Abstract: A method of using an entertainment system can allow a plurality of different options to be presented to a user of the entertainment system when an incoming phone call is detected. The user can choose an option, and the entertainment system can be configured to take appropriate action based on the option selected. Such a method allows the user of the entertainment system to make a real-time disposition of the incoming phone call, rather than relying solely on a predetermined set of configurations. In one embodiment, an apparatus and handset can be used in carrying out the method. In another embodiment, a handset for use with the entertainment system can be a remote control that includes telephone control features, or the handset can be used with VoIP connections.
Type:
Application
Filed:
March 30, 2005
Publication date:
October 12, 2006
Applicant:
SBC Knowledge Ventures, LP
Inventors:
Miles Pierce, Philip Kortum, Theodore Pasquale
Abstract: Method and system of alerting callers of surcharges associated with making phone calls. The method and system relating to calls made between affiliated and non-affiliated providers wherein the surcharges are fees incurred in service calls therebetween. The fees may be flat-rate fees or other per phone call fees which are independent of call length, duration, etc. The fees may be charged by the non-affiliated provider and/or fees incurred by the affiliate provider in servicing such calls.
Type:
Application
Filed:
April 12, 2005
Publication date:
October 12, 2006
Applicant:
SBC Knowledge Ventures, L.P.
Inventors:
Carol Gruchala, Wayne Heinmiller, Dianna Tiliks
Abstract: In one embodiment according to the invention, there is disclosed a method for providing a missed calls log. The method comprises, in a messaging service that communicates with a telephony network, creating a missed calls log of call context information for calls forwarded to the messaging service from the telephony network.
Abstract: A survey system (102) interfaced with one or more service centers (108A-N) has a memory (102B), and a processor (102A). The processor is programmed to intercept (202) a calling party prior to the calling party accessing a service center, inform the calling party of a survey request, receive (208) from the calling party acceptance or rejection of the survey request, transfer (206) the calling party to the service center, and engage (214) the calling party in a survey after the calling party completes one or more tasks at the service center so long as said calling party chose to accept the survey request.
Abstract: A method of using a packet-switched network can be used to deliver broadcast messages using a VoIP connection. Packets within the broadcast message can be intelligently routed to intended recipients based on one or more addresses for a logical segment of an organization (e.g., employees of a department), a physical segment (e.g., a building, floor of a building, meeting room, etc.), individuals, or any combination thereof. The broadcast message may be heard by a significantly higher fraction of intended recipients compared to all recipients because the routing of packets of the packet-switched network can reduce the number of unintended recipients as would occur when using a conventional analog public address system. Also, existing infrastructure can be used and does not require speaker wires to pass through walls or ceilings.
Abstract: A computer-readable storage medium (102) is provided for managing end-to-end QoS (Quality of Service) policies in a communication network (100). The storage medium includes computer instructions for establishing (302) a plurality of QoS domains (108) between a plurality of packet switching technologies (102, 106. 110) operating with disparate QoS policies, each QoS domain having an ingress and egress boundary, remapping (303) a QoS policy of each packet exchanged between the ingress boundaries of the plurality of QoS domains, and restoring (309) the QoS policy of each packet exchanged between the egress boundaries of the plurality of QoS domains.
Abstract: An anti-phishing method comprises monitoring a plurality of logins into a computer system over a period of time, and generating a phishing alert signal based on an aggregate characteristic of the plurality of logins.
Abstract: A message composed by a user using a computer is stored in a computer-readable medium. The message is associated with a distribution list of one or more intended recipients of the message, and an identifier to trigger sending of the message to the one or more intended recipients on the distribution list. An SMS message is received in an inbox of the computer. The SMS message is composed using an SMS-capable wireless device, and has a user-entered header. The user-entered header matching the identifier triggers sending of the message to the one or more intended recipients on the distribution list.
Abstract: The application discloses a system and a method of selecting a profile of a digital subscriber line. In a particular embodiment, the method includes setting a threshold for voice quality and determining a number of acceptable code violations that can occur without compromising the voice quality of the digital subscriber line. When the actual number of code violations exceeds the determined number of code violations an alternate profile is selected for the DSL line.
Abstract: A system and method for processing e-mail is provided wherein an e-mail is received from an originator or a customer, a routing destination is determined and responses to the e-mail are retrieved from a library based on the selected routing destination. Customer data is then accessed and the responses are filtered based on customer information that is extrinsic to the e-mail. An agent can select a response from the list of filtered responses and the selected response can be sent to the originator.
Type:
Application
Filed:
March 31, 2005
Publication date:
October 5, 2006
Applicant:
SBC Knowledge Ventures, L.P.
Inventors:
David Findley, Karthik Kannan, Srinivas Cherukuri, Robert Meyer, Amy Hicks, Benjamin Droney, Ying Ma
Abstract: In one embodiment according to the invention, there is disclosed a method for providing a visual display element for a graphical browser interface. The method comprises setting a background color for a region of the graphical browser interface; and providing a visual display element overlaying the background color, wherein the visual display element provides a visual effect of having the same color as the background color, independent of changes to the background color.
Abstract: A distributed computer system is disclosed and includes a plurality of identity provider servers and a plurality of service provider servers coupled to a data network. Further, an identity provider locator server is coupled to the data network. In response to a request from one of the plurality of service provider servers, the identity provider locator server can provide an identifier of at least one of the plurality of identity provider servers. The identity provider locator server can include a memory that stores a list of active identity provider servers for a particular end-user having access to the data network. Further, one or more of the plurality of identity provider servers is able to add or remove itself from the list of active identity provider servers.
Abstract: A system and method are disclosed for automating network performance to a customer support department that includes a passive listening device configured to monitor portions of a communication network. A performance database may be coupled to the passive listening device and configured to store network performance data. A customer relations module may be included and configured to receive a subscriber inquiry and to identify at least one monitored component of a communication network that affects the subscriber. The module may retrieve performance data on one or more components of the communication network to provide customer-specific communication performance data to the subscriber and/or the agent assisting the subscriber.
Type:
Application
Filed:
March 22, 2005
Publication date:
September 28, 2006
Applicant:
SBC Knowledge Ventures, L.P.
Inventors:
Kirk Mahoney, Lona Dallessandro, James Britt, Douglas Bruun, Rosalinda Garcia, Jonathan Paden, Ellen Pate, Kristina Robinson, Tom Wiatt
Abstract: The present disclosure provides a system and method configured to provide migration of messaging services. A messaging service is supported by a plurality of service platforms such as a first and a second platform. A request is received from a user to access the network service, and the request comprises identification information associated with the requesting entity, such as an originally requested/dialed telephone number. A migration table is referenced to determine if the requested number is under migration. If the number is not under migration normal routing occurs. If the number is under migration, a customer location database is accessed, routing information is retrieved from the custom-location database, and the new location of the mailbox is provided to routing equipment.
Abstract: A system and method for providing a portal view of a trusted application to a user over a communication network is discussed. The portal view can be generated from at least one of the services linked to the application according to a trust model in which trust is extended to the application from the user. When the application provides single sign-on capabilities, those services that are linked to the application can then be logged into simultaneously when the user logs into only one of the services. The trusted application is opaque to those services not linked to the application. The portal view provides a means for linking and de-linking services.
Abstract: A system and method of networking with configurable data mapping is disclosed. Data mapping can be utilized to match data transmission types with devices that can efficiently utilize the data transmission type. In one configuration, the data mapping teachings disclosed herein may be utilized to increase the processing efficiency of a home network and insure correct programming is allowed to pass to the correct device by applying a set of data transmission rules to data transmissions between a residential gateway and it's clients. An exemplary method may include receiving a communication at a residential gateway from a client and identifying the client or the source of the transmission. The client may be identified by recognizing one or more of a data transmission type, a client identifier embedded in the transmission, and an identification of a network device hosting the client. The identification may, in some cases, be made automatically upon reception of a data transmission.
Abstract: The present disclosure provides a system and method configured to establish a connection with a party at an interactive voice response (IVR) system and provide a plurality of virtual agents associated with virtual departments based on a current stage within the process. A caller or party can be prompted with a first virtual agent when addressing content related to a first virtual department and prompted by a second virtual agent when addressing content related to a second virtual department.
Abstract: Call logs are generated based upon calls from a subscriber line and calls to a subscriber line. The call logs are formatted from Generic Data Interface (GDI) messages into an email format (e.g., SMTP) within a call log gateway. The formatted email is then emailed to an email recipient, which can include a messaging service provider or the subscriber himself. The email address to the recipient is determined by the call log gateway based upon the subscriber's identity.
Type:
Application
Filed:
March 22, 2005
Publication date:
September 28, 2006
Applicant:
SBC Knowledge Ventures, L.P.
Inventors:
Carol Gruchala, Richard Ebel, Kenneth Stroud, James Doherty, Larry Pearson
Abstract: A method for preprocessing transaction records indicative of subscriber activity on a telecommunication network for subsequent downstream processing is provided. The method includes receiving a file including a plurality of transaction records each having a plurality of fields, wherein each field contains at least one character. The characters of selected fields, or all fields, are analyzed to determine whether each of the characters is of a desired format. When any one of the characters is of an improper format, a first flag is set to indicate the existence of an erroneous character within the selected field of the transaction record. Each of the plurality of transaction records are also analyzed to determine whether each transaction record is within a desired category of transaction records. When any one of the plurality of transaction records within a file is not within the desired category of transaction records, a second flag is set to indicate an erroneous transaction record within the file.
Abstract: The disclosure is directed to an enterprise system including a message topic, a monitor definition, a monitoring manager, and an alert topic. The message topic includes a message associated with performance of a distributed computing application. The monitor definition includes performance rules for evaluating data associated with the message associated with the distributed computing application. The monitor definition is associated with a role. The monitoring manager is configured to access the message topic. The alert topic is configured to receive an alert message from the monitoring manager. The monitoring manager provides the alert message in accordance with the monitor definition. The alert message is accessible to a user associated with the role.
Type:
Application
Filed:
March 16, 2005
Publication date:
September 21, 2006
Applicant:
SBC Knowledge Ventures, L.P.
Inventors:
Robert Gulledge, Brian Bearden, Gary Dunn, Michael Khalili