softphone from becoming unnecessarily cluttered, it is desirable that the text chat window be presented only when required, and that it remain hidden or inactive when not required.
It is also desirable only to enable communications via a certain medium to prevent the unnecessary utilization of communication hardware and network bandwidth. For example, if two communication devices are both capable of communicating via voice, video, and text, it may not be desirable to assign hardware resources for voice, video, and text at the onset of the communication session unless the participants are going to use all three media. Not only would hardware resources (e.g., ports, drivers, processors, memory, etc.) be unnecessarily consumed, but network bandwidth would also be unnecessarily consumed. It would be much more desirable to assign such resources on an as-needed basis and in response to the desires and needs of the communication session participants.
Some existing communication solutions allow users to activate the application windows manually. However, it is important to note that, in a completely manual process, participants (especially contact center agents) may not be aware that a call is from a TTY user and, therefore, may fail to enable a text window in a timely manner. Accordingly, it is one aspect of the present invention to allow an application window, such as a text window, to be activated automatically by the softphone for calls that were pre-identified as being from TTY users.
Contact center techniques exist for pre-identifying TTY callers that include requiring the callers to call into the center via a TTY-only inbound phone number and/or presenting callers with an automated attendant application that asks them to self-identify. In both cases, calls are placed in a TTY hunt group prior to their being presented to an agent. A call may be tagged as being from the TTY hunt group to automatically trigger the contact center agent's communication device to activate its text window.
The above-described automatic activation techniques still fail to solve the following problems:
(1) Softphone-equipped employees at an enterprise may receive direct-dial calls from PSTN-based TTY users, in the same way that inbound direct-dial voice calls may be received. Calls may also be transferred between employees of a contact center without traversing the TTY hunt group. In these scenarios, currently available techniques do not provide a way to activate the called party's text window automatically because there is no pre-identification of TTY users.
(2) In communication environments that support multi-mode “unified communication,” people, including those with no disability-related need to use a TTY, may wish to supplement their communications with a different medium at some point during the communication session. For example, “Party A” may wish to send “Party B” a URL that cannot conveniently be sent by voice, or may simply wish to transmit something by text because voice can be overheard by people who are nearby. In these scenarios, the prior art techniques do not provide a way to automatically activate Party B's text window (or other data-appropriate application).
In response to these problems, embodiments of the present invention provide another mechanism that will cause an application and/or the application's window to open automatically.
It is one aspect of the present invention to take advantage of a “TTY-on-IP” codec that was implemented in Avaya gateways approximately six years ago. The gateway solution works in the following manner:
Rather than transport TTY signals on IP networks as in-band audio tones (which are prone to distortion in the presence of packet loss or audio compression), Avaya systems transport TTY signals as, what are in essence, verbal descriptions of the tones. The encoding format conforms to the protocol specified by IETF Standard RFC-2833. Consistent with the RFC-2833 standard, the packets have headers that identify the format of the information contained within the packet.
In accordance with at least some embodiments of the present invention, all packets that contain TTY information, that are received by a communication device from a gateway or from another communication device, will have headers that can indicate: “This packet contains TTY information.” Based solely on its inspection of the packet headers, with no inspection of the packet content, a packet analyzer provided in a communication device, such as a softphone, can be user-configured to open its TTY/text window immediately and automatically upon receipt of a TTY transmission that is formatted in the above-described manner.
While certain examples will be discussed herein related to the automatic triggering of a text window and text application, one skilled in the art will appreciate that embodiments of the present invention are not so limited. More specifically, embodiments of the present invention include the general idea of utilizing packet headers as a trigger for automatic activation or de-activation of a special-purpose software application, which may or may not be implemented in conjunction with a softphone.
Illustratively, in addition to RFC-2833, industry-standard protocols that support conversational text in SIP environments include RFC-4103, RFC-4351, and RFC-5194. Detection of an RFC-4103, RFC-4351, or RFC-5194 packet header could trigger the automatic opening of a text chat window. Alternatively, or in addition, if a communication session begins as a text-based communication, the detection of a G.711, G.722, G.726, G.729, or any other voice-based packet header could trigger the automatic opening of a voice application window. Alternatively, or in addition, if a communication session begins as a non-video-based communication, the detection of a video packet header could trigger the automatic opening of a video application window. Exemplary video standards which may be followed in forming a video packet include, but are not limited to, RFC-2250, RFC-3189, RFC-4175, RFC-4421, and others.
The standards discussed above in connection with the various media types are but examples of the well-known and, in some instances, standardized codecs used today. Embodiments of the present invention are not limited to these exemplary codecs and standards should not be construed in such a manner.
In other words, the fundamental premise of the present invention can be extended beyond the automatic opening of a text chat window. For example, the receipt of a packet header that indicates video content could trigger the automatic opening of a video display window. In this scenario, initial negotiation of the communication session would serve as a confirmation that the endpoints are video-capable, but would not necessarily cause the utilization of a video-based communication session. In order to conserve screen real estate, a video window would not be opened by the communication endpoint prior to the endpoint's receipt of video packets that call for it. Although conservation of screen space is one beneficial feature obtained by implementing certain embodiments of the present invention, utilization of mechanisms described herein also include: (1) preservation of computer resources, such as CPU and memory, by not assigning them to a softphone's special applications until these resources are known to be needed and (2) conserving network bandwidth by not reserving such bandwidth for the special applications until it is known to be needed.
In accordance with at least some embodiments of the present invention, the communication endpoint might ask for the user's confirmation before opening a window automatically (e.g., “You are receiving a video transmission. Do you want to see it?”).
In accordance with at least some embodiments of the present invention, inspection of the packet header alone would trigger the opening of the appropriate application and window and, simultaneously, trigger the activation of the required codec. As an example of why this might be desirable, RFC-2833 and RFC-4103 encode text differently. An endpoint would need to activate a different codec upon receipt of an RFC-2833 or RFC-4103 packet, but might nevertheless use the same text chat GUI window for both.
In accordance with at least some embodiments of the present invention, a buffer in the receiving communication device is adapted to save and allow the subsequent playback of information that was received while the special-purpose application is being enabled. Illustratively, this would ensure that the TTY character that triggered the text chat window is seen by the recipient immediately upon opening the text chat GUI window.
In accordance with at least some embodiments a method is provided that generally comprises:
establishing, at a first communication device, a communication session with a second communication device, wherein the first communication device utilizes at least a first application for communicating with the second communication device via at least a first medium, the first medium having been negotiated prior to the establishment of the communication session;
during the communication session, receiving as a part of the communication session a communication packet at the first communication device;
analyzing, by the first communication device, a header portion of the received communication packet; and
based on the analysis of the header portion, invoking by the first communication device at least a second application for communicating via at least a second medium.
The term “computer-readable medium” as used herein refers to any tangible storage and/or transmission medium that participates in storing and/or providing instructions to a processor for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, NVRAM, or magnetic or optical disks. Volatile media includes dynamic memory, such as main memory. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, magneto-optical medium, a CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, solid state medium like a memory card, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read. A digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. When the computer-readable media is configured as a database, it is to be understood that the database may be any type of database, such as relational, hierarchical, object-oriented, and/or the like. Accordingly, the invention is considered to include a tangible storage medium or distribution medium and prior art-recognized equivalents and successor media, in which the software implementations of the present invention are stored.
The terms “determine,” “calculate” and “compute,” and variations thereof, as used herein, are used interchangeably and include any type of methodology, process, mathematical operation or technique.
The term “module”, “agent”, or “tool” as used herein refers to any known or later developed hardware, software, firmware, artificial intelligence, fuzzy logic, or combination of hardware and software that is capable of performing the functionality associated with that element. Also, while the invention is described in terms of exemplary embodiments, it should be appreciated that individual aspects of the invention can be separately claimed.
The preceding is a simplified summary of embodiments of the invention to provide an understanding of some aspects of the invention. This summary is neither an extensive nor exhaustive overview of the invention and its various embodiments. It is intended neither to identify key or critical elements of the invention nor to delineate the scope of the invention but to present selected concepts of the invention in a simplified form as an introduction to the more detailed description presented below. As will be appreciated, other embodiments of the invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
The invention will be illustrated below in conjunction with an exemplary communication system. Although well suited for use with, e.g., a system using a server(s) and/or database(s), the invention is not limited to use with any particular type of communication system or configuration of system elements. Those skilled in the art will recognize that the disclosed techniques may be used in any communication application in which it is desirable to automatically manage the activation and/or de-activation of communication applications.
The exemplary systems and methods of this invention will also be described in relation to analysis software, modules, and associated analysis hardware. However, to avoid unnecessarily obscuring the present invention, the following description omits well-known structures, components and devices that may be shown in block diagram form, are well known, or are otherwise summarized.
For purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the present invention. It should be appreciated, however, that the present invention may be practiced in a variety of ways beyond the specific details set forth herein.
Referring now to
The communications between communication devices 108 may be direct communications or, in some embodiments, may be facilitated by a communications server and/or switch. In other embodiments, communications between communication devices 108 may traverse one or more gateway 112, such as in a contact center configuration where one communication device 108 is operated by a contact center agent on an enterprise side of the gateway 112 and another communication device 108 is operated by a customer on the public side of the gateway 112.
The communication network 104 may be any type of known communication medium or collection of communication media and may use any type of protocols to transport messages between endpoints. The communication network 104 may include wired and/or wireless communication technologies. The Internet is an example of the communication network 104 that constitutes an IP network consisting of many computers and other communication devices located all over the world, which are connected through many telephone systems and other means. Other examples of the communication network 104 include, without limitation, a standard Plain Old Telephone System (POTS), an Integrated Services Digital Network (ISDN), the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Session Initiation Protocol (SIP) network, a cellular communication network, a satellite communication network, any type of enterprise network, and any other type of packet-switched or circuit-switched network known in the art. Generally speaking however, the communication network 104 comprises at least one packet-based communication network. In addition, it can be appreciated that the communication network 104 need not be limited to any one network type, and instead may be comprised of a number of different networks and/or network types.
The communication devices 108 may be any type of known communication or processing device such as a Digital Control Protocol (DCP) phone, VoIP telephones, Push-To-Talk (PTT) telephony devices, a computer (e.g., personal computer, laptop, or Personal Digital Assistant (PDA)) with a Computer Telephony Interface (CTI), a mobile telephone, a smart phone, or combinations thereof. In accordance with at least some embodiments of the present invention, at least one of the communication devices 108 is a softphone. The term “softphone” as used herein should be understood to include any type of device comprising a processor and memory having one or more communication applications stored thereon. The communication applications stored on the communication device 108 allow the communication device to operate and behave like a traditional phone having dedicated hardware for facilitating communications. A softphone, on the other hand, does not generally have dedicated hardware to facilitate real-time communications with other users of other communication devices. Rather, the softphone utilizes one or more of its applications to facilitate such communications. In some embodiments, the softphone may be embodied as a single device (e.g., a PC, laptop, or similar type of personal workstation) which is connected to the Internet. In other embodiments, the softphone may be embodied as multiple devices where one device comprises the communication application(s) but is connected to another simple telephone which provides the connection between the device having the application(s) and the PSTN, for example. Other configurations of softphones are well known to those skilled in the art and are, therefore, not elaborated further herein.
The communication device 108 may be controlled by or associated with a single user or may be adapted for use by many users (e.g., an enterprise communication device that allows any enterprise user to utilize the communication device upon presentation of a valid user name and password). In general the communication device 108 may be adapted to support video, audio, text, and/or data communications with other communication devices 108. The type of medium used by the communication device 108 to communicate with other communication devices 108 may depend upon the communication applications available on the communication device 108.
One or more of the communication devices 108 may comprise various components that enable it to transmit and receive packets containing voice, video, text, and/or data communications across the communication network 104. A communication device 108 may, therefore, include a memory 116 and a processor 128. As noted above, the memory 116 may include a number of applications or executable instructions that are readable and executable by the processor 128. For instance, the memory 116 may include a plurality of communication applications 120a-N and a packet analyzer 124.
The communication applications 120a-N may be specifically used by the communication device 108 for communicating via a particular medium or possibly via a different standard in the same medium. As one example, the first application 120a may correspond to a voice-based application, the second application 120b may correspond to a text-based application, and the Nth application 120N may correspond to a video-based application.
The packet analyzer 124 is provided to analyze packets received at the communication device and determine, based on the results of the analysis, whether one or more of the applications 120a-N should be activated and/or de-activated. The packet analyzer 124 is generally operable to analyze the contents of the header portion of packets received during a communication session. In some embodiments, the communication session has already been established and the packets received during the communication session are generally assumed to be carrying the data according to a pre-negotiated format. However, conditions may change such that during an established communication session one communication device 108 begins utilizing another communication medium as a part of the communication session, perhaps unbeknown to the other communication device 108. This newly utilized medium may cause packets of a different format to be transmitted to the other communication device 108 in a different and previously non-negotiated format. The packet analyzer 124 is capable of identifying such packets by the contents of their header and not necessarily by inspecting the data contents of the packets themselves (i.e., via a non-deep-packet inspection). Once the packet analyzer 124 identifies such a packet, the packet analyzer 124 is capable of invoking the appropriate application 120 to supplement the communication session.
In addition, the communication device 108 may comprise user interface 132 that is adapted to facilitate user control of the communication device 108 and a network interface 136 that is adapted to connect the communication device 108 to the communication network 104. The network interface 136 may comprise a communication modem, a communication port, or any other type of device or driver adapted to condition packets for transmission across the communication network 104 to a destination communication device 108 as well as condition received packets for processing by the processor 128. Examples of network interfaces 136 include, without limitation, a network interface card, a modem, a wired telephony port, a serial or parallel data port, radio frequency broadcast transceiver, a USB port, or other wired or wireless communication network interfaces.
The user interface 132 may comprise any type of known user input and/or user output technologies. For example, the user interface 132 may comprise a GUI to facilitate visual communication control of a voice communication session as well as facilitate text and video-based communication sessions. Additionally, the user interface 132 may comprise an audio interface (e.g., speaker and microphone) which allows the user to hear voice communications and project voice communications to the other communication session participants. In some embodiments the user input and user output portions of the user interface 132 may be separate and distinct. In other embodiments, the user input and user output portions of the user interface 132 may be combined, such as in a touch-screen interface.
Each application 120a-N may also have its own dedicated interface window or control screen that allows a user of the communication device 108 to control the application 120 and further control the communication session, or at least the medium controlled by the application 120. Thus, if multiple media are being used during a single communication session, multiple windows may be opened and displayed on the user interface 132. In accordance with at least some embodiments of the present invention, when an application is invoked during an established communication session, the interface window for that application may also be automatically displayed via the user interface 132.
Referring now to
With reference now to
When the packet analyzer 124 detects such a newly formatted packet, possibly by analyzing the header of the packet and identifying that a new packet format is being used, the packet analyzer 124 may automatically identify the second medium and perform one of following two functions: (1) automatically invoking the application which facilitates communications via the second medium or (2) querying the user of the communication device 108 if they want to communicate via the second medium.
If the user affirmatively responds to the query or in the event that the packet analyzer 124 automatically invokes the appropriate application, then a new application interface window 212 is presented via the user interface 132, such as is depicted in
Referring now to
The method begins when a communication initialization message is received at the communication device 108 (step 304). The communication initialization message may include a call setup signal, an H.323 call setup message, a SIP INVITE message, or any other type of message or collection of messages used to initiate a communication session.
Thereafter, or possibly included in the communication initialization message or exchange of communication initialization messages, the communication device 108 negotiates parameters for the communication session (step 308). During this negotiation step the communication device may determine the communication capabilities of the far-end device as well as define which medium or media are to be used initially as a part of the communication session. In some embodiments, the communication devices are capable of communicating via first, second, third, and fourth media (e.g., voice, video, text, and data) but may agree to only communicate initially via one such medium. Still, the devices may share their communication capabilities to facilitate a smooth and efficient session transition to other media. For example, in some embodiments codecs for all media may be pre-negotiated even though only a single medium is being used initially. The pre-negotiation is not a requirement, however.
After the initial communication session parameters have been negotiated, the method continues with the establishment of the communication session via the first medium (step 312). In this particular example, the first medium may correspond to a voice medium. To facilitate communications via the first medium, the communication device 108 may invoke a first corresponding application which allows the user of the communication device to control the voice call.
During the established communication session the far-end communication device may begin utilizing a second communication medium. This is typically initiated by an action of a user of the far-end communication device (e.g., opening a video channel, sending a text message, sending an email, or the like). The user of the other communication device may not be aware of the far-end user's actions and may not have applications open for every possible medium that could be used during the communication session. Rather, as a part of the communication session, packets are received at the communication device 108 from the far-end device (step 316). Each of these packets may be analyzed by the packet analyzer 124 to determine if a new medium is being used (step 320). In particular, the packet analyzer 124 may analyze the header portion of the packets to determine if the packet is identifying itself as carrying data for a medium other than the first medium. Analysis of the header portion of the packet allows the packet analyzer 124 to quickly determine if a new medium is being used during the communication session. This results in the ability to support real-time or near real-time communications in a manner which minimizes the delay between detecting a new medium and invoking a new application to facilitate user communications via the new medium. This is particularly useful for far-end TTY users to ensure that the far-end user does not get the sense that they are being ignored or that the call has been dropped. It is also useful in emergency situations or other types of time-sensitive situations.
If the packet analyzer 124 determines that the received packet is only carrying data for the first medium, then the method proceeds to step 324 where it is determined if the communication session has been terminated (e.g., via detection of a communication-ending message such as a SIP BYE message, an H.323 termination message, or detection of an on-hook state)(step 324). If this query is answered negatively, then the method returns back to step 316. If this query is answered affirmatively, then the communication session is terminated (step 328). As an optional step, the application(s) which were previously opened to facilitate the communication session may be automatically or manually closed (step 332).
Referring back to the inquiry of step 320, in the event that the packet analyzer 124 detects a packet formatted to carry data for a medium other than the first medium, then the method continues with the packet analyzer 124 identifying the new medium and further identifying the application 120 which is used to facilitate communications via the new medium (step 336).
Once the packet analyzer 124 identifies the new medium and corresponding application 120, the packet analyzer 124 determines whether a new application interface window should be opened to facilitate communications via the new medium (step 340). If the packet analyzer 124 has been pre-programmed to automatically open a new application interface window upon detecting a new medium, then the method may continue invoking the application and opening its corresponding interface window (step 344). Similarly, if the packet analyzer 124 queries the user of the communication device whether they want to allow the new application interface window to be opened and the user responds affirmatively, then the new application can be invoked and the corresponding interface window may be opened. This query may also be answered affirmatively if the appropriate application is already opened and/or the corresponding application interface window is opened.
Thereafter, the communication session is allowed to continue with the new media (step 348). As can be appreciated by one skilled in the art the new media may either replace the first media or supplement the first media. In the situation where the new media supplements the first media, multiple application interface windows may be simultaneously opened on the user interface 132 or a single application interface window capable of facilitating the multi-media communication may be utilized. Thereafter, or in the event that it was decided at step 340 not to utilize the new medium, the method continues to step 324 to determine if the communication session has been terminated.
In additional embodiments of the present invention, a mega-packet that has an audio packet and a video packet bundled within a single mega-packet can be used as a way to ensure that the video and corresponding audio arrive together, are buffered together, and are presented by the receiving device together. In accordance with at least some embodiments of the present invention, if a packet is received as self-identifying the use of RFC-4351, RFC-2198 or some other packet format having multiple media types, then multiple applications may be simultaneously invoked for various different media types corresponding to the media types contained within the mega-packet.
While the above-described flowchart has been discussed in relation to a particular sequence of events, it should be appreciated that changes to this sequence can occur without materially effecting the operation of the invention. Additionally, the exact sequence of events need not occur as set forth in the exemplary embodiments. The exemplary techniques illustrated herein are not limited to the specifically illustrated embodiments but can also be utilized with the other exemplary embodiments and each described feature is individually and separately claimable.
The systems, methods and protocols of this invention can be implemented on a special purpose computer in addition to or in place of the described communication equipment, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device such as PLD, PLA, FPGA, PAL, a communications device, such as a server, personal computer, any comparable means, or the like. In general, any device capable of implementing a state machine that is in turn capable of implementing the methodology illustrated herein can be used to implement the various communication methods, protocols and techniques according to this invention.
Furthermore, the disclosed methods may be readily implemented in software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this invention is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized. The analysis systems, methods and protocols illustrated herein can be readily implemented in hardware and/or software using any known or later developed systems or structures, devices and/or software by those of ordinary skill in the applicable art from the functional description provided herein and with a general basic knowledge of the communication and computer arts.
Moreover, the disclosed methods may be readily implemented in software that can be stored on a storage medium, executed on a programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this invention can be implemented as program embedded on personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated communication system or system component, or the like. The system can also be implemented by physically incorporating the system and/or method into software and/or hardware system, such as the hardware and software systems of a communications device or system.
It is therefore apparent that there has been provided, in accordance with the present invention, systems, apparatuses and methods for managing communication applications. While this invention has been described in conjunction with a number of embodiments, it is evident that many alternatives, modifications and variations would be or are apparent to those of ordinary skill in the applicable arts. Accordingly, it is intended to embrace all such alternatives, modifications, equivalents and variations that are within the spirit and scope of this invention.
Number | Name | Date | Kind |
---|---|---|---|
4163124 | Jolissaint | Jul 1979 | A |
4510351 | Costello et al. | Apr 1985 | A |
4567323 | Lottes et al. | Jan 1986 | A |
4737983 | Frauenthal et al. | Apr 1988 | A |
4754335 | Izawa et al. | Jun 1988 | A |
4797911 | Szlam et al. | Jan 1989 | A |
4894857 | Szlam et al. | Jan 1990 | A |
5001710 | Gawrys et al. | Mar 1991 | A |
5097528 | Gursahaney et al. | Mar 1992 | A |
5101425 | Darland | Mar 1992 | A |
5155761 | Hammond | Oct 1992 | A |
5164981 | Mitchell et al. | Nov 1992 | A |
5164983 | Brown et al. | Nov 1992 | A |
5167010 | Elm et al. | Nov 1992 | A |
5185780 | Leggett | Feb 1993 | A |
5206903 | Kohler et al. | Apr 1993 | A |
5210789 | Jeffus et al. | May 1993 | A |
5267302 | Kotani et al. | Nov 1993 | A |
5274700 | Gechter et al. | Dec 1993 | A |
5278898 | Cambray et al. | Jan 1994 | A |
5289368 | Jordan et al. | Feb 1994 | A |
5291550 | Levy et al. | Mar 1994 | A |
5299260 | Shaio | Mar 1994 | A |
5309513 | Rose | May 1994 | A |
5311422 | Loftin et al. | May 1994 | A |
5325292 | Crockett | Jun 1994 | A |
5335268 | Kelly, Jr. et al. | Aug 1994 | A |
5335269 | Steinlicht | Aug 1994 | A |
5390243 | Casselman et al. | Feb 1995 | A |
5436965 | Grossman et al. | Jul 1995 | A |
5444774 | Friedes | Aug 1995 | A |
5467391 | Donaghue, Jr. et al. | Nov 1995 | A |
5469503 | Butensky et al. | Nov 1995 | A |
5469504 | Blaha | Nov 1995 | A |
5473773 | Aman et al. | Dec 1995 | A |
5479497 | Kovarik | Dec 1995 | A |
5499291 | Kepley | Mar 1996 | A |
5500795 | Powers et al. | Mar 1996 | A |
5504894 | Ferguson et al. | Apr 1996 | A |
5506898 | Costantini et al. | Apr 1996 | A |
5513212 | Bremer | Apr 1996 | A |
5530744 | Charalambous et al. | Jun 1996 | A |
5537470 | Lee | Jul 1996 | A |
5537542 | Eilert et al. | Jul 1996 | A |
5544232 | Baker et al. | Aug 1996 | A |
5546452 | Andrews et al. | Aug 1996 | A |
5555299 | Maloney et al. | Sep 1996 | A |
5577169 | Prezioso | Nov 1996 | A |
5592378 | Cameron et al. | Jan 1997 | A |
5592542 | Honda et al. | Jan 1997 | A |
5594726 | Thompson et al. | Jan 1997 | A |
5603029 | Aman et al. | Feb 1997 | A |
5604892 | Nuttall et al. | Feb 1997 | A |
5606361 | Davidsohn et al. | Feb 1997 | A |
5611076 | Durflinger et al. | Mar 1997 | A |
5627884 | Williams et al. | May 1997 | A |
5642515 | Jones et al. | Jun 1997 | A |
5673205 | Brunson | Sep 1997 | A |
5684872 | Flockhart et al. | Nov 1997 | A |
5684964 | Powers et al. | Nov 1997 | A |
5689698 | Jones et al. | Nov 1997 | A |
5703943 | Otto | Dec 1997 | A |
5713014 | Durflinger et al. | Jan 1998 | A |
5721770 | Kohler | Feb 1998 | A |
5724092 | Davidsohn et al. | Mar 1998 | A |
5740238 | Flockhart et al. | Apr 1998 | A |
5742675 | Kilander et al. | Apr 1998 | A |
5742763 | Jones | Apr 1998 | A |
5748468 | Notenboom et al. | May 1998 | A |
5749079 | Yong et al. | May 1998 | A |
5751707 | Voit et al. | May 1998 | A |
5752027 | Familiar | May 1998 | A |
5754639 | Flockhart et al. | May 1998 | A |
5754776 | Hales et al. | May 1998 | A |
5754841 | Carino, Jr. | May 1998 | A |
5757904 | Anderson | May 1998 | A |
5781614 | Brunson | Jul 1998 | A |
5784452 | Carney | Jul 1998 | A |
5787410 | McMahon | Jul 1998 | A |
5790642 | Taylor et al. | Aug 1998 | A |
5790650 | Dunn et al. | Aug 1998 | A |
5790677 | Fox et al. | Aug 1998 | A |
5794250 | Carino, Jr. et al. | Aug 1998 | A |
5796393 | MacNaughton et al. | Aug 1998 | A |
5802282 | Hales et al. | Sep 1998 | A |
5802510 | Jones | Sep 1998 | A |
5818907 | Maloney et al. | Oct 1998 | A |
5819084 | Shapiro et al. | Oct 1998 | A |
5825869 | Brooks et al. | Oct 1998 | A |
5826039 | Jones | Oct 1998 | A |
5828747 | Fisher et al. | Oct 1998 | A |
5836011 | Hambrick et al. | Nov 1998 | A |
5838968 | Culbert | Nov 1998 | A |
5839117 | Cameron et al. | Nov 1998 | A |
5864874 | Shapiro | Jan 1999 | A |
5875437 | Atkins | Feb 1999 | A |
5880720 | Iwafune et al. | Mar 1999 | A |
5881238 | Aman et al. | Mar 1999 | A |
5884032 | Bateman et al. | Mar 1999 | A |
5889956 | Hauser et al. | Mar 1999 | A |
5897622 | Blinn et al. | Apr 1999 | A |
5903641 | Tonisson | May 1999 | A |
5903877 | Berkowitz et al. | May 1999 | A |
5905793 | Flockhart et al. | May 1999 | A |
5909669 | Havens | Jun 1999 | A |
5911134 | Castonguay et al. | Jun 1999 | A |
5914951 | Bentley et al. | Jun 1999 | A |
5915012 | Miloslavsky | Jun 1999 | A |
5923745 | Hurd | Jul 1999 | A |
5926538 | Deryugin et al. | Jul 1999 | A |
5930786 | Carino, Jr. et al. | Jul 1999 | A |
5937051 | Hurd et al. | Aug 1999 | A |
5937402 | Pandit | Aug 1999 | A |
5940496 | Gisby et al. | Aug 1999 | A |
5943416 | Gisby | Aug 1999 | A |
5948065 | Eilert et al. | Sep 1999 | A |
5960073 | Kikinis et al. | Sep 1999 | A |
5963635 | Szlam et al. | Oct 1999 | A |
5963911 | Walker et al. | Oct 1999 | A |
5970132 | Brady | Oct 1999 | A |
5974135 | Breneman et al. | Oct 1999 | A |
5974462 | Aman et al. | Oct 1999 | A |
5982873 | Flockhart et al. | Nov 1999 | A |
5987117 | McNeil et al. | Nov 1999 | A |
5991392 | Miloslavsky | Nov 1999 | A |
5996013 | Delp et al. | Nov 1999 | A |
5999963 | Bruno et al. | Dec 1999 | A |
6000832 | Franklin et al. | Dec 1999 | A |
6011844 | Uppaluru et al. | Jan 2000 | A |
6014437 | Acker et al. | Jan 2000 | A |
6031896 | Gardell et al. | Feb 2000 | A |
6038293 | McNerney et al. | Mar 2000 | A |
6038296 | Brunson et al. | Mar 2000 | A |
6044144 | Becker et al. | Mar 2000 | A |
6044205 | Reed et al. | Mar 2000 | A |
6044355 | Crockett et al. | Mar 2000 | A |
6049547 | Fisher et al. | Apr 2000 | A |
6049779 | Berkson | Apr 2000 | A |
6052723 | Ginn | Apr 2000 | A |
6055308 | Miloslavsky et al. | Apr 2000 | A |
6064730 | Ginsberg | May 2000 | A |
6064731 | Flockhart et al. | May 2000 | A |
6084954 | Harless et al. | Jul 2000 | A |
6088441 | Flockhart et al. | Jul 2000 | A |
6108670 | Weida et al. | Aug 2000 | A |
6115462 | Servi et al. | Sep 2000 | A |
6128304 | Gardell et al. | Oct 2000 | A |
6151571 | Pertrushin | Nov 2000 | A |
6154769 | Cherkasova et al. | Nov 2000 | A |
6163607 | Bogart et al. | Dec 2000 | A |
6173053 | Bogart et al. | Jan 2001 | B1 |
6175564 | Miloslavsky et al. | Jan 2001 | B1 |
6178441 | Elnozahy | Jan 2001 | B1 |
6185292 | Miloslavsky | Feb 2001 | B1 |
6185603 | Henderson et al. | Feb 2001 | B1 |
6192122 | Flockhart et al. | Feb 2001 | B1 |
6215865 | McCalmont | Apr 2001 | B1 |
6226377 | Donaghue, Jr. | May 2001 | B1 |
6229819 | Darland et al. | May 2001 | B1 |
6230183 | Yocom et al. | May 2001 | B1 |
6233333 | Dezonmo | May 2001 | B1 |
6240417 | Eastwick et al. | May 2001 | B1 |
6259969 | Tackett et al. | Jul 2001 | B1 |
6263359 | Fong et al. | Jul 2001 | B1 |
6272544 | Mullen | Aug 2001 | B1 |
6275806 | Pertrushin | Aug 2001 | B1 |
6275812 | Haq et al. | Aug 2001 | B1 |
6275991 | Erlin | Aug 2001 | B1 |
6278777 | Morley et al. | Aug 2001 | B1 |
6292550 | Burritt | Sep 2001 | B1 |
6295353 | Flockhart et al. | Sep 2001 | B1 |
6298062 | Gardell et al. | Oct 2001 | B1 |
6307931 | Vaudreuil | Oct 2001 | B1 |
6324282 | McIllwaine et al. | Nov 2001 | B1 |
6332081 | Do | Dec 2001 | B1 |
6339754 | Flanagan et al. | Jan 2002 | B1 |
6353810 | Petrushin | Mar 2002 | B1 |
6356632 | Foster et al. | Mar 2002 | B1 |
6360222 | Quinn | Mar 2002 | B1 |
6366666 | Bengtson et al. | Apr 2002 | B2 |
6366668 | Borst et al. | Apr 2002 | B1 |
6381253 | Benayoun et al. | Apr 2002 | B1 |
6389028 | Bondarenko et al. | May 2002 | B1 |
6389132 | Price et al. | May 2002 | B1 |
6389400 | Bushey et al. | May 2002 | B1 |
6408066 | Andruska et al. | Jun 2002 | B1 |
6408277 | Nelken | Jun 2002 | B1 |
6411682 | Fuller et al. | Jun 2002 | B1 |
6424709 | Doyle et al. | Jul 2002 | B1 |
6426950 | Mistry | Jul 2002 | B1 |
6427137 | Petrushin | Jul 2002 | B2 |
6430282 | Bannister et al. | Aug 2002 | B1 |
6434230 | Gabriel | Aug 2002 | B1 |
6446092 | Sutter | Sep 2002 | B1 |
6449356 | Dezonno | Sep 2002 | B1 |
6449358 | Anisimov et al. | Sep 2002 | B1 |
6449646 | Sikora et al. | Sep 2002 | B1 |
6453038 | McFarlane et al. | Sep 2002 | B1 |
6463148 | Brady | Oct 2002 | B1 |
6463346 | Flockhart et al. | Oct 2002 | B1 |
6463415 | St. John | Oct 2002 | B2 |
6463471 | Dreke et al. | Oct 2002 | B1 |
6480826 | Pertrushin | Nov 2002 | B2 |
6490350 | McDuff et al. | Dec 2002 | B2 |
6493558 | Bernhart et al. | Dec 2002 | B1 |
6535600 | Fisher et al. | Mar 2003 | B1 |
6535601 | Flockhart et al. | Mar 2003 | B1 |
6553114 | Fisher et al. | Apr 2003 | B1 |
6556974 | D'Alessandro | Apr 2003 | B1 |
6560330 | Gabriel | May 2003 | B2 |
6560649 | Mullen et al. | May 2003 | B1 |
6560707 | Curtis et al. | May 2003 | B2 |
6563920 | Flockhart et al. | May 2003 | B1 |
6563921 | Williams et al. | May 2003 | B1 |
6571285 | Groath et al. | May 2003 | B1 |
6574599 | Lim et al. | Jun 2003 | B1 |
6574605 | Sanders et al. | Jun 2003 | B1 |
6597685 | Miloslavsky et al. | Jul 2003 | B2 |
6603854 | Judkins et al. | Aug 2003 | B1 |
6604084 | Powers et al. | Aug 2003 | B1 |
6614903 | Flockhart et al. | Sep 2003 | B1 |
6650748 | Edwards et al. | Nov 2003 | B1 |
6662188 | Rasmussen et al. | Dec 2003 | B1 |
6668167 | McDowell et al. | Dec 2003 | B2 |
6675168 | Shapiro et al. | Jan 2004 | B2 |
6684192 | Honarvar et al. | Jan 2004 | B2 |
6697457 | Petrushin | Feb 2004 | B2 |
6700967 | Kleinoder et al. | Mar 2004 | B2 |
6704409 | Dilip et al. | Mar 2004 | B1 |
6707903 | Burok et al. | Mar 2004 | B2 |
6711253 | Prabhaker | Mar 2004 | B1 |
6724885 | Deutsch et al. | Apr 2004 | B1 |
6735299 | Krimstock et al. | May 2004 | B2 |
6735593 | Williams | May 2004 | B1 |
6738462 | Brunson | May 2004 | B1 |
6744877 | Edwards | Jun 2004 | B1 |
6754333 | Flockhart et al. | Jun 2004 | B1 |
6757362 | Cooper et al. | Jun 2004 | B1 |
6766013 | Flockhart et al. | Jul 2004 | B2 |
6766014 | Flockhart et al. | Jul 2004 | B2 |
6766326 | Cena | Jul 2004 | B1 |
6773827 | Higuchi | Aug 2004 | B2 |
6775377 | McIllwaine et al. | Aug 2004 | B2 |
6785666 | Nareddy et al. | Aug 2004 | B1 |
6798767 | Alexander et al. | Sep 2004 | B1 |
6822945 | Petrovykh | Nov 2004 | B2 |
6829348 | Schroeder et al. | Dec 2004 | B1 |
6839735 | Wong et al. | Jan 2005 | B2 |
6842503 | Wildfeuer | Jan 2005 | B1 |
6847973 | Griffin et al. | Jan 2005 | B2 |
6898190 | Shtivelman et al. | May 2005 | B2 |
6914964 | Levine | Jul 2005 | B1 |
6915305 | Subramanian et al. | Jul 2005 | B2 |
6947543 | Alvarado et al. | Sep 2005 | B2 |
6947988 | Saleh | Sep 2005 | B1 |
6963826 | Hanaman et al. | Nov 2005 | B2 |
6968052 | Wullert, II | Nov 2005 | B2 |
6981061 | Sakakura | Dec 2005 | B1 |
6985901 | Sachse et al. | Jan 2006 | B1 |
6988126 | Wilcock et al. | Jan 2006 | B2 |
7010542 | Trappen et al. | Mar 2006 | B2 |
7020254 | Phillips | Mar 2006 | B2 |
7035808 | Ford | Apr 2006 | B1 |
7035927 | Flockhart et al. | Apr 2006 | B2 |
7039176 | Borodow et al. | May 2006 | B2 |
7054434 | Rodenbusch et al. | May 2006 | B2 |
7062031 | Becerra et al. | Jun 2006 | B2 |
7076051 | Brown et al. | Jul 2006 | B2 |
7100200 | Pope et al. | Aug 2006 | B2 |
7103562 | Kosiba et al. | Sep 2006 | B2 |
7110525 | Heller et al. | Sep 2006 | B1 |
7117193 | Basko et al. | Oct 2006 | B1 |
7127058 | O'Connor et al. | Oct 2006 | B2 |
7136873 | Smith et al. | Nov 2006 | B2 |
7149733 | Lin et al. | Dec 2006 | B2 |
7151820 | Vejlgaard | Dec 2006 | B2 |
7155612 | Licis | Dec 2006 | B2 |
7158628 | McConnell et al. | Jan 2007 | B2 |
7162469 | Anonsen et al. | Jan 2007 | B2 |
7165075 | Harter et al. | Jan 2007 | B2 |
7170976 | Keagy | Jan 2007 | B1 |
7170992 | Knott et al. | Jan 2007 | B2 |
7174004 | Michaelis | Feb 2007 | B1 |
7177401 | Mundra et al. | Feb 2007 | B2 |
7200219 | Edwards et al. | Apr 2007 | B1 |
7203655 | Herbert et al. | Apr 2007 | B2 |
7212622 | Delaney et al. | May 2007 | B2 |
7212625 | McKenna et al. | May 2007 | B1 |
7215744 | Scherer | May 2007 | B2 |
7218626 | Shaheen et al. | May 2007 | B2 |
7222075 | Petrushin | May 2007 | B2 |
7246371 | Diacakis et al. | Jul 2007 | B2 |
7248565 | Fourie | Jul 2007 | B1 |
7257513 | Lilly | Aug 2007 | B2 |
7257597 | Pryce et al. | Aug 2007 | B1 |
7266508 | Owen et al. | Sep 2007 | B1 |
7283805 | Agrawal | Oct 2007 | B2 |
7295669 | Denton et al. | Nov 2007 | B1 |
7299259 | Petrovykh | Nov 2007 | B2 |
7324954 | Calderaro et al. | Jan 2008 | B2 |
7336779 | Boyer et al. | Feb 2008 | B2 |
7340408 | Drew et al. | Mar 2008 | B1 |
7373341 | Polo-Malouvier | May 2008 | B2 |
7376127 | Hepworth et al. | May 2008 | B2 |
7386100 | Michaelis | Jun 2008 | B2 |
7392402 | Suzuki | Jun 2008 | B2 |
7409423 | Horvitz et al. | Aug 2008 | B2 |
7415417 | Boyer et al. | Aug 2008 | B2 |
7418093 | Knott et al. | Aug 2008 | B2 |
7468983 | Requena et al. | Dec 2008 | B2 |
7499844 | Whitman, Jr. | Mar 2009 | B2 |
7500241 | Flockhart et al. | Mar 2009 | B1 |
7512984 | Lee | Mar 2009 | B2 |
7526440 | Walker et al. | Apr 2009 | B2 |
7532628 | Lepore et al. | May 2009 | B2 |
7545761 | Kalbag | Jun 2009 | B1 |
7545925 | Williams | Jun 2009 | B2 |
7567653 | Michaelis | Jul 2009 | B1 |
7711104 | Flockhart et al. | May 2010 | B1 |
7734032 | Kiefhaber | Jun 2010 | B1 |
7773525 | Fujino | Aug 2010 | B2 |
7779042 | Bland et al. | Aug 2010 | B1 |
7787609 | Flockhart et al. | Aug 2010 | B1 |
7809125 | Brunson et al. | Oct 2010 | B2 |
7822587 | Krimstock et al. | Oct 2010 | B1 |
7885209 | Michaelis et al. | Feb 2011 | B1 |
7936867 | Hill et al. | May 2011 | B1 |
7944870 | Varland | May 2011 | B2 |
7978827 | Becker et al. | Jul 2011 | B1 |
8000989 | Kiefhaber | Aug 2011 | B1 |
8059656 | Telikepalli et al. | Nov 2011 | B1 |
8094664 | Kuure et al. | Jan 2012 | B2 |
8264965 | Dolganow | Sep 2012 | B2 |
20010011228 | Shenkman | Aug 2001 | A1 |
20010034628 | Eder | Oct 2001 | A1 |
20020019829 | Shapiro | Feb 2002 | A1 |
20020021307 | Glenn et al. | Feb 2002 | A1 |
20020035605 | McDowell et al. | Mar 2002 | A1 |
20020038422 | Suwamoto et al. | Mar 2002 | A1 |
20020065894 | Dalal et al. | May 2002 | A1 |
20020076010 | Sahai | Jun 2002 | A1 |
20020085701 | Parsons et al. | Jul 2002 | A1 |
20020087630 | Wu | Jul 2002 | A1 |
20020112186 | Ford et al. | Aug 2002 | A1 |
20020116336 | Diacakis et al. | Aug 2002 | A1 |
20020116461 | Diacakis et al. | Aug 2002 | A1 |
20020123923 | Manganaris et al. | Sep 2002 | A1 |
20020147730 | Kohno | Oct 2002 | A1 |
20020194096 | Falcone et al. | Dec 2002 | A1 |
20030004704 | Baron | Jan 2003 | A1 |
20030028621 | Furlong et al. | Feb 2003 | A1 |
20030073440 | Mukherjee et al. | Apr 2003 | A1 |
20030108186 | Brown et al. | Jun 2003 | A1 |
20030142200 | Canova et al. | Jul 2003 | A1 |
20030144900 | Whitmer | Jul 2003 | A1 |
20030144959 | Makita | Jul 2003 | A1 |
20030231757 | Harkreader et al. | Dec 2003 | A1 |
20040008828 | Coles et al. | Jan 2004 | A1 |
20040015496 | Anonsen | Jan 2004 | A1 |
20040015506 | Anonsen et al. | Jan 2004 | A1 |
20040052243 | Bostrom et al. | Mar 2004 | A1 |
20040054743 | McPartlan et al. | Mar 2004 | A1 |
20040057569 | Busey et al. | Mar 2004 | A1 |
20040095938 | Ryu | May 2004 | A1 |
20040102940 | Lendermann et al. | May 2004 | A1 |
20040103324 | Band | May 2004 | A1 |
20040138944 | Whitacre et al. | Jul 2004 | A1 |
20040162998 | Tuomi et al. | Aug 2004 | A1 |
20040193646 | Cuckson et al. | Sep 2004 | A1 |
20040196961 | Freundlich et al. | Oct 2004 | A1 |
20040202308 | Baggenstoss et al. | Oct 2004 | A1 |
20040202309 | Baggenstoss et al. | Oct 2004 | A1 |
20040203878 | Thomson | Oct 2004 | A1 |
20040210475 | Starnes et al. | Oct 2004 | A1 |
20040240659 | Gagle et al. | Dec 2004 | A1 |
20040249650 | Freedman et al. | Dec 2004 | A1 |
20040260706 | Anonsen et al. | Dec 2004 | A1 |
20050021529 | Hodson et al. | Jan 2005 | A1 |
20050044375 | Paatero et al. | Feb 2005 | A1 |
20050049911 | Engelking et al. | Mar 2005 | A1 |
20050065837 | Kosiba et al. | Mar 2005 | A1 |
20050071211 | Flockhart et al. | Mar 2005 | A1 |
20050071212 | Flockhart et al. | Mar 2005 | A1 |
20050071241 | Flockhart et al. | Mar 2005 | A1 |
20050071844 | Flockhart et al. | Mar 2005 | A1 |
20050091071 | Lee | Apr 2005 | A1 |
20050125432 | Lin et al. | Jun 2005 | A1 |
20050125458 | Sutherland et al. | Jun 2005 | A1 |
20050138064 | Trappen et al. | Jun 2005 | A1 |
20050154708 | Sun | Jul 2005 | A1 |
20050182784 | Trappen et al. | Aug 2005 | A1 |
20050228707 | Hendrickson | Oct 2005 | A1 |
20050261035 | Groskreutz et al. | Nov 2005 | A1 |
20050283393 | White et al. | Dec 2005 | A1 |
20050289446 | Moncsko et al. | Dec 2005 | A1 |
20060004686 | Molnar et al. | Jan 2006 | A1 |
20060007916 | Jones et al. | Jan 2006 | A1 |
20060015388 | Flockhart et al. | Jan 2006 | A1 |
20060026049 | Joseph et al. | Feb 2006 | A1 |
20060056598 | Brandt et al. | Mar 2006 | A1 |
20060058049 | McLaughlin et al. | Mar 2006 | A1 |
20060100973 | McMaster et al. | May 2006 | A1 |
20060135058 | Karabinis | Jun 2006 | A1 |
20060167667 | Maturana et al. | Jul 2006 | A1 |
20060178994 | Stolfo et al. | Aug 2006 | A1 |
20060187900 | Akbar | Aug 2006 | A1 |
20060242160 | Kanchwalla et al. | Oct 2006 | A1 |
20060256957 | Fain et al. | Nov 2006 | A1 |
20060271418 | Hackbarth et al. | Nov 2006 | A1 |
20060285648 | Wahl et al. | Dec 2006 | A1 |
20070038632 | Engstrom | Feb 2007 | A1 |
20070064912 | Kagan et al. | Mar 2007 | A1 |
20070083572 | Bland et al. | Apr 2007 | A1 |
20070112953 | Barnett | May 2007 | A1 |
20070127643 | Keagy | Jun 2007 | A1 |
20070156375 | Meier et al. | Jul 2007 | A1 |
20070192414 | Chen et al. | Aug 2007 | A1 |
20070201311 | Olson | Aug 2007 | A1 |
20070201674 | Annadata et al. | Aug 2007 | A1 |
20070230681 | Boyer et al. | Oct 2007 | A1 |
20080056165 | Petrovykh | Mar 2008 | A1 |
20090193050 | Olson | Jul 2009 | A1 |
20090228474 | Chiu et al. | Sep 2009 | A1 |
20090239519 | Fujino | Sep 2009 | A1 |
20100235371 | Bland et al. | Sep 2010 | A1 |
Number | Date | Country |
---|---|---|
2143198 | Jan 1995 | CA |
2174762 | Jun 1995 | CA |
0501189 | Sep 1992 | EP |
0576205 | Dec 1993 | EP |
0740450 | Oct 1996 | EP |
0770967 | May 1997 | EP |
0772335 | May 1997 | EP |
0829996 | Mar 1998 | EP |
0855826 | Jul 1998 | EP |
0863651 | Sep 1998 | EP |
0866407 | Sep 1998 | EP |
0899673 | Mar 1999 | EP |
0998108 | May 2000 | EP |
1035718 | Sep 2000 | EP |
1091307 | Apr 2001 | EP |
1150236 | Oct 2001 | EP |
1761078 | Mar 2007 | EP |
1924094 | May 2008 | EP |
2071817 | Jun 2009 | EP |
2273418 | Jun 1994 | GB |
2290192 | Dec 1995 | GB |
07-007573 | Jan 1995 | JP |
2000-224333 | Aug 2000 | JP |
2001-053843 | Feb 2001 | JP |
2002-032977 | Jan 2002 | JP |
2002-274054 | Sep 2002 | JP |
2002-304313 | Oct 2002 | JP |
2006-054864 | Feb 2006 | JP |
WO 9607141 | Mar 1996 | WO |
WO 9728635 | Aug 1997 | WO |
WO 9856207 | Dec 1998 | WO |
WO 9917522 | Apr 1999 | WO |
WO 0026804 | May 2000 | WO |
WO 0026816 | May 2000 | WO |
WO 0119096 | Mar 2001 | WO |
WO 0180094 | Oct 2001 | WO |
WO 02099640 | Dec 2002 | WO |
WO 03015425 | Feb 2003 | WO |
WO 03032601 | Apr 2003 | WO |
WO 2007062418 | May 2007 | WO |
Entry |
---|
Michaelis, U.S. Appl. No. 12/569,581, Entitled “Automatic Configuration of Soft Phones That Are Usable in Conjunction With Special-Purpose Endpoints”, filed Sep. 29, 2009. |
Burritt et al., U.S. Appl. No. 11/956,779, Entitled “Arrangement for Dynamically Diverting Communications Having Characteristics Incompatible With a Communication Device to Another Device”, filed Dec. 14, 2007. |
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS) service continuity enhancements; Service, policy and interaction; Stage 2 (Release 9),” 3GPP Partnership Project, Standard TR 23.838 V1.1.0, Apr. 2009, 54 pages. |
Extended European Search Report for European Patent Application No. 10181556.1, dated May 9, 2011. |
US 6,537,685, 3/2003, Fisher et al. (withdrawn). |
U.S. Appl. No. 10/815,566, filed Mar. 31, 2004, Kiefhaber. |
U.S. Appl. No. 11/517,646, filed Sep. 7, 2006, Hackbarth et al. |
U.S. Appl. No. 11/536,456, filed Sep. 28, 2006, Hackbarth et al. |
U.S. Appl. No. 11/861,857, filed Sep. 26, 2007, Tendick et al. |
U.S. Appl. No. 12/242,916, filed Oct. 1, 2008, Kiefhaber et al. |
Creating and Using Data Warehouse Dimension Tables (Microsoft) copyright 2005, http://msdn.microsoft.com/library/en-us/createdw/createdw—10kz.asp?frame=true, 3 pages. |
Creating and Using Data Warehouse-Using Dimensional Modeling (Microsoft) downloaded May 18, 2005 http://msdn.microsoft.com/library/en-us/createdw/createdw—39z.asp?frame=true 1 page. |
Definity Communications System Generic 3 Call Vectoring/Expert Agent Selection (EAS) Guide, AT&T Publication No. 555-230-520, Sep. 1995, Issue 4, 458 pages. |
“Intelligent CallRouter™,” GEOTEL Communications Corporation Web site printout, 1998, 6 pages. |
Microsoft Office Animated Help Tool, date unknown, 1 page. |
Schulzrinne et al., “RFC 2833: RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals,” Network Working Group, May 2000, available at http://www.faqs.org/rfcs/rfc2833.html, 23 pages. |
Hellstrom et al., RFC-4103 Protocol, entitled “RTP Payload for Text Conversation,” Network Working Group, http://www.rfc-editor.org/rfc/rfc4103.txt, Jun. 2005, 18 pages. |
“Avaya one-X Agent Release 1.0 Release Notes,” Avaya Inc., Jun. 2009, 7 pages. |
Kimball, “The Soul of the Data Warehouse, Part Three: Handling Time,” Intelligent Enterprise Magazine, Data Warehouse Designer, Apr. 22, 2003, 3 pages. |
“Learn the structure of an Access database,” available at http://office.microsoft.com/en-us/access/HA012139541033.aspx, site updated Nov. 13, 2007, pp. 1-4. |
Dillon, “Renaming fields and tracing dependencies,” available at http://allenbrowne.com/ser-41.html, Nov. 2003, updated May 2006, 1 page. |
“Access for 9-1-1 and Telephone Emergency Services,” Americans with Disabilities Act, U.S. Department of Justice, Civil Rights Division, Jul. 15, 1998, available at http://www.usdoj.gov/crt/ada/911ta.htm, 11 pages. |
“Analysis and Reporting,” Aspect Communications, May 19, 2005, http://aspect.com/products/analysis/index.cfm, 1 page. |
“Applications, NPRI's Predictive Dialing Package,” Computer Technology, Fall 1993, p. 86. |
“Avaya and Blue Pumpkin—Providing Workforce Optimization Solutions,” Avaya Inc., May 2004, 3 pages. |
“Avaya and Texas Digital Systems—Providing Real-time Access to Call Statistics,” Avaya Inc., May 2004, 3 pages. |
“Avaya Basic Call Management System Reporting Desktop,” Avaya Inc., Jan. 2002, 4 pages. |
“Avaya Call Management System,” Avaya Inc., Oct. 2003, 3 pages. |
“Avaya IQ—Building Upon the Strengths of CMS,” Avaya White Paper, Feb. 2007, 11 pages. |
“Avaya IQ: Introducing Reporting and Analytics as You Designed It,” Avaya Inc., Feb. 2007, 4 pages. |
“Avaya Multi Channel Product Authorization (PA),” Avaya Inc., Version 5.0, Nov. 2003, 6 pages. |
“Basic Call Management System Reporting Desktop—Product Description,” Avaya Inc., http://www.avaya.com/gcm/master-usa/en-us/products/offers/bcmrs—desktop.htm, printed May 19, 2005, copyright 2005, 2 pages. |
“Basic Call Management System Reporting Desktop—Product Features,” Avaya Inc., http://www.avaya.com/gcm/master-usa/en-us/products/offers/bcmrs—desktop.htm, printed May 19, 2005, copyright 2005, 2 pages. |
“Basic Call Management System Reporting Desktop—Product Overview,” Avaya Inc., http://www.avaya.com/gcm/master-usa/en-s/products/offers/bcmrs—desktop.htm, printed May 19, 2005, copyright 2005, 2 pages. |
“Basic Call Management System Reporting Desktop—Product Technical,” Avaya Inc., http://www.avaya.com/gcm/master-usa/en-us/products/offers/bcmrs—desktop.htm, printed May 19, 2005, copyright 2005, 2 pages. |
“Better Implementation of IP in Large Networks,” Avaya Inc., Apr. 2002, 14 pages. |
“Business Advocate Options,” Avaya, Inc., http://www.avaya.com, printed Feb. 15, 2003, 4 pages. |
“Business Advocate Product Summary,” Avaya, Inc., http://www.avaya.com, printed Feb. 15, 2003, 3 pages. |
“Call Center Recording for Call Center Quality Assurance,” Voice Print International, Inc., available at http://www.voiceprintonline.com/call-center-recording.asp?ad—src=google&srch—trm=call—center—monitoring, date unknown, printed May 10, 2007, 2 pages. |
“Call Center Software You Can't Outgrow,” Telemarketing®, Jul. 1993, p. 105. |
“Call Management System—Product Description,” Avaya Inc., http://www.avaya.com/gcm/master-usa/en-us/products/offers/call—management—system.htm, printed May 19, 2005, copyright 2005, 2 pages. |
Call Management System—Product Features, Avaya Inc., http://www.avaya.com/gcm/master-usa/en-us/products/offers/call—management—system.htm, printed May 19, 2005, copyright 2005, 3 pages. |
“Call Management System—Product Overview,” Avaya Inc., http://www.avaya.com/gcm/master-usa/en-us/products/offers/call—management—system.htm, May 19, 2005, copyright 2005, 2 pages. |
“Call Management System—Product Technical,” Avaya Inc., http://www.avaya.com/gcm/master-usa/en-us/products/offers/call—management—system.htm, printed May 19, 2005, copyright 2005, 2 pages. |
“CentreVu Advocate, Release 9, User Guide,” Avaya, Inc., Dec. 2000, Issue 1, 293 pages. |
“Centrex Internet Enabled Call Centers,” Nortel, http://www.products.nortel.com/go/product—assoc.jsp?segld=0&parID=0&catID=-9191&rend—id . . . , copyright 1999-2005, printed May 19, 2005, 1 page. |
“Chapter 9: Domain Name Services,” available at http://www.pism.com/chapt09/chapt09.html, downloaded Mar. 31, 2003, 21 pages. |
“Contact Center and Enterprise Products,” NICE Systems, Insight from Interactions, http://www.nice.com/products/multimedia/contact—centers.php, printed May 19, 2005, 3 pages. |
“CS 345: Topics in Data Warehousing,” Oct. 5, 2004, 36 pages. |
“Dimensional database,” Wikipedia, downloaded Aug. 30, 2007, 3 pages. |
“Driving Model Agent Behaviors With Avaya IQ,” Avaya White Paper, Apr. 2007, 12 pages. |
“eGain's Commerce 2000 Platform Sets New Standard for eCommerce Customer Communications,” Business Wire, Nov. 15, 1999, 3 pages. |
“Frequently Asked Questions—Domain Name Service FAQs,” Bellsouth Corp., available at https://registration.bellsouth.net/NASApp/DNSWebUI/FAQ.jsp, printed Mar. 31, 2003, copyright 2002, 4 pages. |
“Fundamentals of Data Warehousing—Unit 3—Dimensional Modeling, Fundamentals of Data Warehousing,” Evolve Computer Solutions, copyright 2005, 55 pages. |
“Internet Protocol Addressing,” available at http://samspade.org/d/ipdns.html, downloaded Mar. 31, 2003, 9 pages. |
“KANA—Contact Center Support,” available at http://www.kana.com/solutions.php?tid=46, copyright 2006, printed May 10, 2007, 3 pages. |
“Monitoring: OneSight Call Statistics Monitors,” available at http://www.empirix.com/default.asp?action=article&ID=301, copyright 2007, printed May 10, 2007, 2 pages. |
“Multi-Dimensional Modeling with BW ASAP for BW Accelerator Business Information Warehouse,” SAP AG and SAP America, copyright 2000, 71 pages. |
“NICE Analyzer™: Overwhelmed by the Amount of Data at your Contact Center?” NICE Systems, Insight from Interactions, http://www.nice.com/products/multimedia/analyzer.php, printed May 19, 2005, 2 pages. |
“Oracle and Siebel,” Oracle, available at http://www.oracle.com/siebel/index.html, printed May 10, 2007, 2 pages. |
“Performance Optimization,” Aspect Communications, May 19, 2005, http://aspect.com/products/wfm/performanceopt.cfm?section=performanceopt, 1page. |
“Product Features,” Guide to Call Center Automation, Brock Control Systems, Inc., Activity Managers Series™, Section 5—Company B120, Jun. 1992, p. 59. |
“Product Features,” Guide to Call Center Automation, CRC Information Systems, Inc., Tel-ATHENA, Section 5—Company C520, Jun. 1992, p. 95. |
“Services for Computer Supported Telecommunications Applications (CSTA) Phase III,” Standard ECMA-269, 5th Edition, Dec. 2002, ECMA International Standardizing Information and Communication Systems, pp. 1-666 (Parts 1-8). |
“The Advantages of Load Balancing in the Multi-Call Center Enterprise,” Avaya Inc. White Paper, Feb. 2002, 14 pages. |
“VAST™, Voicelink Application Software for Teleservicing®,” System Manager User's Guide, Digital Systems, 1994, pp. ii, vii-ix, 1-2, 2-41 through 2-77. |
“Voice Over IP Via Virtual Private Networks: An Overview,” Avaya Inc. White Paper, Feb. 2001, 9 pages. |
“When Talk Isn't Cheap,” Sm@rt Reseller, Apr. 3, 2000, vol. 3(13), p. 50. |
Ahmed, Sarah, “A Scalable Byzantine Fault Tolerant Secure Domain Name System,” thesis submitted to Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, Jan. 22, 2001, 101 pages. |
Arslan et al., “Language Accent Classification in American English,” Robust Speech Processing Laboratory, Duke University Department of Electrical Engineering, Durham, NC, Technical Report RSPL-96-7, revised Jan. 29, 1996, pp. 1-16. |
Arslan, “Foreign Accent Classification in American English,” Thesis submitted to Department of Electrical and Computer Engineering, Duke University, 1996, pp. 1-200. |
Atkins et al, “Common Presence and Instant Messaging: Message Format,” Network Working Group, Jan. 9, 2003, available at http://www.ietf.org/internet-drafts/draft-ietf-impp-cpim-msgfmt-08.txt, 31 pages. |
Bentley, “Metadata: Everyone Talks About It, but What Is It?” Proceedings of the Twenty-Sixth Annual SAS Users Group International Conference: SAS Institute Inc., 2001, Paper 125-26, 5 pages. |
Berners-Lee et al., “RFC 2396: Uniform Resource Identifiers (URI); Generic Syntax,” Network Working Group, Aug. 1998, 38 pages. |
Blog from “Road warrior and telecommuter-Community for Avaya Users,” from http://www.avayausers.com/showthread.php?p=13430, earliest post date Nov. 21, 2006, printed on Sep. 15, 2009, 4 pages. |
Boussaid et al., “Integration and dimensional modeling approaches for complex data warehousing,” J. Global Optimization, vol. 37, No. 4, Apr. 2007, 2 pages. |
Cabibbo et al., “An Architecture for Data Warehousing Supporting Data Independence and Interoperability,” International Journal of Cooperative Information Systems, Nov. 2004, 41 pages. |
Cahoon, “Fast Development of a Data Warehouse Using MOF, CWM and Code Generation,” CubeModel, May 22, 2006, 32 pages. |
Chavez et al., “Avaya MultiVantage Software: Adapting Proven Call Processing for the Transition to Converged IP Networks,” Avaya, Inc., Aug. 2002, 20 pages. |
Cherry, “Anger Management,” IEEE Spectrum, Apr. 2005, p. 16. |
Coles, Scott, “A Guide for Ensuring Service Quality in IP Voice Networks,” Avaya, Inc., 2002, pp. 1-17. |
Crocker et al., “Common Presence and Instant Messaging (CPIM),” Network Working Group, Aug. 14, 2002, available at http://www.ietf.org/internet-drafts/draft-ietf-impp-cpim-03.txt, 33 pages. |
Cunningham, Lewis R., “My Personal Dictionary,” An Expert's Guide to Oracle Technology, posted Mar. 31, 2005, http://blogs.ittoolbox.com/oracle'guide/archives003684.asp, 4 pages. |
Curlingstone Publishing Glossary, http://www.curlingstone.com/7002/7002glossary.html, printed May 24, 2005, 11 pages. |
Dawson et al., “RFC 2426: Vcard MIME Directory Profile,” Network Working Group, Sep. 1998, available at http://www.ietf.org/rfc/rfc2426.txt?number=2426, 40 pages. |
Dawson, “NPRI's Powerguide, Software Overview,” Call Center Magazine, Jun. 1993, p. 85. |
Day et al., “RFC 2778: A Model for Presence and Instant Messaging,” Network Working Group, Feb. 2000, available at http://www.ietf.org/rfc/rfc2778.txt?number=2778, 16 pages. |
Day et al., “RFC 2779: Instant Messaging/Presence Protocol Requirements,” Network Working Group, Feb. 2000, available at http://www.ietf.org/rfc/rfc2779.txt?number=2779, 25 pages. |
Durr, “Still Leaving It to Fate?: Optimizing Workforce Management,” Customer Interaction Solutions, Nov. 2001, 5 pages. |
Fielding et al., “RFC 2068: Hypertext Transfer Protocol—HTTP/1.1,” Network Working Group, Jan. 1997, 152 pages. |
Foster et al., “Avaya Business Advocate and its Relationship to Multi-Site Load Balancing Applications,” Avaya, Inc., Mar. 2002, 14 pages. |
Google Docs “IP Softphone for Windows Mobile 5” printed on Sep. 15, 2009 from http://docs.google.com/gview?a=v&q=cache:92VrteFXqm8J:support.avaya.com/css/P8/documents/100021136+Avaya+telecom . . . , 1 page. |
Gulbrandsen et al., “A DNS RR for Specifying the Location of Services (DNS SRV),” Network Working Group, Feb. 2000, available at http://www.ietf.org/rfc/rfc2782.txt?number=2782, 12 pages. |
Hansen et al., “Foreign Accent Classification Using Source Generator Based Prosodic Features,” IEEE Proc. ICASSP, May 1995, Detroit, MI, vol. 1, pp. 836-839. |
Hellstrom et al., “RFC 2793: RTP Payload for Text Consersation,” Network Working Group, May 2000, available at http://www.faqs.org/rfcs/rfc2793.html, 8 pages. |
Holtman et al., “RFC 2296: HTTP Remote Variant Selection Algorithm—RVSA/1.0,” Network Working Group, Mar. 1998, available at http://www.ietf.org/rfc/rfc2296.txt?number=2296, 13 pages. |
Hotlman et al., “RFC 2295: Transparent Content Negotiation in HTTP,” Network Working Group, Mar. 1998, available at http://www.ietf.org/rfc/rfc2295.txt?number=2295, 55 pages. |
Karakasidis, A., “Queues for Active Data Warehousing,” in Proceedings on Information Quality in Informational Systems (IQIS'2005), Jun. 17, 2005, Baltimore, MA, pp. 28-39, ISBN: 1-59593-160-0. |
Kim et al., “Collaborative Multimedia Middleware Architecture and Advanced Internet Call Center,” Proceedings at the International Conference on Information Networking, Jan. 31, 2001, pp. 246-250. |
Kimball et al., The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleaning, Conforming, and Delivering Data, John Wiley & Sons, 2004, pp. 170-174. |
Kimball et al., The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling, 2nd Edition, John Wiley & Sons, 2002, pp. 240-241, 260-262, 292-293. |
Kimball, “An Engineer' s View: Its Worthwhile to Remind Ourselves Why We Build Data Warehouses the Way We Do,” Intelligent Enterprise Magazine, Data Warehouse Designer, Jul. 26, 2002, 3 pages. |
Kimball, “Design Constraints and Unavoidable Realities: No design Problem in school was this hard,” Intelligent Enterprise Magazine, Data Warehouse Designer, Sep. 3, 2002, 3 pages. |
Kimball, “Divide and Conquer: Build Your Data Warehouse One Piece at a Time,” Intelligent Enterprise Magazine, Data Warehouse Designer, Oct. 30, 2002, 3 pages. |
Kimball, “Fact Tables and Dimension,” Intelligent Enterprise Magazine, Data Warehouse Designer, Jan. 1, 2003, http://www.inteeigententerprise.com/030101/602warehouse1—1.jhtml, 3 pages. |
Kimball, “Surrogate Keys: Keep Control Over Record Identifiers by Generating New Keys for the Data Warehouse,” DBMS Online, Data Warehouse Architect, May 1998, 4 pages. |
Kimball, “TCO Starts with the End User: The conventional view of data warehouse total cost of ownership myopic and wrong,” Intelligent Enterprise Magazine, Data Warehouse Designer, May 13, 2003, http://www.intelligententerprise.com/030513/608warehouse1—1.jhtml?—requestid=598425, 3 pages. |
Kimball, “The Soul of the Data Warehouse, Part One: Drilling Down,” Intelligent Enterprise Magazine, Data Warehouse Designer, Mar. 20, 2003, 3 pages. |
Kimball, “The Soul of the Data Warehouse, Part Two: Drilling Across,” Intelligent Enterprise Magazine, Data Warehouse Designer, Apr. 5, 2003, 3 pages. |
Kimball, “Two Powerful Ideas, The Foundation for Modern Data Warehousing,” Intelligent Enterprise Magazine, Data Warehouse Designer, Sep. 17, 2002, 3 pages. |
Klyne, “RFC 2533: A Syntax for Describing Media Feature Sets,” Network Working Group, Mar. 1999, available at http://www.ietf.org/rfc/rfc2533.txt?number=2533, 35 pages. |
Klyne, “RFC 2703: Protocol-independent Content Negotiation Framework,” Network Working Group, Sep. 1999, available at http://www.ietf.org/rfc/rfc2703.txt?number=2703, 19 pages. |
Lamel et al., “Language Identification Using Phone-Based Acoustic Likelihood,” IEEE International Conference on Acoustics, Speech, and Signal Processing, 1994, vol. 1, pp. 293-296. |
Michael, “The Politics of Naming,” www.cConvergence.com, Jul. 2001, pp. 31-35. |
MIT Project Oxygen, Pervasive, Human-Centered Computing, MIT Laboratory for Computer Science, Jun. 2000, pp. 1-15. |
Moss et al., “The Importance of Data Modeling as a Foundation for Business Insight,” 2004, 38 pages. |
Noth et al., “Research Issues for the Next Generation Spoken,” University of Erlangen-Nuremberg, Bavarian Research Centre for Knowledge-Based Systems, at http://www5.informatik.uni-erlangen.de/literature/psdir/1999/Noeth99:RIF.ps.gz, 1999, 8 pages. |
Overview of Avaya IP Softphone printed on Sep. 15, 2009 from http://support.avaya.com/elmodocs2/ip—softphone/Overview—IP—Softphone—R6.htm, 2 pages. |
Presentation by Victor Zue, The MIT Oxygen Project, MIT Laboratory for Computer Science, Apr. 25-26, 2000, 9 pages. |
Product Brief of “Avaya IP Agent” printed on Sep. 15, 2009 from http://docs.google.com/gview?a=v&q=cache:IRR32Pfzp98J:www.nacr.com/uploadedFiles/Products/Avaya%2520IP%2520Age . . . , 1 page. |
Product Description of “Avaya one-X Agent,” printed on Sep. 15, 2009 from http://www.avaya.com/usa/product/avaya-one-x-agent, 1 page. |
Product Overview of “IP Softphone” printed on Sep. 15, 2009 from http://www.nacr.com/Products.aspx?id=236, 3 pages. |
Reeves, Laura, “Business Dimensional Modeling: The Logical Next Step: Translating the BDM,” DM Review Magazine, May 2004, 4 pages. |
Rose et al., “The APEX Presence Service,” Network Working Group, Jan. 14, 2002, available at http://www.ietf.org/internet-drafts/draft-ietf-apex-presence-06.txt, 31 pages. |
Sarda, “Temporal Issues in Data Warehouse Systems,” Database Applications in Non-Traditional Environments (DANTE'99), 1999, S. 27, DOI: 10.1109/DANTE.1999.844938. |
Schwarzkopf, A.B., “Dimensional Modeling for a Data Warehouse,” date unknown, 18 pages. |
Shockey, “ENUM: Phone Numbers Meet the Net,” www.cConvergence.com, Jul. 2001, pp. 21-30. |
Smith, “Data Model Overview: Modeling for the Enterprise While Serving the Individual,” Teredata Global Sales Support, 2007, 33 pages. |
Snape, “Time Dimension and Time Zones,” at http://www.jamessnape.me.uk/blog/CommentView,gui,79e910a1-0150-4452-bda3-e98d, Aug. 7, 2004, 10 pages. |
Songini, “ETL QuickStudy,” ComputerWorld, accessed at http://www.computerworld.com/databasetopics/businessintelligence/datawarehouse/story/ . . . , Feb. 2, 2004, 5 pages. |
Stevenson et al., “Name Resolution in Network and Systems Management Environments,” http://netman.cit.buffalo.edu/Doc/DStevenson/NR-NMSE.html, printed Mar. 31, 2003, 16 pages. |
Sugano et al., “Common Presence and Instant Messaging (CPIM) Presence Information Data Format,” Network Working Group, Dec. 2002, available at http://www.ietf.org/internet-drafts/draft-ietf-impp-cpim-pidf-07.txt, 26 pages. |
Vaisman et al., “A Temporal Query Language for OLAP: Implementation and a Case Study,” LNCS, 2001, vol. 2397, 36 pages. |
Veerman, E., “Designing a Dimensional Model,” http://atlantamdf.com/Presentations/AtlantaMDF—091106.pdf, printed Aug. 30, 2007, 38 pages. |
Watkins, Thayer, “Cost Benefit Analysis,” San Jose State University Economics Department, 1999, Web Archive http://web.arch ive.org/web/19990225143131/http://www.sjsu.edu/faculty/watkins/cba.htm, 13 pages. |
Wiederhold, “Mediation to Deal with Heterogeneous Data Sources,” Stanford University, Jan. 1999, 19 pages. |
Wilson Christopher Lamb: “DTMF to TTY gateway”, Research Disclosure, Mason Publications, Hampshire, GB, vol. 462, No. 46, Oct. 1, 2002, ISSN: 0374-4353. |
Zmolek, “Simple and Presence: Enterprise Value Propositions,” Avaya presentation, presented Jan. 24, 2002, 16 pages. |
“Call Center Reports,” Aspect Communications, May 19, 2005, http://aspect.com/products/analysis/ccreporting.cfm, 2 pages. |
Venkatesan et al., “A Customer Lifetime Value Framework for Customer Selection and Resource Allocation Strategy,” Journal of Marketing, Oct. 2004, vol. 68, pp. 106-125. |
Extended European Search Report for European Patent Application No. 10178909.7, dated Feb. 15, 2011. |
Examiner's Office Letter (including translation) for Japanese Patent Application No. 2007-043414, mailed Jul. 7, 2010. |
Search Report for European Patent Application No. 06254426.7, dated Nov. 3, 2009, 7 pages. |
Official Action for U.S. Appl. No. 12/569,581, mailed Dec. 6, 2012 10 pages. |
Official Action for U.S. Appl. No. 12/569,581, mailed Mar. 22, 2013 11 pages. |
Official Action for Chinese Patent Application No. 201010510112.3, mailed May 6, 2013, 18 pages. |
Notice of Allowance for U.S. Appl. No. 12/569,581, mailed Jun. 19, 2013, 6 pages. |
Official Action with English Translation for Japan Patent Application No. 2010-216933, mailed Nov. 11, 2013 3 pages. |
Official Action with English Translation for China Patent Application No. 201010510112.3, dated Jan. 9, 2014 20 pages. |
Number | Date | Country | |
---|---|---|---|
20110116505 A1 | May 2011 | US |