The present disclosure relates to telecommunications and more specifically to managing a communication session via a graphical user interface (GUI) with respect to trusted relationships of those participating in the communication session. Communication sessions can exist in a variety of modes such as telephone calls, communication sessions, instant messaging sessions, email sessions, video conference sessions, multi-media sessions, and the like.
Touchtone telephones have been supplemented over the years by the addition of feature buttons and menus. Interfaces for these features have evolved from simple buttons to hierarchical menus actuated by trackballs, quadrant style pointers, and the like. As the number of features increases, the interfaces add more buttons, sequences, and/or combination of button presses. This proliferation of features has led to a multitude of different interfaces with varying levels of complexity. Often users resort to rote memorization of key features, but that is not always practical or desirable. Recently, smartphones with touch-sensitive displays have begun to provide similar functionality. However, the touch-sensitive displays in such devices typically reproduce the feature buttons and menus, albeit on a touch-sensitive display.
Further, users are migrating to other communication forms, such as text messaging, instant messaging, email, chat sessions, video conferencing, and so forth. Incorporating the ability to handle these modes of communication into a traditional telephone increases the complexity and difficulty manyfold. What is needed in the art is a more intuitive communication management interface.
In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure.
The present disclosure addresses the need in the art for improved communication session management. A companion case U.S. Patent Publication No. US2010/0251158, published Sep. 30, 2010) discloses a graphical interface which enables a user to setup a communication session with various users and tear down or remove users from a communication session. A system and method are disclosed which displays on a graphical user interface a set of graphical connected elements representing a structure of a particular communication session or group of communication sessions for a user. A brief introductory description with reference to
Presenting the graphical interface of
The communication session is also agnostic with respect to the mode of communication. The same metaphor of a connected user in a communication session being displayed on the graphical interface can represent a called/calling user, an instant messaging (IM) user, an email user, a user connecting via video conferencing, multimedia, web conferencing, and so forth. For example, from the context shown in
The presentation of the graphical elements in connection with participants in a session, how they are connected and how the user interacts with the elements all vary depending on the needs and current active context of the communication session. For example, elements associated with participants in a session can include text, titles, positions, or any other data about each user. The connection metaphor between users can also represent information such as the type of connection (phone, video, web conference, etc), the quality of the connection (low-band, high-band, etc.), a hierarchy of how participants are related to the primary user (friend, associate, acquaintance, un-trusted user, etc.), a status of the connection (active, inactive, on-hold, etc.), and so forth. These variations shall be discussed herein as the various embodiments are set forth. The disclosure now turns to
With reference to
The system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 140 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 100, such as during start-up. The computing device 100 further includes storage devices 160 such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive or the like. The storage device 160 can include software modules 162, 164, 166 for controlling the processor 120. Other hardware or software modules are contemplated. The storage device 160 is connected to the system bus 110 by a drive interface. The drives and the associated computer readable storage media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computing device 100. In one aspect, a hardware module that performs a particular function includes the software component stored in a non-transitory computer-readable medium in connection with the necessary hardware components, such as the processor 120, bus 110, display 170, and so forth, to carry out the function. The basic components are known to those of skill in the art and appropriate variations are contemplated depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server.
Although the exemplary embodiment described herein employs the hard disk 160, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks, cartridges, random access memories (RAMs) 150, read only memory (ROM) 140, a cable or wireless signal containing a bit stream and the like, may also be used in the exemplary operating environment. Non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
To enable user interaction with the computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art. If the device includes a graphical display which also receives touch sensitive input, the input device 190 and the output device 170 can be essentially the same element or display. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100. The communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 120. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 120, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in
The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 100 shown in
Having briefly discussed the exemplary system embodiment, the disclosure now turns to
As shall be discussed, from the context of
Although
The system 100 can provide an interface to the user such that the user can use multiple different connection metaphors to establish or manipulate communication sessions. For example, the system 100 can display participant icons on the screen, show interconnections between participants and allow the user to place mode icons on each interconnection to establish the session. The system 100 can allow the user to position participant icons on the screen, select a mode and hit a button such as “go” or “connect”. The system 100 can place participant icons on the screen, overlay communication mode icons on each participant icon and allow the user to hit “go” or “connect”. These interface options are exemplary. The actual interface can be implemented in any of a number of variations.
In one aspect, participants join the communication session 201 via a telephone call. However, the communication session 201 is neutral with respect to various communication modalities and treats each the same even as users seek to join a call or other communication session.
In another aspect, the system 100 integrates the functions of one or more communications device. In this case, the display 200 shown in
The system 100 receives input via a physical or on-screen keyboard, mouse, stylus, touch screen, speech command, and/or single-touch or multi-touch gestures. Before a communication session is established, the system 100 can show a home screen where the graphical elements representing communications utilities such as 208, 210, 212, 214, 216 and 220 are shown. In one variation, the system 100 displays a summary or welcome page showing a short summary of news, messages, contacts, upcoming calendar events, and/or configuration options. In yet another variation, the system 100 displays a default input mechanism, such as a ten-key numeric pad for dialing telephone numbers.
The display 200 shows a communication session 201 of three connected graphical elements or entities 202, 204, 206. The set of graphical elements can include images, caricatures, avatars, text, and/or a hyperlink to additional information related to a user associated with the graphical elements. Any combination of graphical data can be presented to provide information about individual users, a connection mode, status, presence, other mode capabilities, and so forth. The text can include a name, a title, a position, a bio, a telephone number, email address, a current status, presence information, and location. The system can change or animate the graphical elements based on a contacted party context, persona, presence, and/or other factors. For example, an element may show an avatar or the person's face but show their eyes closed. This can mean that the person is not actively on the call or paying attention to the call. The avatar may show the person looking away or to the side or can show the person shaded or in some other graphical representation that they are not actively on the call, or that they have muted the call, on a sidebar and so forth. Active connections to the communication session can be visually represented as a graphical connection metaphor having overlapping graphical elements, a line connecting graphical elements, a shape connecting graphical elements, a shape with radiating lines connecting graphical elements, and/or a common augmented appearance of graphical elements. Overlapping or otherwise grouping graphical elements can represent individuals at one location. In such a case, information about the location can also be provided. Further, changing color, thickness, animation, texture, and/or length of graphical elements can indicate a relationship or status of entities represented by the graphical elements.
The displayed communication session 201 in
The call setup or communication session set up procedure shall be discussed next. In order to establish a communication session 201, the user can drag and drop a contact from a list of contacts 218 or from some other selection mechanism into the blank area or some designated spot such as over a the element 202 representing Frank Grimes. Each participant in the communication session 201 or contact in a list of contacts can have multiple associated addresses, phone numbers, or points of contact, such as a work phone, home phone, mobile phone, work email, home email, AIM address, social networking address such as a Facebook chat address, and the like. Each participant may also have an icon 202b, 204b, 206b or a qualifier that indicates not only the party but the contact mode. At this stage, a telephone number to be called or other communication address for alternate modes needs to be identified. The system can present an interface or menu which enables the user to enter via a keypad of any type a phone number to dial or to select a number for the user from a listing of numbers, or type in an email address for example if the user only can be reached by email. The system may only have one phone number for the selected contact and automatically dial that number. The system may also automatically select from available numbers based on any criteria such as previous history, presence information, etc.
The communication session 201 is not limited to a telephone call. The interface 200 enables the management of any communication session mode. When the user initiates a call, instant message, text message, videoconference, or the like with another user, the system 100 establishes a connection to the other party and displays a graphical representation of the communication session with the other party on the screen. The user can then add additional parties to the communication session in a similar manner. The user can remove participants from a communication session by dragging their element to a trash can icon 220, providing a flicking motion, clicking an X associated with that participant, highlight a participant and shaking the device, if it is mobile with accelerometer capability or click a physical or graphical disconnect button. In one aspect where the communication session is via telephone, the system 100 removes participants from the communication session when the user hangs up the telephone receiver. As participants leave the communication session 201, the system 100 removes their icon from the graphical representation of the communication session. As can be appreciated, adding and removing individual participants to and from the communication session occurs via the same drag and drop or other user input.
The graphical elements in
The system 100 can include for each icon 202, 204, 206 a respective graphical sub-element 202b, 204b, 206b that indicates the communication mode for each participant. For example, Max Power 204 is participating via an instant messaging (IM) client 204b; Frank Grimes 202 is participating via telephone 202b; Karl 206 is participating via a video conference client 206b. The system 100 is mode-neutral, meaning that the system 100 treats each mode of communication the same, such as telephone, cellular phone, voice over IP (VoIP), instant messaging, e-mail, text messaging, and video conferencing. As a user changes from one mode to another, the sub-elements can change accordingly. For example, if Frank Grimes 202 changes from a landline to a cellular phone mid-conference, the telephone icon 202b can change to a mobile phone icon.
Inasmuch as the system enables users to communicate in a session in different modes, the system can also modify the modes to align them in the session. Instant messages can be converted to speech and spoken in the teleconference from Max Power and speech can also be converted to text and transmitted to Max Power 204 for effective communication across modes.
The graphical elements can also convey information about the communication session by changing type, size, color, border, brightness, position, and so forth. The lines, for example, can convey relationships between participants. A user can manually trigger the changes for his or her own icon or others' icons, or the system 100 can detect change events and change the graphical elements accordingly. Change events can be based on a contacted party, context, persona, and/or presence. For example, as one person is talking, the system 100 can enlarge the icon representing that person. As another example, the system 100 can track how much each person in the communication session is talking and move graphical elements up and down based on a total talk time in the communication session.
In another variation, the system 100 modifies the links connecting the graphical elements 202, 204, 206 by changing their thickness, length, color, style, and/or animating the links. These modifications can represent a currently talking party, shared resources, an active communication session status, a held communication session status, a muted communication session status, a pending communication session status, a connecting communication session status, a multi-party line, a sidebar conversation, a monitored transfer, an unmonitored transfer, selective forwarding, selective breakup of the communication session into multiple communication sessions, and so forth. In this manner, the user can obtain knowledge about the status of the session, the types of communications that are occurring, and other important details about the communication session.
In one aspect, a user provides input such as a gesture (such as drag and drop, tap and drag with a touch screen or performs any other instructive user input) to manipulate and manage the communication session. For example, the user can click a call icon 208, a video conference icon 210, an IM icon 212, an icon button 214, or a social media icon 216 to invite another user to join the communication session. A user can drag these icons and drop them on a contact or on a participant in a current communication session. For example, if an incoming communication session is in one modality (IM 212 for example), the user can drag the call icon 208 onto the incoming communication session to accept the incoming communication session but transcode it from IM to a call.
Some basic examples of how a user can interact with such icons are provided below. The disclosure will step through example uses of each utility icon 208, 210, 212, 214, 216 and 220. The first example will illustrate use of the calling icon 208. Assume the users Karl 206 and Frank 202 are shown as in
An example of the use of the video icon 210 is presented next in the context of the initial display shown in
An example use of the IM icon 212 is presented next in the context of
In an example use of the email icon 214 also in the context of
The social networking icon 216 is discussed in the context of
The user can interact with the trash icon 220 by flicking participant icons in the general direction of the trash icon 220, drawing an X over a participant icon or over an entire communication session, shaking the device if the device is mobile or via other instructive input. The system 100 can terminate a communication session, delete a contact, remove a participant from a communication session, or take other actions based on the user interaction associated with the trash icon 220. Of course the trash icon 220 can take any other graphical image which reflects that a person or entity is leaving a communication session, such as door or a window. For example, a window or door can be on the display screen and the host can remove an entity from a communication session by moving the respective icon to the window or door. As can be appreciated, user interaction with a utility icon and at least one entity in a communication session can take many forms as discussed above. Each example interaction can be applied to other utility icons in a similar manner.
A user can also initiate a communication session by dragging and dropping an appropriate icon onto a contact. Alternatively, the user can browse through a list of contacts 218, then drag and drop a desired contact to add the desired contact to the communication session. The system 100 then automatically contacts that person in their desired mode, a sender preferred mode, a currently available mode based on presence information, or in a common available mode between the participants and joins that person to the communication session. The system 100 can display other information as well, such as a calendar, notes, memos, personal presence information, and time. A user can manually and seamlessly switch over from one modality to another mid-session. For example, a user participating in a communication session via cell phone who is now near a webcam can drag a video conferencing icon onto the communication session to switch from cell phone to video conferencing. The system 100 display can be user-configurable.
While drag and drop is used primarily in these examples, any user input can be provided such as tapping, flicking with a gesture, etc. to indicate a linking of a selected utility icon 208, 210, 212, 214, 216 with one or more participants (which may include people and non-person entities like a conference call or a calendar item).
In one aspect, user preferences guide the amount and type of information conveyed by the graphical elements and the associated text. User preferences can be drawn from a viewer's preferences and/or a source person's preferences. For example, a viewer sets preferences to show others' email addresses when available, but a source person sets preferences as never share email address. The source person's preferences (or preferences of the “owner” of the information) can override a third party's preferences.
Having discussed several variations of
In one aspect, a centralized entity such as node 320 controls the communication session. The centralized entity 320 can reside in the network and/or communicate via the network. The centralized entity 320 can operate as a centralized enterprise intelligence server. In another aspect, the communication session control and functionality is distributed among multiple server resources 314, 316, 318, 320 in the network or cloud 302. In addition to a centralized intelligence and distributed intelligence in the cloud, the network 302 can provide this functionality using a peer-to-peer approach with intelligence on the endpoints 312, 308, 306, 304. Some variations include providing standardized functionality on a standards-compliant server and non-standardized functionality distributed across the endpoints. In some respects, the “system”, “device”, “communication device” or other characterization of a hardware component that performs certain steps can be interpreted as one or more of the various devices as endpoints or network elements shown in
Each communications device 306, 304, 312, 308 of
In one aspect, a mobile device 308 connects with a base station 310 to connect to the network. A mobile device 308 can generate its own view of the communication session or it can generate a duplicate or a companion view of another device's display.
In general, the management of the communication session involves a user, such as the user interfacing with device 304, providing input to the graphical interface. The input as is noted herein involves an action step for manipulating or managing the communication session. Corresponding instructions are provided to the network node 320 or network nodes which actively provide the communication links to the various participants. Thus, the network node or nodes will carry out the instructions received from the managing device such that actions like communication session bridging, removing a person from the session, establishing a sidebar discussion, separating the communication session into several smaller communication sessions, and so forth, are appropriately carried out.
The interface 400 in
The display 400 can include a title bar 404 and various controls such as a mute button 406, an exit button 408, a transcription button, and an “add participant” button 410. When a user clicks on the “add participant” button 410, the system 100 can present the user with a dialog to select one or more participants to add. The title bar 404 can include information such as call duration, call moderator, and preferred communication mode. When a user clicks on the mute button 406, the system 100 can mute the user's line or other participants' lines. For a participant, clicking the exit button 408 causes that participant to leave the conference. The moderator could also highlight one of the participants with a click or gesture and then click on exit 408 to remove them from the conference. The conference moderator can also terminate the communication session for all participants by clicking the exit button 408.
When a user clicks on a transcription button (not shown), the system 100 can engage a speech recognition module to recognize and transcribe speech. The system 100 can display transcriptions in real time, such as a ticker of text beneath a user's icon. The system 100 can also prepare a full transcript of an entire communication session and email the full transcript to selected participants after the communication session ends. The system 100 can transcode audio from a telephone call to text for a text messaging session via automatic speech recognition (ASR) and can convert in the other way via text-to-speech (TTS). Thus, Max 204 can communicate via IM with Frank 202 and Karl 206 in the same session but in different modes. These differences can be visually representing in the session display.
Alternatively, the user can browse and select a participant from a list of contacts and drag desired participants directly into the graphical representation of the conference. A user can also add a party to the communication session, invite a party to the communication session, drop a party from the communication session, split a communication session, form a sidebar communication session, and merge two communication sessions. A sidebar communication session is a concurrent session between two or more participants in a main communication session, but separate from the main communication session. For example, if Max Power 204 is proposing an idea, Frank Grimes 202 and Karl 206 can form a sidebar to discuss the proposed idea without Max Power listening or even knowing about the sidebar. In some cases knowledge of the sidebar's existence is available to other participants, but the other participants do not know what is being communicated in the sidebar.
Having discussed several variations of
The display in
If Karl 206 accepts the incoming communication 514 from John Mah, the system 100 creates and displays a new communication session including Karl 206 and John Mah (not shown in
The system 100 can visually represent active connections as overlapping graphical elements for individuals at one location. For example, in the second communication session 512, the participants from Florida are overlapped as are the participants from California. The user can manipulate these overlapping icons to identify or communicate with participants in a communications session.
The display can include a listing of contacts 520 and calendar events 522. User interactions with the contacts can trigger an expanding view or a popup window with more information. The user can then click on a particular contact to see a list of available modes of communication for that contact. The system 100 initiates an additional communication session with that contact based on a user selection of an available mode of communication. The system 100 connects and displays that communication session along with the existing three 502, 512 and the newly added session with John Mah (not shown).
Further, the system 100 can include a search capability. A user can search for contacts, calendar events, email addresses, phone numbers, and so forth. This approach can be advantageous for users with very large contact lists or for finding all members of a particular department.
Often a contact will include several contacts for a particular communication modality. For example, one contact can include four phone numbers, two text message numbers, three email addresses, and so on. In these cases the system 100 can intelligently select one of the available addresses or numbers for a selected modality, or the system 100 can present a disambiguation dialog so the user can select a desired address or number.
In many instances, a user will not have a contact entry for all the other communication session participants. To add a communication session participant as a contact, the user can drag and drop the desired icon on the contacts icon. The system 100 can automatically locate available information about that participant to add to the contact database.
One possible user input is to divide the communication session shown in
In a similar vein, each participant sees a potentially unique graphical representation of the communication session. For example, the layout of the icons may be different. The appearance of the icons may be different based on context elements such as a trust level, purpose of the communication session, location, time of day, day of week, and so forth. For example, in a business related communication session with potential clients, a user's context causes that user to appear to other participants as a formal icon, such as a picture of the user in a suit and tie. In a more casual context, that same user can appear as a picture of the user with a t-shirt and baseball cap. In some cases, the trust relationship alters the user's appearance in others' graphical representations of the communication session. For example, two users with a trusted relationship between each other can appear differently to each other than they appear to other non-trusted participants in a communication session.
The GUI can overlap or stack multiple participants from a single location or facility like a deck of cards, as shown with the participants from California 604 and Florida 610. The GUI can also portray multiple participants at a single location using a linked wheel analogy. A linked wheel includes a location-specific secondary hub which connects to the communication session, and participants at that location connect to the communication session through the location-specific secondary hub. The trusted relationship can include bidirectional linkages to schedulers, calendars or other personal data. In such a trusted relationship between communication session participants, the linkage between schedulers can depict meeting with or without a listing of participants, presence, context or persona via the icon, connecting lines, borders, textures, and/or other graphical elements. Linkage between schedulers may even extend to pushing a user's entire calendar when a trust threshold is met. In
The link(s) can have various trust levels. Different visual metaphors can represent the different levels. For example, a “business associate” level can share business contact information including business address, email address and business phone number. This level of a trusted relationship can be presented by a blue line, a thin link or the like in the communication session interface 600. Another layer of trust may include temporal information such as calendaring information for business hours and represented with a different color, thicker line, or the like. A deeper trust relationship can be represented by a thicker line, still another color, or the like and can include weekend and evening calendar information, birthday/anniversary dates, personal email address and cell phone numbers, etc.
With respect to persona information, a user may desire to depict a business persona on a communication that focuses on their experience, business successes etc. That persona may be represented in a business contact entry that they would want to share if someone downloaded their contact information. Other persona information such as personal tastes, hobbies, personal interests, etc. may be shared in other trusted relationships. The user can manage what persona is presented, offered or received in a communication via a trusted relationship metaphor as disclosed herein. This may include such information as what type of icon or element is shown in the communication session. For example, Paul 606 may have a close friend relationship with Karl 602 and want to have on Karl's display 600 a more casual picture 606 in his graphical representation of the communication session. This can be determined based on the trust level of the relationship between the parties. Paul 606 may desire that the other participants from Florida, California, and Rob see an icon 606 that is more business-focused, i.e. Paul in a suit. This difference in their graphical view of the session can be based on the trusted relationship between the individual parties.
A contact in a listing of contacts can also have appearance consistent with its trusted relationship appearance in a communication session. For example, if a thick red line indicates a trusted relationship in a communication session, a trusted contact in a listing of contacts can have a thick red border.
There are various ways in which the user Karl 602 can establish a trusted relationship. For example, Karl 602 can drag or otherwise move a trust icon 612 from the hub 626 of the communication session (or elsewhere) and drop it or otherwise position it on an icon representing another communication session participant.
In one aspect, the system 100 changes the depiction of trust as the actual relationship between two parties evolves. For example, in a single communication session (or over the duration of multiple communication sessions) as two users gain each other's trust, the line can change color, thickness, or the like to indicate a burgeoning trust relationship. Likewise, as a trust relationship terminates, the system 100 can automatically update the graphical depiction of the link to return to a normal or untrusted state.
When users establish a trusted relationship, at least one of the users in the trusted relationship can set a trust level.
A trusted relationship can share multiple resources such as a calendar, contacts, presence information, documents, credentials, funds, email (including inbox, outbox, and/or sent items), IM data, photos, videos, persona information and other information that may or may not be directly related to the communication session. Karl 602 can click on an X 622 associated with the thick line to Paul 606 to terminate the trusted relationship at any time. Similarly, a user can manually raise and lower the trust level as a relationship evolves, such as by clicking a plus or minus icon related to the trust level or moving a slider up or down. In the case where one participant of a group of participants at a single location has a trusted relationship, such as the groups California 604 or Florida 610, the system 100 can separate out that one participant from the group in order to more clearly show a trusted relationship graphically. Optionally, where a trusted relationship exists between Karl 602 and Paul 606 on the communication, Paul 606 may also be presented in his GUI a visual depiction of the trusted relationship as well.
As an additional benefit, adding a contact to a contacts list can take advantage of this concept of a trusted relationship. For example, If Karl 602 does not have Paul's contact information, once the trusted relationship is established, then Karl could easily receive Paul's contact information at whatever appropriate level. For example, Paul on his interface 600 could drag and drop Paul's icon 606 to a contacts icon (such as 520 shown in
Other aspects of the communication session 600 are discussed next. With respect to establishing a sidebar communication, the following example illustrates how a sidebar can be established. The conference call 600 shown in
For example, visually the communication link between the parties and the conference can be shown as dashed lines or some other visual representation that they are partially connected to the communication session while a communication link between the two parties in the sidebar can illustrate an active communication link. The icons of sidebar participants could be moved into a corner or other location on the interface 600 to demonstrate that they are off having a separate discussion. With respect to the audio, the communication manager, or conferencing server represented by the hub 626, can reduce the volume of the primary communication session such that the sidebar discussion hears it in the background. In this respect, the host of the call, Karl 602, could speak a little louder to signal to Rob and Paul in the sidebar that they should rejoin the conference. In other words, if the host 602 says a little louder “Rob and Paul, are you ready to join back in?!”
In this scenario, the participants in the primary communication session would not be able to hear the audio in the sidebar but if Rob or Paul were able to raise their voice to respond, then the communication manager or conference bridge could make that response audible to the conference. This approach can simulate the mechanism of parties physically together in which two parties remove themselves into a corner for a more private discussion but still have a level of communication available with the primary communication session.
Alternately, sidebars can be totally separate links. The host 602 can signal sidebar participants via text or another mode to rejoin the communication session. The main conference bridge would continue and the system 100 establishes separate sidebars between sub-groups. In one aspect, any party can set up the sidebar(s) not just the host.
In other aspects of this sidebar example, physically separate connections for sidebar(s) can be set up by any member of the main conference. In addition, other modes of communication such as IM or email can automatically become available between the sidebars and the main conference to signal status messages such as time to rejoin, questions about how it is going, and the like. For example, Rob 608 and Paul 606 are separated into a sidebar discussion and the various adjustments to the communication session are established, an automatic menu or icons could be presented which facilitate further modifications to the communication session. For example, icons could presented in which enable the host 602 or another party not in the sidebar(s) to drag or otherwise move and drop or otherwise locate an icon to Rob and Paul in their sidebar session which automatically sends an instant message asking “are you guys ready to return?” Rob and/or Paul could respond via an instant message by stating something like “yes we are ready”. In that case, the host 602 or another party drags or otherwise moves an icon on the host GUI which represents the sidebar with Rob and Paul back to the communication session in which Paul 606 and Rob 608 would be restored to their previous state of being regular participants in the entire communication session 600. The additional icons or communication means for the sidebar would then disappear inasmuch as they are no longer needed. In one aspect, Rob and Paul decide by themselves to rejoin the communication session and do not require intervention from the host or require that the host is even aware of the sidebar communication session.
Furthermore with respect to sidebars, trusted relationships between sidebar participants can be automatically or manually established. For example, if Rob 608 and Paul 606 establish a sidebar, and each of these participants have a high level trusted relationship with Karl 602, then the system could automatically enable them to have a high-level trusted relationship in their side bar. Karl could say for example, “Rob and Paul, you are both at a close friend trusted level with me but I know you don't know each other well. I am going to setup a side bar for you two to talk for a minute and share trusted information. We'll bring you back in the call in 5 minutes.” Karl 602 can then establish the sidebar with Rob and Paul and they can share trusted information via drag and drop or other operations to add each other to their contacts list as trusted contacts.
In a trusted sidebar, the icons 608 and 606 may also change to illustrate the persona of each individual. For example, they can show a more relaxed view to the parties in the sidebar in their respective GUIs than otherwise would be shown to the other participants in the session. As can be seen, contextual, persona and temporal information can be shared in various ways and to various individual participants based on a trusted relationship.
A trusted relationship can allow trusted parties to view each other's presence information beyond the scope of the communication session. For example, if Karl and Rob have a trusted relationship, Karl can see Rob's presence information beyond the workplace and after the workday is over. The trusted relationship can be asymmetric in this and other variations. In one example of an asymmetric trusted relationship, Karl trusts Rob and shares full calendar access and 24 hour presence information with Rob. Rob on the other hand trusts Karl but only grants Karl restricted access to the calendar (i.e. full access to calendar events between 9 a.m. to noon on weekdays) and presence information during working hours.
The basic step for establishing a sidebar as shown in the exemplary method embodiment of
The disclosure now turns to the exemplary method embodiment shown in
The graphical elements can include images, caricatures, avatars, text, and a hyperlink to additional information related to a user associated with the graphical elements. The text can include a name, a title, a position, a telephone number, email address, a current status, presence information, and location. The system can change or animate the graphical elements based on a contacted party context, persona, and presence. Active connections to the communication session can be visually represented as a graphical connection metaphor having overlapping graphical elements, a line connecting graphical elements, a shape connecting graphical elements, a shape with radiating lines connecting graphical elements, and/or a common augmented appearance of graphical elements. Overlapping graphical elements can represent individuals at one location. Further, changing color, thickness, animation, texture, and/or length of graphical elements can indicate a relationship or status of entities represented by the graphical elements. The graphical elements associated with the first participant and the second participant can depict one or more of presence, context, and persona information. In one aspect, the system 100 displays a dashboard of trusted options relating to presence, context, and persona information between the first participant and the second participant.
The system 100 establishes a bidirectional link between the first participant and the second participant, wherein the communication device exchanges trusted information between the first participant and the second participant (804). The system 100 or one of the users can select the bidirectional link from one of a hierarchy of types, each type indicating a different level of trust and access. The system 100 can update the appearance of the bidirectional link appearance based on the selected type. The exchanged trusted information can include calendar events, contextual data, persona information and so forth. The system 100 can optionally negotiate a calendar event with the second participant via the bidirectional link based on the trusted information. As can be appreciated, trusted information of various types can be exchanged between trusted parties or other parties of trusted parties in a variety of ways utilizing the basic options available due to the ability to manage a communication session or sessions graphically as disclosed herein. For example,
Other examples also apply to
Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon. Such non-transitory computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as discussed above. By way of example, and not limitation, such non-transitory computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.
Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
Those of skill in the art will appreciate that other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Those skilled in the art will readily recognize various modifications and changes that may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure.
This application claims priority to U.S. Provisional Application No. 61/164,753, files 30 Mar. 2009, which is incorporated herein by reference in its entirety. This application is related U.S. patent application Ser. No. 12/749,028, U.S. patent application Ser. No. 12/749,058, U.S. patent application Ser. No. 12/749,123, U.S. patent application Ser. No. 12/749,150, U.S. patent application Ser. No. 12/749,103, U.S. patent application Ser. No. 12/749,178, and U.S. patent application Ser. No. 12/749,122 filed on Mar. 29, 2010, each of which is herein incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5140562 | Moore-Ede et al. | Aug 1992 | A |
5195086 | Baumgartner et al. | Mar 1993 | A |
5500934 | Austin et al. | Mar 1996 | A |
5533110 | Pinard et al. | Jul 1996 | A |
5627978 | Altom et al. | May 1997 | A |
5745711 | Kitahara et al. | Apr 1998 | A |
5758079 | Ludwig et al. | May 1998 | A |
5768552 | Jacoby | Jun 1998 | A |
5831611 | Kennedy | Nov 1998 | A |
5835085 | Eick | Nov 1998 | A |
5892764 | Riemann et al. | Apr 1999 | A |
5896128 | Boyer | Apr 1999 | A |
5940488 | Degrazia et al. | Aug 1999 | A |
5949414 | Namikata et al. | Sep 1999 | A |
5999208 | McNerney | Dec 1999 | A |
5999609 | Nishimura | Dec 1999 | A |
6011553 | Komiyama | Jan 2000 | A |
6016478 | Zhang | Jan 2000 | A |
6067357 | Kishinsky et al. | May 2000 | A |
6191807 | Hamada et al. | Feb 2001 | B1 |
6208658 | Pickett | Mar 2001 | B1 |
6278454 | Krishnan | Aug 2001 | B1 |
6286034 | Sato et al. | Sep 2001 | B1 |
6304648 | Chang | Oct 2001 | B1 |
6330005 | Tonelli | Dec 2001 | B1 |
6415020 | Pinard et al. | Jul 2002 | B1 |
6445682 | Weitz | Sep 2002 | B1 |
6496201 | Baldwin et al. | Dec 2002 | B1 |
6501740 | Sun et al. | Dec 2002 | B1 |
6559863 | Megiddo | May 2003 | B1 |
6608636 | Roseman | Aug 2003 | B1 |
6751669 | Ahuja et al. | Jun 2004 | B1 |
6853398 | Malzbender et al. | Feb 2005 | B2 |
6948131 | Neven | Sep 2005 | B1 |
D528553 | Nevill-Manning et al. | Sep 2006 | S |
D529036 | Koch et al. | Sep 2006 | S |
D529037 | Koch et al. | Sep 2006 | S |
D529920 | Nevill-Manning et al. | Oct 2006 | S |
7124164 | Chemtob | Oct 2006 | B1 |
7127685 | Canfield et al. | Oct 2006 | B2 |
7136466 | Gao | Nov 2006 | B1 |
7139379 | Kobrosly | Nov 2006 | B2 |
7162699 | Pena-Mora et al. | Jan 2007 | B1 |
7167182 | Butler | Jan 2007 | B2 |
7213206 | Fogg | May 2007 | B2 |
7269162 | Turner | Sep 2007 | B1 |
7284207 | Canfield | Oct 2007 | B2 |
7317791 | Carlson | Jan 2008 | B2 |
7478129 | Ghemtob | Jan 2009 | B1 |
7495687 | DuMas | Feb 2009 | B2 |
D591304 | Banks et al. | Apr 2009 | S |
7515560 | DuMas | Apr 2009 | B2 |
7516411 | Beaton | Apr 2009 | B2 |
7519912 | Moody et al. | Apr 2009 | B2 |
7571254 | Canova, Jr. et al. | Aug 2009 | B1 |
D603866 | Banks et al. | Nov 2009 | S |
7630986 | Herz | Dec 2009 | B1 |
7644144 | Horvitz et al. | Jan 2010 | B1 |
7653013 | Moran | Jan 2010 | B1 |
7685235 | Curran | Mar 2010 | B2 |
7734692 | Kaplan et al. | Jun 2010 | B1 |
7780533 | Yamauchi et al. | Aug 2010 | B2 |
7831917 | Karam | Nov 2010 | B1 |
7856411 | Darr | Dec 2010 | B2 |
7881235 | Arthur | Feb 2011 | B1 |
7930730 | Brewer | Apr 2011 | B2 |
7949952 | Hawley et al. | May 2011 | B2 |
8060391 | Freire | Nov 2011 | B2 |
8062302 | Bercker et al. | Dec 2011 | B2 |
8082302 | Becker et al. | Dec 2011 | B2 |
8108774 | Finn | Jan 2012 | B2 |
8144633 | Yoakum et al. | Mar 2012 | B2 |
8223186 | Derocher et al. | Jul 2012 | B2 |
8243902 | Caspi et al. | Aug 2012 | B2 |
8375034 | Norton et al. | Feb 2013 | B2 |
8386301 | Rajasingham | Feb 2013 | B2 |
8516380 | Bates | Aug 2013 | B2 |
8549657 | Karlson | Oct 2013 | B2 |
8607250 | Oral et al. | Dec 2013 | B2 |
8775595 | Leacock et al. | Jul 2014 | B2 |
8786664 | Hornyak et al. | Jul 2014 | B2 |
9225537 | Hendricks | Dec 2015 | B1 |
9363147 | Quillen et al. | Jun 2016 | B2 |
9900280 | Geppert et al. | Feb 2018 | B2 |
10574623 | Geppert et al. | Feb 2020 | B2 |
20030001890 | Brin | Jan 2003 | A1 |
20030002633 | Kredo et al. | Jan 2003 | A1 |
20030055974 | Brophy | Mar 2003 | A1 |
20030063072 | Brandenberg et al. | Apr 2003 | A1 |
20030063728 | Sibal et al. | Apr 2003 | A1 |
20030133562 | Ooki | Jul 2003 | A1 |
20030206619 | Curbow et al. | Nov 2003 | A1 |
20030236835 | Levi et al. | Dec 2003 | A1 |
20040019683 | Lee et al. | Jan 2004 | A1 |
20040028199 | Carlson | Feb 2004 | A1 |
20040125937 | Turcan et al. | Jul 2004 | A1 |
20040218751 | Colson et al. | Nov 2004 | A1 |
20040235520 | Cadiz et al. | Nov 2004 | A1 |
20040258222 | Kobrosly et al. | Dec 2004 | A1 |
20040264652 | Erhart et al. | Dec 2004 | A1 |
20050021624 | Herf et al. | Jan 2005 | A1 |
20050083907 | Fishier | Apr 2005 | A1 |
20050132012 | Muller et al. | Jun 2005 | A1 |
20050141694 | Wengrovitz | Jun 2005 | A1 |
20050151836 | Ni | Jul 2005 | A1 |
20050171412 | George | Aug 2005 | A1 |
20050181878 | Danieli et al. | Aug 2005 | A1 |
20050182745 | Dhillon et al. | Aug 2005 | A1 |
20050187808 | Adamson et al. | Aug 2005 | A1 |
20050251555 | Little | Nov 2005 | A1 |
20060019655 | Peacock | Jan 2006 | A1 |
20060023859 | Crockett et al. | Feb 2006 | A1 |
20060031332 | Bronholtz et al. | Feb 2006 | A1 |
20060031510 | Beck | Feb 2006 | A1 |
20060053380 | Spataro et al. | Mar 2006 | A1 |
20060059236 | Sheppard et al. | Mar 2006 | A1 |
20060078883 | Ueda et al. | Apr 2006 | A1 |
20060098793 | Erhart et al. | May 2006 | A1 |
20060107303 | Erhart et al. | May 2006 | A1 |
20060117264 | Beaton et al. | Jun 2006 | A1 |
20060123082 | Digate et al. | Jun 2006 | A1 |
20060135142 | Repka | Jun 2006 | A1 |
20060147009 | Greenlee et al. | Jul 2006 | A1 |
20060190546 | Daniell | Aug 2006 | A1 |
20060235716 | Mahesh et al. | Oct 2006 | A1 |
20060236247 | Morita | Oct 2006 | A1 |
20060236269 | Borna | Oct 2006 | A1 |
20070005717 | LeVasseur | Jan 2007 | A1 |
20070006094 | Canfield | Jan 2007 | A1 |
20070050452 | Raju | Mar 2007 | A1 |
20070053308 | Dumas et al. | Mar 2007 | A1 |
20070088818 | Roberts et al. | Apr 2007 | A1 |
20070105548 | Mohan et al. | May 2007 | A1 |
20070121893 | Kouri et al. | May 2007 | A1 |
20070174787 | Rhee | Jul 2007 | A1 |
20070186193 | Curran | Aug 2007 | A1 |
20070201674 | Annadata et al. | Aug 2007 | A1 |
20070206768 | Bourne et al. | Sep 2007 | A1 |
20070208806 | Mordecai et al. | Sep 2007 | A1 |
20070219659 | Abhyanker et al. | Sep 2007 | A1 |
20070260685 | Surazski | Nov 2007 | A1 |
20070279484 | Derocher et al. | Dec 2007 | A1 |
20070282621 | Altman et al. | Dec 2007 | A1 |
20070288562 | Shaffer et al. | Dec 2007 | A1 |
20070288627 | Abella et al. | Dec 2007 | A1 |
20080005235 | Hedge et al. | Jan 2008 | A1 |
20080030496 | Lee et al. | Feb 2008 | A1 |
20080034037 | Ciudad | Feb 2008 | A1 |
20080043963 | Kondapalli et al. | Feb 2008 | A1 |
20080049921 | Davis et al. | Feb 2008 | A1 |
20080075247 | Tanaka et al. | Mar 2008 | A1 |
20080080386 | Calahan et al. | Apr 2008 | A1 |
20080088698 | Patel et al. | Apr 2008 | A1 |
20080097816 | Freire et al. | Apr 2008 | A1 |
20080115087 | Rollin et al. | May 2008 | A1 |
20080120371 | Gopal | May 2008 | A1 |
20080133580 | Wanless et al. | Jun 2008 | A1 |
20080148156 | Brewer et al. | Jun 2008 | A1 |
20080167056 | Gilzean et al. | Jul 2008 | A1 |
20080215583 | Gunawardena et al. | Sep 2008 | A1 |
20080235610 | Dettinger | Sep 2008 | A1 |
20080244418 | Manolescu | Oct 2008 | A1 |
20080263475 | Hwang | Oct 2008 | A1 |
20080266378 | Ryu | Oct 2008 | A1 |
20080270926 | Dettinger | Oct 2008 | A1 |
20080275719 | Davis | Nov 2008 | A1 |
20080307320 | Payne | Dec 2008 | A1 |
20080309617 | Kong et al. | Dec 2008 | A1 |
20080313297 | Heron | Dec 2008 | A1 |
20090006980 | Hawley et al. | Jan 2009 | A1 |
20090019367 | Cavagnari et al. | Jan 2009 | A1 |
20090024952 | Brush et al. | Jan 2009 | A1 |
20090037827 | Bennetts | Feb 2009 | A1 |
20090054107 | Feland, III et al. | Feb 2009 | A1 |
20090059818 | Pickett | Mar 2009 | A1 |
20090061832 | Goggans et al. | Mar 2009 | A1 |
20090063995 | Baron | Mar 2009 | A1 |
20090086012 | Thapa | Apr 2009 | A1 |
20090089683 | Thapa | Apr 2009 | A1 |
20090094559 | Shoshan | Apr 2009 | A1 |
20090125819 | Hamilton, II et al. | May 2009 | A1 |
20090138554 | Longobardi et al. | May 2009 | A1 |
20090204904 | Mujkic et al. | Aug 2009 | A1 |
20090228322 | van Os et al. | Sep 2009 | A1 |
20090241031 | Gamaley et al. | Sep 2009 | A1 |
20090248709 | Fuhrmann et al. | Oct 2009 | A1 |
20090248852 | Fuhrmann et al. | Oct 2009 | A1 |
20090249226 | Manolescu et al. | Oct 2009 | A1 |
20090288007 | Leacock | Nov 2009 | A1 |
20090290696 | K. N. | Nov 2009 | A1 |
20090307620 | Hamilton, II et al. | Dec 2009 | A1 |
20090319623 | Srinivasan et al. | Dec 2009 | A1 |
20100011304 | Os | Jan 2010 | A1 |
20100023585 | Nersu et al. | Jan 2010 | A1 |
20100076807 | Bells et al. | Mar 2010 | A1 |
20100083137 | Shin et al. | Apr 2010 | A1 |
20100083140 | Dawson et al. | Apr 2010 | A1 |
20100083148 | Finn | Apr 2010 | A1 |
20100085417 | Satyanarayanan et al. | Apr 2010 | A1 |
20100093330 | Bluvband et al. | Apr 2010 | A1 |
20100098230 | Bhow | Apr 2010 | A1 |
20100105437 | Lee et al. | Apr 2010 | A1 |
20100122194 | Rogers | May 2010 | A1 |
20100162153 | Lau | Jun 2010 | A1 |
20100167710 | Alhainen | Jul 2010 | A1 |
20100169363 | Gaedcke | Jul 2010 | A1 |
20100180212 | Gingras et al. | Jul 2010 | A1 |
20100182921 | Basart et al. | Jul 2010 | A1 |
20100203875 | Nishimori | Aug 2010 | A1 |
20100220635 | Gisby et al. | Sep 2010 | A1 |
20100222028 | Gisby et al. | Sep 2010 | A1 |
20100223089 | Godfrey et al. | Sep 2010 | A1 |
20100234052 | Lapstun et al. | Sep 2010 | A1 |
20100246571 | Geppert et al. | Sep 2010 | A1 |
20100246791 | Wang et al. | Sep 2010 | A1 |
20100251127 | Geppert et al. | Sep 2010 | A1 |
20100251158 | Geppert et al. | Sep 2010 | A1 |
20100271457 | Thapa | Oct 2010 | A1 |
20100273447 | Mann et al. | Oct 2010 | A1 |
20100312644 | Borgs | Dec 2010 | A1 |
20100312836 | Serr et al. | Dec 2010 | A1 |
20110022968 | Conner et al. | Jan 2011 | A1 |
20110109940 | Silverbrook et al. | May 2011 | A1 |
20110145053 | Hashim-Waris | Jun 2011 | A1 |
20110151905 | Lapstun et al. | Jun 2011 | A1 |
20110182415 | Jacobstein et al. | Jul 2011 | A1 |
20110191136 | Bourne et al. | Aug 2011 | A1 |
20110196868 | Hans et al. | Aug 2011 | A1 |
20110222675 | Chua et al. | Sep 2011 | A1 |
20110271206 | Jones et al. | Nov 2011 | A1 |
20110296312 | Boyer et al. | Dec 2011 | A1 |
20110302509 | Leacock et al. | Dec 2011 | A1 |
20120019610 | Hornyak et al. | Jan 2012 | A1 |
20120077536 | Goel et al. | Mar 2012 | A1 |
20120079099 | Dhara et al. | Mar 2012 | A1 |
20120083252 | Lapstun et al. | Apr 2012 | A1 |
20120084672 | Vonog et al. | Apr 2012 | A1 |
20120110473 | Tseng | May 2012 | A1 |
20120216129 | Ng et al. | Aug 2012 | A1 |
20120259633 | Aihara et al. | Oct 2012 | A1 |
20130080954 | Carlhian et al. | Mar 2013 | A1 |
20130108035 | Lyman | May 2013 | A1 |
20130250038 | Satyanarayanan et al. | Sep 2013 | A1 |
20130268866 | Lyman | Oct 2013 | A1 |
20140108023 | Arkoff | Apr 2014 | A1 |
20140333713 | Shoemake et al. | Nov 2014 | A1 |
20140359789 | Pitt | Dec 2014 | A1 |
Number | Date | Country |
---|---|---|
1292127 | Apr 2001 | CN |
19543870 | May 1996 | DE |
19716316 | Oct 1998 | DE |
0453128 | Oct 1991 | EP |
0717544 | Jun 1996 | EP |
1480422 | Nov 2004 | EP |
1983729 | Oct 2008 | EP |
2338146 | Dec 1999 | GB |
H07-74834 | Mar 1995 | JP |
H08-251261 | Sep 1996 | JP |
H09-055983 | Feb 1997 | JP |
2002-297873 | Oct 2002 | JP |
2003-296556 | Oct 2003 | JP |
2004-102389 | Apr 2004 | JP |
2004-199644 | Jul 2004 | JP |
2004-320235 | Nov 2004 | JP |
2005-318055 | Nov 2005 | JP |
2006-050370 | Feb 2006 | JP |
2006-060340 | Mar 2006 | JP |
2006-092367 | Apr 2006 | JP |
2007-004000 | Jan 2007 | JP |
2007-13694 | Jan 2007 | JP |
2007-143144 | Jun 2007 | JP |
2008-171068 | Jul 2008 | JP |
2009-20829 | Jan 2009 | JP |
2009-044679 | Feb 2009 | JP |
2006-0058872 | Jun 2006 | KR |
2006-0132484 | Dec 2006 | KR |
2009-0001500 | Jan 2009 | KR |
WO 9821871 | May 1998 | WO |
WO 9945716 | Sep 1999 | WO |
WO 0018082 | Mar 2000 | WO |
WO 2006054153 | May 2006 | WO |
WO 2006060340 | Jun 2006 | WO |
WO 2007008321 | Jan 2007 | WO |
Entry |
---|
WL Hu, K Akash, N Jain, T Reid; “Real-time sensing of trust in human-machine interactions”, 2016 (Year: 2016). |
Byrne et al., “Developing multiparty conferencing services for the NGN: towards a service creation framework”, Jun. 2004, ISICT '04, Proceedings of the 2004 International Symposium on Information and Communication. |
Honda et al., “e-MulCS; Multi-Party Conference System with Virtual Space and the Intuitive Input Interface”, Proceedings of the 2004 International Symposium on Applications and the Internet (SAINT '04) pp. 56-63, 2004. |
WebEx, WebEx Meeting Center user's Guide, 2007, WebEx Communications Inc., Version 8, pp. 1-332. |
English Translation of Official Action for China Patent Application No. 201010195951.0, dated Nov. 30, 2015 10 pages. |
Official Action with English Translation for China Patent Application No. 201310239355.1, dated Jan. 15, 2016 7 pages. |
Decision to Refuse for European Patent Application No. 10158401.9, dated Jun. 2, 2017 10 pages. |
Decision to Refuse for European Patent Application No. 10158453.0, dated Jun. 16, 2017 13 pages. |
Summons to Attend Oral Proceedings for European Patent Application No. 10158453.0, dated Jun. 23, 2016 6 pages. |
Intention to Grant for European Patent Application No. 10158406.8, dated May 24, 2017 53 pages. |
Intention to Grant for European Patent Application No. 10158403.5, dated May 29, 2017 60 pages. |
Summons to Attend Oral Proceedings for European Patent Application No. 10158399.5, dated Jun. 9, 2016 5 pages. |
Official Action for U.S. Patent Application No. 962/MUM/2010, dated Sep. 18, 2018 6 pages. |
Official Action for India Patent Application No. 967/MUM/2010, dated Sep. 25, 2018 6 pages. |
Official Action for India Patent Application No. 969/MUM/2010, dated Jul. 24, 2018 6 pages. |
Official Action for India Patent Application No. 970/MUM/2010, dated Aug. 29, 2018 7 pages. |
Official Action with English Translation for Korea Patent Application No. 2012-0062908, dated Dec. 30, 2015 7 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Jun. 7, 2012 13 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Nov. 21, 2012 11 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated May 2, 2014 14 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Nov. 20, 2014 17 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Aug. 4, 2015 18 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Jan. 11, 2016 22 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Jul. 6, 2016 24 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Dec. 16, 2016 28 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Apr. 6, 2017 24 pages. |
Official Action for U.S. Appl. No. 12/749,028, dated Nov. 2, 2017 21 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Oct. 2, 2012 13 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Aug. 27, 2013 10 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Feb. 3, 2014 11 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Aug. 29, 2014 39 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Sep. 17, 2015 43 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Apr. 7, 2016 33 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Feb. 9, 2017 36 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Aug. 18, 2017 38 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Jan. 11, 2018 43 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Aug. 10, 2018 40 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Feb. 7, 2019 25 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Jun. 21, 2012 12 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Nov. 6, 2012 11 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Oct. 21, 2014 15 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Apr. 22, 2015 13 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Dec. 17, 2015 13 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Jun. 7, 2016 12 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Jul. 25, 2016 15 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Nov. 23, 2016 15 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Feb. 6, 2017 15 pages. |
Official Action for U.S. Appl. No. 12/749,094, dated Jun. 14, 2017 15 pages. |
Notice of Allowance for U.S. Appl. No. 12/749,094, dated Oct. 5, 2017 8 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Feb. 29, 2012 11 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Jul. 23, 2012 9 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated May 2, 2014 13 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Sep. 10, 2015 9 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Dec. 21, 2015 10 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Oct. 3, 2016 17 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Dec. 6, 2016 17 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated May 10, 2017 16 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Sep. 12, 2017 26 pages. |
Official Action for U.S. Appl. No. 12/749,123, dated Oct. 11, 2018 29 pages. |
Examiner's Answer to Appeal Brief for U.S. Appl. No. 12/749,123, dated Jan. 30, 2019 36 pages. |
Official Action for U.S. Appl. No. 12/749,150, dated Jun. 13, 2012 11 pages. |
Official Action for U.S. Appl. No. 12/749,150, dated Oct. 24, 2012 10 pages. |
Official Action for U.S. Appl. No. 12/749,150, dated Aug. 13, 2014 11 pages. |
Official Action for U.S. Appl. No. 12/749,150, dated Nov. 21, 2014 10 pages. |
Official Action for U.S. Appl. No. 12/749,150, dated Dec. 15, 2015 10 pages. |
Official Action for U.S. Appl. No. 12/749,150, dated May 17, 2016 17 pages. |
Decision on Appeal for U.S. Appl. No. 12/749,123, dated Dec. 17, 2020 15 pages. |
Official Action for India Patent Application No. 971/MUM/2010, dated Sep. 11, 2018 6 pages. |
Official Action for U.S. Appl. No. 12/749,058, dated Jun. 20, 2019 25 pages. |
Notice of Allowance for U.S. Appl. No. 12/749,058, dated Oct. 8, 2019 6 pages. |
Number | Date | Country | |
---|---|---|---|
20210176204 A1 | Jun 2021 | US |
Number | Date | Country | |
---|---|---|---|
61164753 | Mar 2009 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12749123 | Mar 2010 | US |
Child | 17178040 | US |