TELECOMMUNICATION METHOD AND SYSTEM FOR SIMPLIFYING COMMUNICATION SUCH AS CONFERENCE CALLS
20170339113 · 2017-11-23
Assignee
Inventors
Cpc classification
H04M3/42008
ELECTRICITY
H04L63/0421
ELECTRICITY
H04L12/1859
ELECTRICITY
H04M3/56
ELECTRICITY
H04M3/42382
ELECTRICITY
H04L12/1818
ELECTRICITY
H04L65/403
ELECTRICITY
G06F21/6254
PHYSICS
International classification
H04M3/56
ELECTRICITY
G06F21/62
PHYSICS
Abstract
A method of simplifying electronic communications between a plurality of users by communication implementation and management. Each user has an electronic identifier, which may be of a type, such as a website address, domain, LinkedIn address, etc. Each identifier is unique to each user. The electronic identifier can be changed at any time prior to contact enabling privacy and the method may be effected on a singular telecommunications platform (SIP) or mixed platform (SIP and PSTN) or other voice or text medium for cost efficiency. The system renders communication between users passive and allows for simultaneous and instantaneous communication while maintaining anonymity of the identifiers used.
Claims
1. A method of simplifying electronic communications between a plurality of selected users, each selected user having at least one electronic identifier, comprising: selecting a plurality of users for simultaneous contact from a provided or determined identifier of each user; simultaneously implementing access to said identifier of each selected user of the users in the absence of action from any of said plurality of users based on a predetermined scheduled time; and simultaneously managing any respondent users from accessed identifiers.
2. The method as set forth in claim 1, wherein said users are conference call participants.
3. The method as set forth in claim 1, wherein implementing access includes maintaining anonymity of the electronic identifier of an accessed user.
4. The method as set forth in claim 1, wherein said electronic identifier is selected from the group comprising: a Twitter address, a Facebook address, a Skype address, LinkedIN address, website address, email address, land based phone number, cellular phone number, satellite phone number, domain name, text messaging, short message service (SMS), Smart Messaging, extended message service (EMS), multimedia messaging service (MMS), email, proprietary systems, social media platform and combinations thereof.
5. The method as set forth in claim 1, wherein simultaneous management includes preventing a selected user from access after simultaneous contact has been effected at said predetermined scheduled time.
6. The method as set forth in claim 5, wherein simultaneous management includes optionally granting a selected user access after simultaneous contact has been effected at said predetermined scheduled time.
7. The method as set forth in claim 1, wherein simultaneously managing any respondent users from accessed identifiers is effected using artificial intelligence.
8. The method as set forth in claim 1, wherein said method is effected using PSTN.
9. The method as set forth in claim 1, wherein said method is effected using PSTN and SIP.
10. The method as set forth in claim 1, wherein said method is effected using only SIP.
11. The method as set forth in claim 1, wherein said selected user may change its electronic identifier at any time prior to becoming a respondent user.
12. The method as set forth in claim 1, wherein said predetermined scheduled time is invariable.
13. The method as set forth in claim 1, wherein said predetermined scheduled time is prescribed by a user selecting a plurality of users for simultaneous contact.
14. The method as set forth in claim 1, wherein said predetermined scheduled time is elected by selected users.
15. The method as set forth in claim 1, wherein said method forms a closed communications loop of authorized and electronically anonymous users
16. A method of simplifying electronic communications between a plurality of selected users, each selected user having at least one electronic identifier, comprising: pushing electronic information to a first user; selecting a plurality of users for simultaneous contact from a provided or determined electronic identifier of each user; simultaneously pushing said electronic information a second time by said first user by implementing access to the identifier of each selected user of users in the absence of action from any of the plurality of users; managing any respondent users; and simultaneously forwarding managed responses to said first user.
17. The method as set forth in claim 16, wherein said pushed electronic information comprises advertising material, promotional material, availability information, hours of operation, news.
18. The method a set forth in claim 17, wherein said pushed electronic information is at a locus and secondly pushed electronic information is at loci.
19. The method as set forth in claim 18, further including the step of at least one respondent user simultaneously pushing information to other respondent users.
20. A method of effecting mass electronic communications between a plurality of selected users, each selected user having at least one user changeable electronic identifier, comprising: maintaining electronic identifier anonymity of each selected user within a group of selected users; simultaneously implementing access to the identifier of each selected user of said users in the absence of action from any of said plurality of users based on a predetermined time and on a single or mixed telecommunications platform; and simultaneously managing any respondent users from accessed identifiers.
21. The method as set forth in claim 20, said electronic identifier is selected from the group comprising: a Twitter address, a Facebook address, a Skype address, LinkedIN address, website address, email address, land based phone number, cellular phone number, satellite phone number, domain name, text messaging, short message service (SMS), Smart Messaging, extended message service (EMS), multimedia messaging service (MMS), email, proprietary systems, social media platform and combinations thereof.
22. The method a set forth in claim 20, wherein said telecommunications platform is SIP, PSTN and a combination thereof.
23. The method as set forth in claim 20, wherein said electronic identifier is changeable by a selected user at any time prior to becoming a respondent user.
24. The method as set forth in claim 20, wherein simultaneous management includes preventing a selected user from access after simultaneous contact has been effected at said predetermined scheduled time.
25. The method as set forth in claim 20, wherein simultaneously managing any respondent users from accessed identifiers is effected using artificial intelligence.
26. A system for simplifying electronic communications between a plurality of selected users, each selected user having at least one electronic identifier, comprising: a stateful application for implementing and managing simultaneous contact and communication with said users based on a preselected or predetermined time; a mobile device notification system in communication with said stateful application and said users; and a phone server in communication with said stateful application and said users, whereby said electronic communication is effected absent activity by said users while maintaining privacy of said electronic identifiers.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056] Similar numerals used in the Figures denote similar elements.
[0057] The technology has applicability in the field of telecommunications.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0058] As a preface, details concerning known aspects of the technology incorporated herein will not be repeated. The are countless telephony, PSTN, SIP and trunking references in the known literature. Further, wireless and internet concepts will not be repeated in view of the level of sophistication in these matured areas.
[0059] Referring now to
[0060] Web service 26 is in communication with a stateful application 32 which receives notification of the meeting request. The database 30 is refreshed with contemporary content by communication between server 26, database 30 and stateful application 32. In this manner, when these operations function cohesively any user input from user attendees, which will be elucidated further shortly, can be accepted by the stateful application 32, thus providing leading edge up to the minute data refreshment which is then available for distribution to the users 12, 14 inter alia.
[0061] For connectivity to the phone system, 34, the stateful application 32, once a commonly agreed upon time has been established between users, effects the bridge set up at the time of the meeting and subsequently initiates a call to all users in a simultaneous manner. As will be evident, such an arrangement is most beneficial. There is a minimum amount of input required by the user during establishment of the meeting call and zero effort to participate in the call, since the user is called by the system as opposed to conventional systems which require a user to call the system with the additional requirement to input a code for authorization and then announce his or her presence. On this last point, if simultaneous calling is not provided, the result is that users/attendees join the conference at different times leading to continuous interruptions, difficulty in properly hearing introductions or missing discussion points altogether. It is not uncommon for the initial meeting logistics to waste a significant amount of the apportioned time for the germane and salient points.
[0062] Further, the detriments noted above can be grossly exacerbated by the ill prepared or technically unsophisticated users/attendees. If the meeting requires ancillary material sent in advance to the users for use during the meeting, some users/attendees may not have opened the attachments with a view to ensuring this first can be done and that the attachment is complete and intelligible. Failure to do this occurs regularly and results in further distractions, effectively a suspension of the meeting until the users having difficulty are mitigated. As noted above, this obviously further reduces the apportioned time to the extent that, in some instances, many of the agenda items are left undiscussed thus defeating the objective of the meeting.
[0063] It is important to note that these problems arise from a lack of simultaneous call initiation to the users and further the absence of real time dissemination of ancillary materials to each user during the meeting to thus obviate those who did not prepare, download etc. as well for the technically inexperienced. In lieu of the real time dissemination, the system, at the point of invitation, can ask a user if the materials, where included, have been downloaded as a requirement to proceed with the booking.
[0064] In the instant technology, required effort for the user is significantly reduced and where required is streamlined to the point that maximum efficiency results. This aspect of the technology will now be discussed.
[0065] The relationship between the stateful application 32, database 30 and web server 26 has been established in the discussion previously. Once all of the requisite data has been collected to effect the calls, the stateful application 32 connects with the phone system 34 and disseminates the information to all of the different media of the users. This can be by PSTN 36 to a phone 38, IP to an SIP client 40 by a trunk therefor 42, Skype 44 or any other medium 46 well known in the art.
[0066] The stateful application 32 is linked to users by their devices to be pushed notifications, updates in content, meeting time, etc. These notifications can be sent to the stateful application 32 by the host or moderator 50 for up to the minute dispersion to the users 48.
[0067] The benefits of the simultaneous calling have been enumerated above. However, this feature when linked with the information regulation operation of the stateful application, greatly reduces the amount of responses that would otherwise be required in prior art systems. As an example, by virtue of the fact that all users can be contacted simultaneously, the time for them to respond with agreement or further suggestion is faster. The reduction in responses to further suggested call times is realized with a time box feature. This presents a period interval suggested to users sufficiently lengthy to ensure high probability that all users will be in attendance within the interval. The system then collates all responses, analyzes the information for a common acceptable time and disseminates the information. Clearly, this is more convenient and efficient than having all users have to repeatedly respond to alternate times that are suggested. As will be appreciated, this could be exceeding time consuming where there are a large number of users.
[0068] The users who have selected a time in the time period interval can also initiate a “timeout” within the time box described above.
[0069] Owing to the ubiquitous electronic identifier compatibility, a major feature of the inventive technology herein is vividly comprehensible, namely privacy.
[0070] Where the users can be contacted with other media, key phone numbers, i.e. cell, home, satellite never have to be known to any other user or host/moderator. The system allows the user to provide a suitable identifier it chooses for use as a contact. Fortunately, this feature is enriched by the fact that the system affords the user with the capacity to change the identifier it wishes to use right up until the scheduled time for the contact.
[0071] All identifiers used in the system remain private and may be scrambled by a suitable algorithm well known in the art and stored as such.
[0072] Since the system facilitates such a high degree of security and privacy, use in delicate environments with sensitive information is very desirable. The fact that the user does not have a call in code requirement, eliminates the possibility of unauthorized persons from listening to the subject matter of the call should the call in code be comprised by illicit activity. This coupled with the fact that the user can select the identifier to be used, change it at the last minute and store privately in a scrambled form enforces the robustness of the methodology even in the most demanding environments.
[0073]
[0074] At the start of the communication, stateful application 32 instructs phone server to create a conference bridge. Stateful application 32 sends notifications to all selected users 12, 14 and 16 at 12D, 14D and 16A. For other users (chain line) not subscribed to the method, older media may used for purposes of communication. One example is Skype.
[0075] The next step in the method involves contacting all selected users. This is done via the phone server which is capable of handling SIP and PSTN. As an example, users 12 and 14 are contacted by a SIP line at 12E and 14E, respectively while user 16 is contacted by a PSTN line at 16B. Other users (chain line) can be contacted by older media, such as Skype.
[0076] Referring now to
[0077] In the scenario where the selected attendee accepts 66, then there is nothing left for the attendee to do until such time as an optional reminder is sent to all selected attendees 72 and the user 52 who effected the meeting request initially. The selected attendees respond 74 and if a delay is requested at 76 this is, in turn, conveyed to the user 52 as illustrated. After the response 74 of the selected attendees, if there is no response or an indication of readiness 78, then the system will then wait until the scheduled meeting time 80 before commencing any further activity 82. The further activity effected is to prepare the meeting and dial out to all attendees 84, 86.
[0078] Returning to the declined response 64, in the scenario where the selected attendee does not join the meeting 88, a determination can be made as to whether the meeting is still active. If yes, then the inquiring selected attendee is informed by the call being answered 92 and welcome messages/instructions delivered 94. If the call is not answered, a notification 96 is sent to the selected attendee.
[0079] At the instruction and welcome phase, if the user key attributed to the user has not been detonated, a notification is sent 98. If a negative response to the user key detonation is received, the attendee is call bridged in. If more than one selected attendee is still connected, the system waits for the selected attendee to disconnect 104. In the event that not more than one selected attendee remains connected, then the meeting is marked as complete in the database 58 and the bridge destroyed 106 for call completion 108.
[0080] Returning to the scenario where the meeting is still active 90, the selected user who sent the notification at 96, can query if user responded to the notification 110. In the negative, the selected attendee does nothing further or sends out a message to call at a certain specified point in time.
[0081] Turning now to
[0082] Having the platform technology discussed herein, the consumer 120 who passes within a broadcast zone of, for example, the restaurant, the owner could push promotional information to the consumer encroaching the broadcast area. this could take the form of time limited specials, happy hour information, reservation requirements etc. Further, competing restaurants represented by numerals 124 A, 124B, 124 C, could be accessed by advertising to the consumer based on the preferences gathered from customer interaction with restaurant 124.
[0083] In a similar manner, retailers 126 could participate by announcing time limited sales, giveaways, buy one get one, gift with purchase, etc. Retailers 126 A, 126 B and 126 C all could be accessed for size, color and style availability in the case of garments.
[0084] Turning to the entertainment aspect 128, a passerby of a sports stadium could be pushed up to the minute information on ticket availability for events that evening, upcoming events, current scores, etc. This broadcast could also be linked to theatre ticket availability and opera information, for example, denoted by numeral 128 B.
[0085] In summary, two key aspects for effective electronic communication have been unified to result in modern use of telecommunication technologies. By unifying efficiency in scheduling a communication session with effective contact of the parties for the session, the limitations in existing systems have been eliminated for a more professional and temporally efficient way to communicate.
[0086] From the scheduling point of view, the capacity to accept any medium specified for use by the user with the option for exchange to another medium associated with that user up to the last minute based on schedule requirements definitively provides a high level of privacy and security. This is in marked contrast to the use of call in codes, call in numbers, moderator codes, etc. all of which are easily compromised. In the scheduling protocol of the present invention, the concept of a call in number is moot; electronic identifiers act as a key for the system to contact the user in vastly sophisticated and secure operation.
[0087] The calling facet dovetails with the scheduling protocol to result in a complete system. The calling aspect permits user interaction to reduce the overall amount of transactions that would otherwise occur. Users can delay connection to the call and have a predetermined alert to join or postpone for an additional predetermined period. Unanswered calls for attendance will now be simply redialed without the annoyance of a voicemail announcement. For authorization to participate, the user may have to agree that it has any attachments requisite for the call downloaded and ready for access. This will be augmented by providing the materials as an accessible file during the session. Further, real time information updates will be simulcast with the session, in ticker tape fashion such as persons in attendance, meeting progress, departed users, upcoming agenda items, web links for further information on a selected topic and the possibility to schedule attendance at any future follow up meetings. All of these features are dramatically enhanced on the scheduling platform and the fact that these two are unified and can be simultaneously delivered to all users for cohesive professional meetings.
[0088] With reference now to
[0089] Upon detection of an unauthorized user, he or she is prompted for the PIN, generally denoted by numeral 142 and if the correct PIN is entered and sent 146 to database 134, access is granted 148. If no PIN is entered or is incorrect, the user 136 is terminated 150 from further access.
[0090] At this point, responses 150, 152 and 154 to information sent to each user 136,138 and 140 are collected and analyzed for commonality at 156. Upon completion of the analysis for commonality, a common response 158 is ascertained and disseminated simultaneously to each user 136, 138 and 140. This is a convenient further layer of security for the system which is an advancement in the art. This is exemplary only; the PIN may be discarded or combined with other secure technologies such as biometrics, examples of which have been mentioned herein previously.
[0091] Turning to
[0092] In the event that other selected users 176 and 178 are not responding at T1, but attempt to participate by contacting user 160 at T2, the users 176 and 178 are blocked from participating and granted access at the discretion of user 160.
[0093] For purposes of information dissemination during implementation of the communication, users may be updated with agenda progress, up to the minute details, images, collated information from the users during the communication, etc. by pushed information 180. All, some or none of the users 162 through 170 as well as user 160 may add new information to a database 182 or information may be collected extraneously at 184 via news feeds, web crawling, topic recognition inter alia. This is generally referred to as the management phase 186 and it is predicated upon artificial intelligence.
[0094]
[0095] Numerous iterations of the technology have been set forth herein. The prevailing theme with the instant technology is, however, implementation of mass communication simultaneously and instantly with optional activity by a user for secondary communication. Present systems can effect simultaneous contact with users, but the existing arrangements are essentially scheduling protocols; users still are required to assume an active roll by doing some activity which ultimately has an impact on the effectiveness of existing systems. In contrast, simultaneous and instantaneous communication absent user activity are attributes of call implementation and management. The user remains passive and thus the communication is automatically implemented and managed in an efficient, temporally precise and private environment.
[0096] In summary, numerous features evolve from the technology. Where the system is to provide an election of time for communication, which is then subsequently disseminated, the steps include providing an electronic identifier unique to each user if one is not already attributed and a notification transceiver for communicating with the electronic identifier. Suggested scheduling information may be sent to selected users through the notification transceiver with amalgamation of the responses from the selected users regardless of the type of identifier. From this, a common schedule time is determined and the selected users are simultaneously contacted at the common schedule time.
[0097] The electronic identifier may be a Twitter address, a Facebook address, a Skype address, LinkedIn address, website address, email address, land based phone number, cellular phone number, text message, short message service (SMS), Smart Messaging, extended message service (EMS), multimedia messaging service (MMS), email and combinations thereof.
[0098] As an option non selected user access to the event scheduled before, during and after the common schedule time. Further, reminder advice may be sent to each selected user at a predetermined time in advance of the common schedule time as well as an agenda and concomitant accoutrement requisite for an event associated with the common schedule time.
[0099] Conveniently, updated information and agenda progress can be audibly or visually provided to each selected user prior to and during the common schedule time. The method is operable with mixed media electronic identifiers and over local area network environment (LAN) or a wide area network (WAN).
[0100] In further features, preferential communication can be established between a plurality of users based on the location of said users. As an example, a query may be transmitted from a user at a specific location and the responses amalgamate from the users. The responses are sorted as to which are preferential and the user is automatically contacted at the location only with preferential responses at the location.
[0101] The query may be based on goods and service information at or immediately proximate the location of the user initiating the query.
[0102] The preferential responses, if unavailable, cue the next most desirable response to be communicated to the user from the preferential responses. As a further step, the preferential responses could be converted with a subscription agreement for using the methodology and payment of fees. As examples, the preferential responses include website, social media information and general contact information which are automatically stored in the appropriate locations in the mobile device of said user with the query.