System and method for managing trusted relationships in communication sessions using a graphical metaphor

ABSTRACT

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for linking participants in a communication session. The method includes presenting a set of connected graphical elements on a graphical user interface (GUI) representing a structure of the communication session and a trusted relationship between a first participant and a second participant in the communication session, establishing a bidirectional link between the first participant and the second participant, wherein the communication device exchanges trusted information between the first participant and the second participant, and displaying a depiction of the bidirectional link to at least one participant in the communication session. The method optionally includes negotiating a calendar event with the second participant via the bidirectional link based on the trusted information. Graphical elements associated with the first and second participants can depict one or more of presence, context, and persona information.

RELATED APPLICATIONS

This application claims priority to U.S. Provisional Application No. 61/164,753, files 30 Mar. 2009, which is incorporated herein by reference in its entirety.

This application is related to Attorney Docket Numbers 509022-US1 (application Ser. No. ______), 509022-US2 (application Ser. No. ______), 509022-US3 (application Ser. No. ______), 509022-US5 (application Ser. No. ______), 509048-US (application Ser. No. ______), 509049-US (application Ser. No. ______), and 509098-US (application Ser. No. ______), filed on Mar. 29, 2010, each of which is herein incorporated by reference.

BACKGROUND 1. Technical Field

The present disclosure relates to telecommunications and more specifically to managing a communication session via a graphical user interface (GUI) with respect to trusted relationships of those participating in the communication session. Communication sessions can exist in a variety of modes such as telephone calls, communication sessions, instant messaging sessions, email sessions, video conference sessions, multi-media sessions, and the like.

2. Introduction

Touchtone telephones have been supplemented over the years by the addition of feature buttons and menus. Interfaces for these features have evolved from simple buttons to hierarchical menus actuated by trackballs, quadrant style pointers, and the like. As the number of features increases, the interfaces add more buttons, sequences, and/or combination of button presses. This proliferation of features has led to a multitude of different interfaces with varying levels of complexity. Often users resort to rote memorization of key features, but that is not always practical or desirable. Recently, smartphones with touch-sensitive displays have begun to provide similar functionality. However, the touch-sensitive displays in such devices typically reproduce the feature buttons and menus, albeit on a touch-sensitive display.

Further, users are migrating to other communication forms, such as text messaging, instant messaging, email, chat sessions, video conferencing, and so forth. Incorporating the ability to handle these modes of communication into a traditional telephone increases the complexity and difficulty manyfold. What is needed in the art is a more intuitive communication management interface.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:

FIG. 1 illustrates an example system embodiment;

FIG. 2A illustrates an initial view not having any communication sessions;

FIG. 2B illustrates a view of an incoming communication session;

FIG. 2C illustrates an initial view after accepting the incoming communication session;

FIG. 2D illustrates a view of the communication session after adding a third party;

FIG. 3 illustrates a network view of the communication session;

FIG. 4 illustrates a second view of the communication session;

FIG. 5 illustrates a third view of the communication session with other concurrent communication sessions;

FIG. 6 illustrates a communication session having users with a trusted relationship;

FIG. 7 illustrates a first example method embodiment; and

FIG. 8 illustrates a second example method embodiment.

DETAILED DESCRIPTION

Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure.

The present disclosure addresses the need in the art for improved communication session management and sharing of trusted resources within a communication session. A companion case (Attorney Docket Number 509022US1; 069-0011US1) discloses a graphical interface which enables a user to setup a communication session with various users and tear down or remove users from a communication session. A system and method are disclosed which displays on a graphical user interface a set of graphical connected elements representing a structure of a particular communication session or group of communication sessions for a user. A brief introductory description with reference to FIGS. 2A-D will be provided, followed by a discussion of a basic general purpose system in FIG. 1 which can be employed to practice the concepts disclosed herein and more detailed descriptions of methods and graphical interfaces.

Presenting the graphical interface of FIGS. 2A-2D, which illustrates the communication session, enables the system to receive via the interface user input, which can include multimodal user input, to manage the communication session and trusted relationships within the communication session or sessions. For example, a user on a conference call can drag and drop or otherwise move a trusted icon onto individuals the devices of which the system establishes or has previously established a trusted relationship. The system receives that input and automatically contacts the appropriate device and negotiates or invokes a trusted relationship and other details related to the trusted relationship. Graphical metaphors such as a visual depiction of links, shapes, colors, icons and so forth can provide individual user views with a depiction of the level of trust in the bidirectional link(s) between other participants in a communication session. For example, a thick link between the user and one participant can represent that all trusted information is communicated between the two parties. Such information can include personal phone numbers and email addresses, personal calendar information such as weekend schedules, social security numbers or bank account numbers, and so forth. A thin line or a red line may indicate an untrusted relationship in which only public information such as a business phone number and business email address will be shared. An orange link or medium thickness line can represent a mid-level trusting arrangement in which only business contact information and business hours-based calendar information are shared. The description of how this trusted relationship is managed is primarily discussed below with reference to FIGS. 6 and 7.

The communication session is also agnostic with respect to the mode of communication. The same metaphor of a connected user in a communication session being displayed on the graphical interface can represent a called/calling user, an instant messaging (IM) user, an email user, a user connecting via video conferencing, multimedia, web conferencing, and so forth. For example, from the context shown in FIG. 2A, the user can select a contact and then use the same type of user input (drag and drop, flicking, gestures, etc.) to initiate any of the communication modes with that person. The user does not have to know or learn different input mechanisms for different communication modes.

The presentation of the graphical elements in connection with participants in a session, how they are connected and how the user interacts with the elements all vary depending on the needs and current active context of the communication session. For example, elements associated with participants in a session can include text, titles, positions, or any other data about each user. The connection metaphor between users can also represent information such as the type of connection (phone, video, web conference, etc), the quality of the connection (low-band, high-band, etc.), a hierarchy of how participants are related to the primary user (friend, associate, acquaintance, un-trusted user, etc.), a status of the connection (active, inactive, on-hold, etc.), and so forth. These variations shall be discussed herein as the various embodiments are set forth. The disclosure now turns to FIG. 1.

With reference to FIG. 1, an exemplary system 100 includes a general-purpose computing device 100, including a processing unit (CPU or processor) 120 and a system bus 110 that couples various system components including the system memory 130 such as read only memory (ROM) 140 and random access memory (RAM) 150 to the processor 120. The system 100 can include a cache 122 of high speed memory connected directly with, in close proximity to, or integrated as part of the processor 120. The system 100 copies data from the memory 130 and/or the storage device 160 to the cache 122 for quick access by the processor 120. In this way, the cache 122 provides a performance boost that avoids processor 120 delays while waiting for data. These and other modules can be configured to control the processor 120 to perform various actions. Other system memory 130 may be available for use as well. The memory 130 can include multiple different types of memory with different performance characteristics. It can be appreciated that the disclosure may operate on a computing device 100 with more than one processor 120 or on a group or cluster of computing devices networked together to provide greater processing capability. The processor 120 can include any general purpose processor and a hardware module or software module, such as module 1 162, module 2 164, and module 3 166 stored in storage device 160, configured to control the processor 120 as well as a special-purpose processor where software instructions are incorporated into the actual processor design. The processor 120 may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric.

The system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 140 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 100, such as during start-up. The computing device 100 further includes storage devices 160 such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive or the like. The storage device 160 can include software modules 162, 164, 166 for controlling the processor 120. Other hardware or software modules are contemplated. The storage device 160 is connected to the system bus 110 by a drive interface. The drives and the associated computer readable storage media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computing device 100. In one aspect, a hardware module that performs a particular function includes the software component stored in a non-transitory computer-readable medium in connection with the necessary hardware components, such as the processor 120, bus 110, display 170, and so forth, to carry out the function. The basic components are known to those of skill in the art and appropriate variations are contemplated depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server.

Although the exemplary embodiment described herein employs the hard disk 160, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks, cartridges, random access memories (RAMs) 150, read only memory (ROM) 140, a cable or wireless signal containing a bit stream and the like, may also be used in the exemplary operating environment. Non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.

To enable user interaction with the computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art. If the device includes a graphical display which also receives touch sensitive input, the input device 190 and the output device 170 can be essentially the same element or display. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100. The communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.

For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 120. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 120, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in FIG. 1 may be provided by a single shared processor or multiple processors. (Use of the term “processor” should not be construed to refer exclusively to hardware capable of executing software.) Illustrative embodiments may include microprocessor and/or digital signal processor (DSP) hardware, read-only memory (ROM) 140 for storing software performing the operations discussed below, and random access memory (RAM) 150 for storing results. Very large scale integration (VLSI) hardware embodiments, as well as custom VLSI circuitry in combination with a general purpose DSP circuit, may also be provided.

The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 100 shown in FIG. 1 can practice all or part of the recited methods, can be a part of the recited systems, and/or can operate according to instructions in the recited non-transitory computer-readable storage media. Such logical operations can be implemented as modules configured to control the processor 120 to perform particular functions according to the programming of the module. For example, FIG. 1 illustrates three modules Mod1 162, Mod2 164 and Mod3 166 which are modules configured to control the processor 120. These modules may be stored on the storage device 160 and loaded into RAM 150 or memory 130 at runtime or may be stored as would be known in the art in other computer-readable memory locations.

Having briefly discussed the exemplary system embodiment, the disclosure now turns to FIGS. 2A, 2B, 2C, and 2D and other graphical views of an interface for managing communication sessions. A system 100, such as the one described in FIG. 1, can be configured to display a graphical user interface 200, such as the one described in FIGS. 2A-2D, and receive input for manipulating and managing the communication session. In one aspect, the system 100 interacts with a communications device, such as a telephone, instant messenger, personal or mobile computer, or email device to manage the communication session. For example, a user may have a desktop telephone that is in communication with a computing device which can interface with the telephone and present a display such as that shown in FIGS. 2A-2D to manage communication sessions using the telephone.

FIG. 2A illustrates a display 200 of an initial graphical view without any communication sessions. The display 200 can include a series of icons 208, 210, 212, 214, 216, 220, and a contacts list 218 for initiating a communication session or interacting with an incoming communication session, for example The series of FIGS. 2A-2D shall illustrate communication session management features such as setup and teardown of communication sessions, adding and removing participants from sessions, and so forth from the initial state shown in FIG. 2A.

As shall be discussed, from the context of FIG. 2A, the user can identify a person to contact, and then initiate any type of communication using the same mode to initiate any other type of communication. The system is agnostic in this respect. A drag and drop, gesture, tapping or any input mode described herein can be used to initiate and establish a phone call, teleconference with a group of individuals, an IM or email session, and so forth. Various examples of different inputs will be described in connection with the utility icons 208, 210, 212, 214, 216, 220 but any input mode can be applied to engage any utility.

FIG. 2B illustrates a view of an incoming communication session 201. The incoming communication session 201 can be any type of session such as an incoming phone call, incoming instant message, incoming text message, incoming request for a web conference or, in this case, an incoming video conference. The incoming communication session 201 shows an icon 206 representing the requester, Karl. The icon 206 can include sub-parts such as a name/title 206 a and a communication modality icon 206 b, among others. The user can interact with the incoming communication session 201, for example, by clicking and dragging a modality icon onto the incoming communication session 201 to accept the incoming video conference request from Karl 206. In this example, the user clicks and drags 250 the icon for the telephone modality 208. The user can select a different icon. The user can also provide other types of input to interact with communication sessions, such as tapping an icon via a touch screen or stylus, a flicking gesture, mouse clicks/movements, speech input, keyboard input, swipes or taps on a touch-sensitive surface, touchless gestures, and/or any other combination of suitable user input. In the case of touch, for example, taps of different duration or pressure can perform different actions. User input can include mouse movement, clicks, right clicks, double clicks, dragging, flicking, hovering, gestures, and so forth. The device can be shaken or tilted to receive accelerometer input, or positional/orientation input that indicates certain actions. Actions generally relate to connecting a utility icon with one ore more entities to perform functions such as ignore, send a message, accept an incoming call, create a communication session, remove a person from a session, and so forth.

Although FIG. 2B illustrates an incoming communication session 201, the user can initiate communication sessions in a number of other ways. For example, the user can drag a contact from a list of contacts 218 onto one of the communication modality icons 208, 210, 212, 214, 216. The user can also scroll through the list of contacts 218 to locate and select a contact 204 having an identifier 204 a or group of desired contacts, then double-click or tap on the selected group to initiate a communication session. The identifier 204 a can also include a graphic or icon showing available modes of communication for that contact (IM only), presence information (in their office but on a call) or scheduling information (such as the person is/is not available but has an opening in 1 hour). Information in a graphical form can also include local time, a time in the time zone of the host of the communication session, and/or biological time. Biological time can be an aspect of context. For example, a person who is acclimated to the Pacific time zone but who is currently located in the Eastern time zone may accept telephone call communication sessions at 10:00 p.m. local time even though others in the Eastern time zone may not. This information can help the user know whether to seek a communication with that contact. Such information can also be presented in connection with any icon or graphic representing an entity in a communication session. Other user interface variations can be used in addition to or in place of these examples.

FIG. 2C illustrates a view after the user accepts the incoming communication session 201. In addition to the icon for Karl 206, the user's own icon 202 (the example user being Frank Grimes) appears in the communication session 201 as an icon 202 connected to Karl 206. Franks's icon 202 is optional and can include sub-parts such as a name/title 202 a and a communication modality icon 202 b. In this case, because the user responded to the incoming request with the telephone icon 208, Frank 202 communicates with Karl 206 in the communication session 201 via telephone, indicated by the smaller telephone icon 202 b. Karl's icon 206 includes a video icon 206 b which can represent video conferencing capability. Assume Frank 202 then wishes to add Max Power 204 from a list of contacts 218 to the communication session 201. The user 202 clicks and drags 252 Max Power's icon 204 directly from the list of contacts 218 and drops it on the communication session 201. The system 100 adds Max Power to the communication session as shown in FIG. 2D.

The system 100 can provide an interface to the user such that the user can use multiple different connection metaphors to establish or manipulate communication sessions. For example, the system 100 can display participant icons on the screen, show interconnections between participants and allow the user to place mode icons on each interconnection to establish the session. The system 100 can allow the user to position participant icons on the screen, select a mode and hit a button such as “go” or “connect”. The system 100 can place participant icons on the screen, overlay communication mode icons on each participant icon and allow the user to hit “go” or “connect”. These interface options are exemplary. The actual interface can be implemented in any of a number of variations.

In one aspect, participants join the communication session 201 via a telephone call. However, the communication session 201 is neutral with respect to various communication modalities and treats each the same even as users seek to join a call or other communication session.

In another aspect, the system 100 integrates the functions of one or more communications device. In this case, the display 200 shown in FIG. 2D may represent a computing device 100 (such as is generally shown in FIG. 1) that includes a microphone and speakers as well as a display. Such a device could act both as (1) a simple telephone to communicate via a telephone call the user's voice to another caller or a communication session and/or (2) a communication session management system for displaying an image representing the various parties or entities involved in the session and receive instructions to add or remove individuals and other wise manage the variety of parameters that are associated with a communication session 200.

The system 100 receives input via a physical or on-screen keyboard, mouse, stylus, touch screen, speech command, and/or single-touch or multi-touch gestures. Before a communication session is established, the system 100 can show a home screen where the graphical elements representing communications utilities such as 208, 210, 212, 214, 216 and 220 are shown. In one variation, the system 100 displays a summary or welcome page showing a short summary of news, messages, contacts, upcoming calendar events, and/or configuration options. In yet another variation, the system 100 displays a default input mechanism, such as a ten-key numeric pad for dialing telephone numbers.

The display 200 shows a communication session 201 of three connected graphical elements or entities 202, 204, 206. The set of graphical elements can include images, caricatures, avatars, text, and/or a hyperlink to additional information related to a user associated with the graphical elements. Any combination of graphical data can be presented to provide information about individual users, a connection mode, status, presence, other mode capabilities, and so forth. The text can include a name, a title, a position, a bio, a telephone number, email address, a current status, presence information, and location. The system can change or animate the graphical elements based on a contacted party context, persona, presence, and/or other factors. For example, an element may show an avatar or the person's face but show their eyes closed. This can mean that the person is not actively on the call or paying attention to the call. The avatar may show the person looking away or to the side or can show the person shaded or in some other graphical representation that they are not actively on the call, or that they have muted the call, on a sidebar and so forth. Active connections to the communication session can be visually represented as a graphical connection metaphor having overlapping graphical elements, a line connecting graphical elements, a shape connecting graphical elements, a shape with radiating lines connecting graphical elements, and/or a common augmented appearance of graphical elements. Overlapping or otherwise grouping graphical elements can represent individuals at one location. In such a case, information about the location can also be provided. Further, changing color, thickness, animation, texture, and/or length of graphical elements can indicate a relationship or status of entities represented by the graphical elements.

The displayed communication session 201 in FIG. 2D represents a real-time communication of entities in a session. In this example, the real-time communication is a three-way communication session 201 between Frank Grimes 202, Max Power 204, and Karl 206, shown by connecting lines between their respective icons 202, 204, 206. It is assumed in FIGS. 2A-2D that Frank 202 is viewing this particular screen and is the host or manager of the communication session 201. Thus, the display 200 is the graphical display the system presents to him. Later figures will show the same communication session from the points of view of the other participants.

The call setup or communication session set up procedure shall be discussed next. In order to establish a communication session 201, the user can drag and drop a contact from a list of contacts 218 or from some other selection mechanism into the blank area or some designated spot such as over a the element 202 representing Frank Grimes. Each participant in the communication session 201 or contact in a list of contacts can have multiple associated addresses, phone numbers, or points of contact, such as a work phone, home phone, mobile phone, work email, home email, AIM address, social networking address such as a Facebook chat address, and the like. Each participant may also have an icon 202 b, 204 b, 206 b or a qualifier that indicates not only the party but the contact mode. At this stage, a telephone number to be called or other communication address for alternate modes needs to be identified. The system can present an interface or menu which enables the user to enter via a keypad of any type a phone number to dial or to select a number for the user from a listing of numbers, or type in an email address for example if the user only can be reached by email. The system may only have one phone number for the selected contact and automatically dial that number. The system may also automatically select from available numbers based on any criteria such as previous history, presence information, etc. FIG. 2D illustrates the stage in the process in which the user Frank Grimes 202 has created a communication session with both Max Power 204 and Karl 206 as shown and described in FIGS. 2A, 2B, and 2C.

The communication session 201 is not limited to a telephone call. The interface 200 enables the management of any communication session mode. When the user initiates a call, instant message, text message, videoconference, or the like with another user, the system 100 establishes a connection to the other party and displays a graphical representation of the communication session with the other party on the screen. The user can then add additional parties to the communication session in a similar manner. The user can remove participants from a communication session by dragging their element to a trash can icon 220, providing a flicking motion, clicking an X associated with that participant, highlight a participant and shaking the device, if it is mobile with accelerometer capability or click a physical or graphical disconnect button. In one aspect where the communication session is via telephone, the system 100 removes participants from the communication session when the user hangs up the telephone receiver. As participants leave the communication session 201, the system 100 removes their icon from the graphical representation of the communication session. As can be appreciated, adding and removing individual participants to and from the communication session occurs via the same drag and drop or other user input.

The graphical elements in FIGS. 2A-2D are icons, but can also include images, text, video, animations, sound, caricatures, and/or avatars. Users can personalize their own graphical elements or feed a live stream of images from a camera or video camera, for example. In addition, the graphical elements can have an associated string of text 202 a, 204 a, 206 a. The string of text can include a name, a title, a position, a telephone number, email address, a current status, presence information, location, and/or any other available information. The string of text can be separate from but associated with the graphical element, as shown in FIGS. 2A-2D. Alternatively, the system 100 can overlay the string of text on top of the graphical element or integrate the text as part of the graphical element. All or part of the text and/or the graphical elements can be hyperlinks to additional information related to the user associated with the text or graphical elements, such as a blog or micro blog, email address, presence information, and so forth.

The system 100 can include for each icon 202, 204, 206 a respective graphical sub-element 202 b, 204 b, 206 b that indicates the communication mode for each participant. For example, Max Power 204 is participating via an instant messaging (IM) client 204 b; Frank Grimes 202 is participating via telephone 202 b; Karl 206 is participating via a video conference client 206 b. The system 100 is mode-neutral, meaning that the system 100 treats each mode of communication the same, such as telephone, cellular phone, voice over IP (VoIP), instant messaging, e-mail, text messaging, and video conferencing. As a user changes from one mode to another, the sub-elements can change accordingly. For example, if Frank Grimes 202 changes from a landline to a cellular phone mid-conference, the telephone icon 202 b can change to a mobile phone icon.

Inasmuch as the system enables users to communicate in a session in different modes, the system can also modify the modes to align them in the session. Instant messages can be converted to speech and spoken in the teleconference from Max Power and speech can also be converted to text and transmitted to Max Power 204 for effective communication across modes.

The graphical elements can also convey information about the communication session by changing type, size, color, border, brightness, position, and so forth. The lines, for example, can convey relationships between participants. A user can manually trigger the changes for his or her own icon or others' icons, or the system 100 can detect change events and change the graphical elements accordingly. Change events can be based on a contacted party, context, persona, and/or presence. For example, as one person is talking, the system 100 can enlarge the icon representing that person. As another example, the system 100 can track how much each person in the communication session is talking and move graphical elements up and down based on a total talk time in the communication session.

In another variation, the system 100 modifies the links connecting the graphical elements 202, 204, 206 by changing their thickness, length, color, style, and/or animating the links. These modifications can represent a currently talking party, shared resources, an active communication session status, a held communication session status, a muted communication session status, a pending communication session status, a connecting communication session status, a multi-party line, a sidebar conversation, a monitored transfer, an unmonitored transfer, selective forwarding, selective breakup of the communication session into multiple communication sessions, and so forth. In this manner, the user can obtain knowledge about the status of the session, the types of communications that are occurring, and other important details about the communication session.

In one aspect, a user provides input such as a gesture (such as drag and drop, tap and drag with a touch screen or performs any other instructive user input) to manipulate and manage the communication session. For example, the user can click a call icon 208, a video conference icon 210, an IM icon 212, an icon button 214, or a social media icon 216 to invite another user to join the communication session. A user can drag these icons and drop them on a contact or on a participant in a current communication session. For example, if an incoming communication session is in one modality (IM 212 for example), the user can drag the call icon 208 onto the incoming communication session to accept the incoming communication session but transcode it from IM to a call.

Some basic examples of how a user can interact with such icons are provided below. The disclosure will step through example uses of each utility icon 208, 210, 212, 214, 216 and 220. The first example will illustrate use of the calling icon 208. Assume the users Karl 206 and Frank 202 are shown as in FIG. 2C in a communication session but that it is via email and not a phone call. Frank 202 could desire to simply talk on the phone. In this case, Frank 202 could provide instructive input such as double tapping on the call icon 208 which would instruct the system to recognize a communication session exists but that a new mode of communication is requested for that session. A telephone call is then established between Frank 202 and Karl 206 and optionally graphically illustrated on the screen 200 with phone icons such as 202 b.

An example of the use of the video icon 210 is presented next in the context of the initial display shown in FIG. 2A. Frank 202 taps and holds with one finger on the video icon 210 and simultaneously taps on the icon for Max Power 204 in the list of contacts 218. The system 100 recognizes the two inputs and interprets them as a request to initiate a video conference communication session with Max Power 204. The system 100 can retrieve presence information for Max Power 204 to determine if Max Power 204 can accept a video conference communication. Information 204 a can indicate that Max has video conference capability and is currently available. If so, the system 100 establishes a communication session via video between Max 204 and Frank 202 and updates the display 200 accordingly. If not, the system 100 can ask Frank 202 if he desires to select another communication modality. Frank 202 can then tap on one or more available utility icons.

An example use of the IM icon 212 is presented next in the context of FIG. 2D. Frank 202 drags Karl 206, who is already a participant in an existing communication session, onto the IM icon 212 to establish an IM sidebar with that participant. The system 100 creates an additional communication session between Frank 202 and Karl 206 via IM that is separate from but concurrent with the main communication session 201. The system 100 can optionally show a representation of the IM sidebar between Frank 202 and Karl 206 to Max Power 204.

In an example use of the email icon 214 also in the context of FIG. 2D, Frank 202 can swipe three fingers over the email icon 214 on a touch screen to send a mass email to all or a portion of the participants in current communication sessions. The system 100 can identify all participants represented in the display 200 and retrieve available email addresses for those participants. If some participants do not have an available email address, the system 100 can intelligently select a suitable replacement, such as IM or SMS based on availability in general or current presence information or a current mode. After or while the system 100 is gathering all the email address information, Frank 202 can enter a message in a popup window and click send. The system 100 then sends the message to the intended recipients.

The social networking icon 216 is discussed in the context of FIG. 2D. Frank 202 double taps on the social networking icon 216. In one variation, the system 100 visually identifies which participants are not part of Frank's social network. Frank 202 can then click or tap on the visually identified participants to quickly add them to a social network such as LinkedIn or Facebook. In another variation, when Frank 202 taps once on a social networking icon 216 and once elsewhere, the system 100 can post on a social network data related to the location of the second tap, such as an audio clip, a document, a video file, a link, text, an image, or any other data. Social media include web sites such as Facebook, Twitter, LinkedIn, MySpace, and so forth.

The user can interact with the trash icon 220 by flicking participant icons in the general direction of the trash icon 220, drawing an X over a participant icon or over an entire communication session, shaking the device if the device is mobile or via other instructive input. The system 100 can terminate a communication session, delete a contact, remove a participant from a communication session, or take other actions based on the user interaction associated with the trash icon 220. Of course the trash icon 220 can take any other graphical image which reflects that a person or entity is leaving a communication session, such as door or a window. For example, a window or door can be on the display screen and the host can remove an entity from a communication session by moving the respective icon to the window or door. As can be appreciated, user interaction with a utility icon and at least one entity in a communication session can take many forms as discussed above. Each example interaction can be applied to other utility icons in a similar manner.

A user can also initiate a communication session by dragging and dropping an appropriate icon onto a contact. Alternatively, the user can browse through a list of contacts 218, then drag and drop a desired contact to add the desired contact to the communication session. The system 100 then automatically contacts that person in their desired mode, a sender preferred mode, a currently available mode based on presence information, or in a common available mode between the participants and joins that person to the communication session. The system 100 can display other information as well, such as a calendar, notes, memos, personal presence information, and time. A user can manually and seamlessly switch over from one modality to another mid-session. For example, a user participating in a communication session via cell phone who is now near a webcam can drag a video conferencing icon onto the communication session to switch from cell phone to video conferencing. The system 100 display can be user-configurable.

While drag and drop is used primarily in these examples, any user input can be provided such as tapping, flicking with a gesture, etc. to indicate a linking of a selected utility icon 208, 210, 212, 214, 216 with one or more participants (which may include people and non-person entities like a conference call or a calendar item).

In one aspect, user preferences guide the amount and type of information conveyed by the graphical elements and the associated text. User preferences can be drawn from a viewer's preferences and/or a source person's preferences. For example, a viewer sets preferences to show others' email addresses when available, but a source person sets preferences as never share email address. The source person's preferences (or preferences of the “owner” of the information) can override a third party's preferences.

Having discussed several variations of FIGS. 2A-2D, the discussion now turns to a network view 300 of the communication session as shown in FIG. 3. A network 302 connects various communications devices 304, 306, 308, 310, 312 and conveys information from device to device. The telecommunications network can be one of or a combination of a plain old telephone service (POTS) network, an asynchronous transfer mode (ATM) network, the world wide web, an integrated services digital network (ISDN), frame relay network, Ethernet network, token ring network, and any other suitable wired or wireless network. The network can include one or more interconnected nodes 314, 316, 318, 320 which perform all or part of the connection and transmission functionality that underlies the graphical representation of communication sessions on a GUI. Such network nodes 314, 316, 318, 320 can perform all the functionality in the network 302 or can operate in conjunction with end-user communication devices 304, 306, 308, 312 to manipulate communication sessions. Only the display component is shown for devices 304 and 306.

In one aspect, a centralized entity such as node 320 controls the communication session. The centralized entity 320 can reside in the network and/or communicate via the network. The centralized entity 320 can operate as a centralized enterprise intelligence server. In another aspect, the communication session control and functionality is distributed among multiple server resources 314, 316, 318, 320 in the network or cloud 302. In addition to a centralized intelligence and distributed intelligence in the cloud, the network 302 can provide this functionality using a peer-to-peer approach with intelligence on the endpoints 312, 308, 306, 304. Some variations include providing standardized functionality on a standards-compliant server and non-standardized functionality distributed across the endpoints. In some respects, the “system”, “device”, “communication device” or other characterization of a hardware component that performs certain steps can be interpreted as one or more of the various devices as endpoints or network elements shown in FIGS. 1 and 3.

Each communications device 306, 304, 312, 308 of FIG. 3 shows a different aspect or view of the same communication session. For example, the display of device 304 shows the same display of the same participants 202, 204, 206 as shown in FIG. 2D. The display of device 306 shows the same participants 202, 204, 206 in a different view of the communication session from the perspective of device 306. Likewise devices 308 and 312 show the same participants 202, 204, 206 in different views which can each be tailored to the individual participants in the communication session. Device 304 can represent a host or manager of the communication session but someone who is not shown as participating in the call.

In one aspect, a mobile device 308 connects with a base station 310 to connect to the network. A mobile device 308 can generate its own view of the communication session or it can generate a duplicate or a companion view of another device's display.

In general, the management of the communication session involves a user, such as the user interfacing with device 304, providing input to the graphical interface. The input as is noted herein involves an action step for manipulating or managing the communication session. Corresponding instructions are provided to the network node 320 or network nodes which actively provide the communication links to the various participants. Thus, the network node or nodes will carry out the instructions received from the managing device such that actions like communication session bridging, removing a person from the session, establishing a sidebar discussion, separating the communication session into several smaller communication sessions, and so forth, are appropriately carried out.

FIG. 3 also can illustrate a view of a person or entity who seeks to contact someone in a communication session. For example, assume Mary has device 304 and wants to call Frank 202. If she does, if permissions are granted, she can be presented with a visual of Frank's communication session showing 202, 204, 206. This can provide her varying levels of detail with respect to the type of communication, who is on the call, the subject matter of the call, etc. In this manner, Mary can be presented with options since she now has this knowledge. Perhaps she may want to IM or email instead of call. She may request to join the conference call. She me want to send a message to Frank 202 that she noticed he was on a call and could he return her call in 1 hour. Presenting Mary with a graphical image of the communication session presence of the person she is calling enables a more efficient mechanism for her to determine how to best take the next step in communicating with Frank 202.

FIG. 4 illustrates a different view 400 of the same communication session shown in FIG. 2D, but from the perspective of Max Power 204. In this case, Max Power is the moderator, so Max's icon 204 appears at a central location compared to the remaining participants' icons 202, 206. Each participant's icon has associated text 202 a, 204 a, 206 a indicating name and communication mode. The text 202 a, 204 a, 206 a can also represent other data about each person or can include icons indicating various types of data such as communication mode, presence, temporal information, calendar information, hierarchical information, employer information and so forth. The system 100 can arrange the icons based on an organizational hierarchy, role, location, seniority or other combinations of parameters.

The interface 400 in FIG. 4 uses connecting lines and a central hub 402 and spokes from the participants to the hub to indicate that the three participants 202, 204, 206 are in the communication session. As the system 100 engages in additional communication sessions, the display shows additional concurrent sessions in different locations. In some cases such as instant messaging, a single location contains multiple communication sessions of a same type. For example, multiple IM communication sessions can be displayed as a stack of cards at a single location. The hub 402 of FIG. 4 and the lines connecting icons in FIG. 2D are also illustrative display configurations for active connections. Other configurations of icons, text, and/or graphical elements can replace those shown herein.

The display 400 can include a title bar 404 and various controls such as a mute button 406, an exit button 408, a transcription button, and an “add participant” button 410. When a user clicks on the “add participant” button 410, the system 100 can present the user with a dialog to select one or more participants to add. The title bar 404 can include information such as call duration, call moderator, and preferred communication mode. When a user clicks on the mute button 406, the system 100 can mute the user's line or other participants' lines. For a participant, clicking the exit button 408 causes that participant to leave the conference. The moderator could also highlight one of the participants with a click or gesture and then click on exit 408 to remove them from the conference. The conference moderator can also terminate the communication session for all participants by clicking the exit button 408.

When a user clicks on a transcription button (not shown), the system 100 can engage a speech recognition module to recognize and transcribe speech. The system 100 can display transcriptions in real time, such as a ticker of text beneath a user's icon. The system 100 can also prepare a full transcript of an entire communication session and email the full transcript to selected participants after the communication session ends. The system 100 can transcode audio from a telephone call to text for a text messaging session via automatic speech recognition (ASR) and can convert in the other way via text-to-speech (TTS). Thus, Max 204 can communicate via IM with Frank 202 and Karl 206 in the same session but in different modes. These differences can be visually representing in the session display.

Alternatively, the user can browse and select a participant from a list of contacts and drag desired participants directly into the graphical representation of the conference. A user can also add a party to the communication session, invite a party to the communication session, drop a party from the communication session, split a communication session, form a sidebar communication session, and merge two communication sessions. A sidebar communication session is a concurrent session between two or more participants in a main communication session, but separate from the main communication session. For example, if Max Power 204 is proposing an idea, Frank Grimes 202 and Karl 206 can form a sidebar to discuss the proposed idea without Max Power listening or even knowing about the sidebar. In some cases knowledge of the sidebar's existence is available to other participants, but the other participants do not know what is being communicated in the sidebar.

Having discussed several variations of FIG. 4, the discussion now turns to FIG. 5, which illustrates a third view 500 of a communication session 502 between Max Power 204, Frank Grimes 202, and Karl 206, but from the perspective of Karl 206 and with another concurrent real-time communication session 512 and a current incoming call 514 for Karl 206. The active connections of the communication session 502 are shown here connected via a triangle 510. The system 100 as shown in FIG. 5 can display overlapping graphical elements, a line connecting graphical elements, a shape connecting graphical elements, a shape with radiating lines connecting graphical elements, and/or a common augmented appearance of graphical elements. The system can group close together or overlap icons corresponding to individuals at a same location. Thus, the visual representation can vary for each “participant” in a communication session depending on the individual, location, grouping of people, and so forth. This visual image gives the participants and easy understanding of who is in the communication and the ability to easily manage the session graphically.

The display in FIG. 5 shows three separate concurrent communication sessions 502, 512, 514. The first communication session 502 is between Max 204, Frank 202 and Karl 206. Respective metadata is shown 202 a, 204 a, 206 a. The second communication session 512 is a communication session in which Karl is a participant and which includes a group from California 504, Paul 506, Rob 508, Layne 524, and a group from Florida 522. Thus, Karl 206 is a simultaneous participant in two communication sessions. The system 100 displays each communication session separately. In addition to these two communication sessions, the system 100 displays an incoming communication 514 from John Mah. The incoming communication icon 514 can blink, bounce, pulse, grow, shrink, vibrate, change color, send an audible alert (such as a ringtone), and/or provide some other notification to the user of the incoming call. Karl 206 can interact with and manipulate this incoming request in the same manner as the other current communication sessions. The system 100 does not differentiate between an active communication session and a communication session representing an incoming call. For example, Karl 206 can drag and drop the incoming call 514 on top of the communication session 512 to add the incoming call directly to the communication session 512 or 502. As another example, Karl 206 can drag and drop the incoming communication 514 to a trash can icon to ignore the call, double click on the incoming communication 514 to send the incoming caller (if it is a call) to voicemail, or tap and hold to place the caller on hold.

If Karl 206 accepts the incoming communication 514 from John Mah, the system 100 creates and displays a new communication session including Karl 206 and John Mah (not shown in FIG. 5). The system 100 can place the new communication session elsewhere on the display.

The system 100 can visually represent active connections as overlapping graphical elements for individuals at one location. For example, in the second communication session 512, the participants from Florida are overlapped as are the participants from California. The user can manipulate these overlapping icons to identify or communicate with participants in a communications session.

The display can include a listing of contacts 520 and calendar events 522. User interactions with the contacts can trigger an expanding view or a popup window with more information. The user can then click on a particular contact to see a list of available modes of communication for that contact. The system 100 initiates an additional communication session with that contact based on a user selection of an available mode of communication. The system 100 connects and displays that communication session along with the existing three 502, 512 and the newly added session with John Mah (not shown).

Further, the system 100 can include a search capability. A user can search for contacts, calendar events, email addresses, phone numbers, and so forth. This approach can be advantageous for users with very large contact lists or for finding all members of a particular department.

Often a contact will include several contacts for a particular communication modality. For example, one contact can include four phone numbers, two text message numbers, three email addresses, and so on. In these cases the system 100 can intelligently select one of the available addresses or numbers for a selected modality, or the system 100 can present a disambiguation dialog so the user can select a desired address or number.

In many instances, a user will not have a contact entry for all the other communication session participants. To add a communication session participant as a contact, the user can drag and drop the desired icon on the contacts icon. The system 100 can automatically locate available information about that participant to add to the contact database.

One possible user input is to divide the communication session shown in FIGS. 6A-2B. The user can draw a line with a mouse drag or a finger on a touch screen separating the communication session into two groups. The system 100 can then divide the communication session into two separate concurrent communication sessions based on the groups. In one aspect, a communication session manager can divide a communication session for a limited time, after which the communication sessions are automatically merged together. For example, a manager can say “Team A, discuss pros and cons of strategy A. Team B, discuss pros and cons of strategy B. After five minutes, we'll return and report on our discussions.” Then the manager draws a line or otherwise selects groups for the breakout sessions and sets a duration. A dialog or icons can appear when the communication session is separated which present the available options for managing the separation. The system 100 divides the communication session and rejoins them after the set duration. The manager can indicate additional settings, such as prohibiting sidebar conversations between the groups during the breakout sessions. The manager can be independent of the breakout sessions and monitor each breakout session via audio, summary, and/or real-time text.

FIG. 6 illustrates a communication session 600 having users with a trusted relationship or indications of the various levels of trust for individual participants. The communication session 600 includes a user Karl 602, participants from California 604, Paul 606, Rob 608, and participants from Florida 610. A central hub shape 626 connects the session participants and can also indicate the primary, preferred, or minimum communication modality. It is assumed in this example that the view 600 of the communication session is for Karl 602. In other words, interface 600 is Karl's interface and will present his trusted relationships. The other participants, if they have their own GUIs that represent the structure of the communication session from their point of view, will not show Karl's trusted relationships but will generally show those participating in the call and perhaps their respective trusted relationships with other participants.

In a similar vein, each participant sees a potentially unique graphical representation of the communication session. For example, the layout of the icons may be different. The appearance of the icons may be different based on context elements such as a trust level, purpose of the communication session, location, time of day, day of week, and so forth. For example, in a business related communication session with potential clients, a user's context causes that user to appear to other participants as a formal icon, such as a picture of the user in a suit and tie. In a more casual context, that same user can appear as a picture of the user with a t-shirt and baseball cap. In some cases, the trust relationship alters the user's appearance in others' graphical representations of the communication session. For example, two users with a trusted relationship between each other can appear differently to each other than they appear to other non-trusted participants in a communication session.

The GUI can overlap or stack multiple participants from a single location or facility like a deck of cards, as shown with the participants from California 604 and Florida 610. The GUI can also portray multiple participants at a single location using a linked wheel analogy. A linked wheel includes a location-specific secondary hub which connects to the communication session, and participants at that location connect to the communication session through the location-specific secondary hub. The trusted relationship can include bidirectional linkages to schedulers, calendars or other personal data. In such a trusted relationship between communication session participants, the linkage between schedulers can depict meeting with or without a listing of participants, presence, context or persona via the icon, connecting lines, borders, textures, and/or other graphical elements. Linkage between schedulers may even extend to pushing a user's entire calendar when a trust threshold is met. In FIG. 6, the trusted relationship is depicted as a thicker line between Karl 602 and Paul 606. When two participants have a trusted relationship and need to schedule an event, the system 100 can find a common available time between the participants. The trusted relationship enables a bidirectional link to calendaring information in this example such that conflicts can be identified and times for future meetings established. This approach is a graphical metaphor showing the temporal, contextual, or persona factors related to trust, schedulers, and other resources.

The link(s) can have various trust levels. Different visual metaphors can represent the different levels. For example, a “business associate” level can share business contact information including business address, email address and business phone number. This level of a trusted relationship can be presented by a blue line, a thin link or the like in the communication session interface 600. Another layer of trust may include temporal information such as calendaring information for business hours and represented with a different color, thicker line, or the like. A deeper trust relationship can be represented by a thicker line, still another color, or the like and can include weekend and evening calendar information, birthday/anniversary dates, personal email address and cell phone numbers, etc.

With respect to persona information, a user may desire to depict a business persona on a communication that focuses on their experience, business successes etc. That persona may be represented in a business contact entry that they would want to share if someone downloaded their contact information. Other persona information such as personal tastes, hobbies, personal interests, etc. may be shared in other trusted relationships. The user can manage what persona is presented, offered or received in a communication via a trusted relationship metaphor as disclosed herein. This may include such information as what type of icon or element is shown in the communication session. For example, Paul 606 may have a close friend relationship with Karl 602 and want to have on Karl's display 600 a more casual picture 606 in his graphical representation of the communication session. This can be determined based on the trust level of the relationship between the parties. Paul 606 may desire that the other participants from Florida, California, and Rob see an icon 606 that is more business-focused, i.e. Paul in a suit. This difference in their graphical view of the session can be based on the trusted relationship between the individual parties.

A contact in a listing of contacts can also have appearance consistent with its trusted relationship appearance in a communication session. For example, if a thick red line indicates a trusted relationship in a communication session, a trusted contact in a listing of contacts can have a thick red border.

There are various ways in which the user Karl 602 can establish a trusted relationship. For example, Karl 602 can drag or otherwise move a trust icon 612 from the hub 626 of the communication session (or elsewhere) and drop it or otherwise position it on an icon representing another communication session participant. FIG. 6 shows graphical representations of the connecting links from Karl 602 to Paul 606 as thicker lines. The system 100 can adjust the thickness, animation, texture, shape, direction, color, curvature, style, and/or length of the links to indicate that a trusted relationship exists and/or the level of trust. For example, the system 100 can animate the link between icons or the icons themselves using a periodic pulse to indicate a trusted relationship. Similarly, the system 100 can add text labels and/or controls relating to a trusted relationship. The system can also modify the graphical elements of trusted users, such as overlaying a green checkmark or other mark on the icon of a trusted user. These variations can also provide informational cues regarding duration of the trusted relationship, trust levels, what is being shared via the trusted relationship, and other pertinent trusted relationship information.

In one aspect, the system 100 changes the depiction of trust as the actual relationship between two parties evolves. For example, in a single communication session (or over the duration of multiple communication sessions) as two users gain each other's trust, the line can change color, thickness, or the like to indicate a burgeoning trust relationship. Likewise, as a trust relationship terminates, the system 100 can automatically update the graphical depiction of the link to return to a normal or untrusted state.

When users establish a trusted relationship, at least one of the users in the trusted relationship can set a trust level. FIG. 6 shows a popup 616 for setting a trust level 618 and an optional duration 620 for the trusted relationship. Different levels can allow differing classes of access to multiple resources. For example, a first trust level allows read-only access to a user's calendar, while a second trust level allows read-write access to a user's calendar. A third trust level allows partial access to view a user's contacts, while a fourth trust level allows full access to view a user's contacts. Trust levels can be a combination of permissions for a combination of resources, such as full access to contacts and read-only access to temporal information such as a calendar or evening and weekend access to the calendar. The trust levels can vary within other resources as well. For example, a user may share via a trusted relationship read-only access to a calendar for the next 30 days and no access for past calendar events and future calendar events beyond 30 days. As another example, a user can share via a trusted relationship full access to business contacts in an address book, but no access to personal contacts in the address book.

A trusted relationship can share multiple resources such as a calendar, contacts, presence information, documents, credentials, funds, email (including inbox, outbox, and/or sent items), IM data, photos, videos, persona information and other information that may or may not be directly related to the communication session. Karl 602 can click on an X 622 associated with the thick line to Paul 606 to terminate the trusted relationship at any time. Similarly, a user can manually raise and lower the trust level as a relationship evolves, such as by clicking a plus or minus icon related to the trust level or moving a slider up or down. In the case where one participant of a group of participants at a single location has a trusted relationship, such as the groups California 604 or Florida 610, the system 100 can separate out that one participant from the group in order to more clearly show a trusted relationship graphically. Optionally, where a trusted relationship exists between Karl 602 and Paul 606 on the communication, Paul 606 may also be presented in his GUI a visual depiction of the trusted relationship as well.

As an additional benefit, adding a contact to a contacts list can take advantage of this concept of a trusted relationship. For example, If Karl 602 does not have Paul's contact information, once the trusted relationship is established, then Karl could easily receive Paul's contact information at whatever appropriate level. For example, Paul on his interface 600 could drag and drop Paul's icon 606 to a contacts icon (such as 520 shown in FIG. 5). That operation would result in the system receiving the contact information about Paul that is shared via the bidirectional link and populating a new contact in Karl's contact list. The appropriate level and number of email addresses, phone numbers, home/business addresses, as well as other metadata about Paul, the communication session 600, etc. could also be automatically stored in the contacts list or other location. This approach provides a simple mechanism to add contact information based on a trusted relationship.

Other aspects of the communication session 600 are discussed next. With respect to establishing a sidebar communication, the following example illustrates how a sidebar can be established. The conference call 600 shown in FIG. 6 may develop to a point where Rob 608 and Paul 606 desire to have a separate “offline” discussion but not be completely removed from the call. The host 602 or other user having an interface capable of managing the communication session 600 can provide user input such as identifying via the icons Rob 608 and Paul 606 for a sidebar discussion. This can include such mechanisms as providing a gesture that circles the two icons, a line that connects the two, the user holding down the shift key and clicking on the two icons, dragging the two icons to a sidebar identified location, and so forth. This interaction causes the communication manager to establish a direct communication link between the participants in the sidebar. Another set of adjustments to the communication session can also occur.

For example, visually the communication link between the parties and the conference can be shown as dashed lines or some other visual representation that they are partially connected to the communication session while a communication link between the two parties in the sidebar can illustrate an active communication link. The icons of sidebar participants could be moved into a corner or other location on the interface 600 to demonstrate that they are off having a separate discussion. With respect to the audio, the communication manager, or conferencing server represented by the hub 626, can reduce the volume of the primary communication session such that the sidebar discussion hears it in the background. In this respect, the host of the call, Karl 602, could speak a little louder to signal to Rob and Paul in the sidebar that they should rejoin the conference. In other words, if the host 602 says a little louder “Rob and Paul, are you ready to join back in?!”

In this scenario, the participants in the primary communication session would not be able to hear the audio in the sidebar but if Rob or Paul were able to raise their voice to respond, then the communication manager or conference bridge could make that response audible to the conference. This approach can simulate the mechanism of parties physically together in which two parties remove themselves into a corner for a more private discussion but still have a level of communication available with the primary communication session.

Alternately, sidebars can be totally separate links. The host 602 can signal sidebar participants via text or another mode to rejoin the communication session. The main conference bridge would continue and the system 100 establishes separate sidebars between sub-groups. In one aspect, any party can set up the sidebar(s) not just the host.

In other aspects of this sidebar example, physically separate connections for sidebar(s) can be set up by any member of the main conference. In addition, other modes of communication such as IM or email can automatically become available between the sidebars and the main conference to signal status messages such as time to rejoin, questions about how it is going, and the like. For example, Rob 608 and Paul 606 are separated into a sidebar discussion and the various adjustments to the communication session are established, an automatic menu or icons could be presented which facilitate further modifications to the communication session. For example, icons could presented in which enable the host 602 or another party not in the sidebar(s) to drag or otherwise move and drop or otherwise locate an icon to Rob and Paul in their sidebar session which automatically sends an instant message asking “are you guys ready to return?” Rob and/or Paul could respond via an instant message by stating something like “yes we are ready”. In that case, the host 602 or another party drags or otherwise moves an icon on the host GUI which represents the sidebar with Rob and Paul back to the communication session in which Paul 606 and Rob 608 would be restored to their previous state of being regular participants in the entire communication session 600. The additional icons or communication means for the sidebar would then disappear inasmuch as they are no longer needed. In one aspect, Rob and Paul decide by themselves to rejoin the communication session and do not require intervention from the host or require that the host is even aware of the sidebar communication session.

Furthermore with respect to sidebars, trusted relationships between sidebar participants can be automatically or manually established. For example, if Rob 608 and Paul 606 establish a sidebar, and each of these participants have a high level trusted relationship with Karl 602, then the system could automatically enable them to have a high-level trusted relationship in their side bar. Karl could say for example, “Rob and Paul, you are both at a close friend trusted level with me but I know you don't know each other well. I am going to setup a side bar for you two to talk for a minute and share trusted information. We'll bring you back in the call in 5 minutes.” Karl 602 can then establish the sidebar with Rob and Paul and they can share trusted information via drag and drop or other operations to add each other to their contacts list as trusted contacts.

In a trusted sidebar, the icons 608 and 606 may also change to illustrate the persona of each individual. For example, they can show a more relaxed view to the parties in the sidebar in their respective GUIs than otherwise would be shown to the other participants in the session. As can be seen, contextual, persona and temporal information can be shared in various ways and to various individual participants based on a trusted relationship.

A trusted relationship can allow trusted parties to view each other's presence information beyond the scope of the communication session. For example, if Karl and Rob have a trusted relationship, Karl can see Rob's presence information beyond the workplace and after the workday is over. The trusted relationship can be asymmetric in this and other variations. In one example of an asymmetric trusted relationship, Karl trusts Rob and shares full calendar access and 24 hour presence information with Rob. Rob on the other hand trusts Karl but only grants Karl restricted access to the calendar (i.e. full access to calendar events between 9 a.m. to noon on weekdays) and presence information during working hours.

The basic step for establishing a sidebar as shown in the exemplary method embodiment of FIG. 7 includes the following actions: establishing a sidebar communication session with the identified entities (702), modifying the communication session to enable communication between the communication session and the sidebar communication session (704), receiving second user input identifying the entities in the sidebar communication session, the second user input indicating the elimination of the sidebar communication session upon receipt of the second user communication, rejoining the participants in the sidebar communication session to the communication session (706), and deleting the sidebar communication session (708). Trusted information such as persona, temporal, and contextual information can be opened up to and communicated between sidebar participants separate from other available communication options when the participants are involved in a larger communication session. These other trusted relationships can be represented visually in the sidebar session representation shown to the sidebar participants.

The disclosure now turns to the exemplary method embodiment shown in FIG. 8. For the sake of clarity, the method is discussed in terms of an exemplary system such as is shown in FIG. 1 or combination of network nodes shown in FIG. 3 configured to practice the method.

FIG. 8 illustrates a computer-implemented method of linking participants in a communication session. The system 100 presents a set of connected graphical elements on a graphical user interface (GUI) representing a structure of the communication session and a trusted relationship between a first participant and a second participant in the communication session (802). The communication session can be a telephone call between two users or a conference call between three or more users. The communication session can be mode-neutral so that users in the session can communicate using any of a number of communication modes such as telephone, cellular phone, voice over IP (VoIP), video conference, text message, instant messaging, web-based chat, email, and so forth. The GUI allows users to manipulate the communication session quickly and intuitively. Devices having different capabilities can present their user with a suitable GUI tailored to those capabilities. For example, a desk phone may have a more powerful processor and graphics abilities, larger screen, more memory, higher bandwidth, and so forth than a mobile device. Such a desk phone can display the GUI with full interaction and animation, whereas the mobile communication device may only provide a subset of that full functionality suited to its own capabilities.

The graphical elements can include images, caricatures, avatars, text, and a hyperlink to additional information related to a user associated with the graphical elements. The text can include a name, a title, a position, a telephone number, email address, a current status, presence information, and location. The system can change or animate the graphical elements based on a contacted party context, persona, and presence. Active connections to the communication session can be visually represented as a graphical connection metaphor having overlapping graphical elements, a line connecting graphical elements, a shape connecting graphical elements, a shape with radiating lines connecting graphical elements, and/or a common augmented appearance of graphical elements. Overlapping graphical elements can represent individuals at one location. Further, changing color, thickness, animation, texture, and/or length of graphical elements can indicate a relationship or status of entities represented by the graphical elements. The graphical elements associated with the first participant and the second participant can depict one or more of presence, context, and persona information. In one aspect, the system 100 displays a dashboard of trusted options relating to presence, context, and persona information between the first participant and the second participant.

The system 100 establishes a bidirectional link between the first participant and the second participant, wherein the communication device exchanges trusted information between the first participant and the second participant (804). The system 100 or one of the users can select the bidirectional link from one of a hierarchy of types, each type indicating a different level of trust and access. The system 100 can update the appearance of the bidirectional link appearance based on the selected type. The exchanged trusted information can include calendar events, contextual data, persona information and so forth. The system 100 can optionally negotiate a calendar event with the second participant via the bidirectional link based on the trusted information. As can be appreciated, trusted information of various types can be exchanged between trusted parties or other parties of trusted parties in a variety of ways utilizing the basic options available due to the ability to manage a communication session or sessions graphically as disclosed herein. For example, FIG. 5 illustrates an incoming communication 514. This communication can represent a call, an automated request for the user to join a scheduled event, a request from another conference call or communication session for the user to join and so forth. The principles of a trusted communication session can apply to this scenario. The user Karl 602 in FIG. 6 can set a parameter that only those above a certain trust level should be presented by way of barge-in requests. The incoming communication 514 can include a graphical representation of what the trust level would be between Karl 602 and the incoming communication if a connection were established.

Other examples also apply to FIG. 5. Assume information about the trust level between each participant in communication session 502 and each participant in communication session 512 are known. Assume that the hosts desire to combine these communication sessions and want to determine whether that is appropriate. One parameter that can aid in that determination is the combined trust levels between all the participants. Perhaps Frank Grimes 504 has a very low trust level with Karl 508 and Max Power 506. This trust level may preclude the combining of the communications session since the combined trust level of all the participants is not sufficiently secure. A preliminary graphical view can be presented to the host or a warning can be presented as the hosts tries to combine these communication sessions which indicates that trust level. A dialog can ensue in which the host confirms the combination of sessions or provides input to not complete the combination. Thus, various aspects of the management of communication sessions as disclosed herein can have a trust level added visually to improve the available communication features.

Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon. Such non-transitory computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as discussed above. By way of example, and not limitation, such non-transitory computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.

Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.

Those of skill in the art will appreciate that other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.

The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Those skilled in the art will readily recognize various modifications and changes that may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure. 

What is claimed is: 1-20. (canceled)
 21. A method for managing trusted relationships in communication sessions, the method comprising: presenting a first graphical metaphor representing a trusted relationship between a first participant and a second participant in a first communication session; establishing a first bi-directional link between the first participant and the second participant, wherein trusted information is exchanged via the bi-directional link; and displaying a depiction of the first bi-directional link to at least one of the first participant or the second participant.
 22. The method of claim 21, wherein the trusted information includes calendar information for at least one of the first participant or the second participant.
 23. The method of claim 22, further comprising: negotiating a calendar event between the first participant and the second participant via the bidirectional link based on the calendar information.
 24. The method of claim 21, wherein different levels of trust correspond with different levels of access to the trusted information.
 25. The method of claim 24, wherein a higher level of trust corresponds with a higher level of access to the trusted information.
 26. The method of claim 24, wherein the depiction of the bidirectional link signifies a level of trust associated with the trusted relationship between the first participant and the second participant.
 27. The method of claim 26, wherein the different levels of trust are depicted using different colors, and wherein a red line indicates an untrusted relationship.
 28. The method of claim 26, wherein the different levels of trust are depicted using different line thicknesses, and wherein a thin line indicates an untrusted relationship.
 29. The method of claim 21, wherein the trusted information includes at least one of: a personal phone number, a personal email address, or a bank account number.
 30. The method of claim 21, further comprising: presenting a graphical metaphor representing a trusted relationship between the first participant and a third participant in the first communication session; establishing a second bi-directional link between the first participant and the third participant, wherein second trusted information is exchanged via the second bi-directional link; and displaying a depiction of the second bi-directional link to at least one of the first participant or the third participant.
 31. The method of claim 30, wherein a level of trust between the first participant and the second participant is different than a level of trust between the second participant and the third participant.
 32. A method for depicting active communication session information, the method comprising: a first participant attempting to establish a communication session with a second participant, wherein the second participant is currently in an active communication session; displaying a depiction of the active communication session to the first participant; displaying one or more options for the first participant to communicate with the second participant; and receiving a selection of one of the one or more options.
 33. The method of claim 32, wherein the one or more options includes at least one of: sending an instant message (IM) to the second participant, sending an email to the second participant, and/or joining the active communication session with the second participant.
 34. The method of claim 32, wherein the depiction of the active communication session displayed to the first participant indicates one or more other participants of the active communication session with the second participant.
 35. The method of claim 34, wherein the depiction of the active communication session displayed to the first participant includes information regarding at least one trust level between the second participant and one of the one or more other participants in the active communication session.
 36. The method of claim 35, wherein the least one trust level is depicted using one or more colors, and wherein a red line indicates an untrusted relationship.
 37. The method of claim 35, wherein the least one trust level is depicted using a thickness of a line between the second participant and the other participant, and wherein a thin line indicates an untrusted relationship.
 38. The method of claim 32, further comprising: determining a level of trust between the first participant and the second participant; and if the level of trust between the first participant and the second participant is above a threshold level, informing the first participant of at least one time when the second participant is available.
 39. The method of claim 37, further comprising: scheduling a communication session between the first participant and the second participant at the at least one time when the second participant is available.
 40. The method of claim 32, wherein the active communication session comprises a conference call. 