Selectable State Machine User Interface System

ABSTRACT

A system that concurrently provides multiple user interface (UI) mechanisms that facilitate control of an application state machine (e.g., unified message system). More particularly, the invention can create two relatively distinct user experiences, one via dual tone multi-frequency (DTMF) navigation and another through speech recognition navigation of a unified message system. In accordance therewith, one single underlying state machine can be used. Navigation and flow control (e.g., state transitions) in the state machine can be leveraged by multiple UI mechanisms that actively co-exist. The invention introduces speech recognition features together with other input mechanisms to drive the UI of an application state machine (e.g., unified messaging system). The speech recognition UI can be designed to provide a natural navigation through the application independent of a DTMF UI.

RELATED APPLICATIONS

This application is a Continuation of co-pending U.S. application Ser.No. 11/086,828 entitled “Selectable State Machine User Interface System”filed Mar. 22, 2005, which claims priority to U.S. ProvisionalApplication No. 60/620,826 filed Oct. 20, 2004 entitled “UnifiedMessaging System”, which are incorporated herein by reference.

TECHNICAL FIELD

This invention is related to messaging systems and more particularly toa selectable user interface system that can employ variable interactivemechanisms to navigate through and control an underlying applicationstate machine.

BACKGROUND OF THE INVENTION

A state machine is a computing device designed with the operationalstates required to perform a particular task or to solve a specificproblem. There are countless special-purpose devices built as statemachines. A voicemail system is an example of such an application statemachine.

Today, many state machines, and particularly voicemail systems, employ adual tone multi-frequency (DTMF) navigational technique that enables auser to control the state machine. In other words, a user can navigatethrough voicemail menus and options by pressing appropriate keys on atelephone keypad. Many of these DTMF navigational techniques require auser to memorize option choices that correspond to the numbers on akeypad.

Other DTMF systems employ a navigational technique that allows a user tospell words via a telephone keypad. This is often cumbersome and verytime consuming. Other variations of DTMF voicemail systems employ voicemedia processing components that present to a user a set of availableoptions. For example, a user is frequently addressed with a specificprompt such as, “please enter your password” or “press one to review allnew messages.” While these audible prompts are sometimes useful, theytend to be time consuming and, nonetheless, often still require the userto employ DTMF techniques via a keypad.

Recent efforts have been directed to utilizing speech recognitiontechniques to enable a user to navigate through state machine menus.These efforts have been very limited in that they only recognizepreprogrammed menu selections and/or data. For example, a system can beprogrammed to recognize the names of individuals employed by a company.

Despite which technique is provided, state machines today are limited toemploying a single navigational technique at any given time. In otherwords, in accordance with conventional systems, a user initially choosesto navigate through a state machine via DTMF or voice commandtechniques. However, with respect to these systems, both options areusually not simultaneously or concurrently available and the user doesnot have the option of toggling between the navigational systems duringany one session.

Although attempts have been made to employ either DTMF or voicerecognition techniques to effect navigation through a state machine(e.g., a voicemail system), a substantial need exists for a system thatsimultaneously or concurrently provides the functionality of multipledisparate navigational techniques thereby permitting a user to select apreferred user interface technique at any time throughout a session.Additionally, a need exists for a system and/or methodology that employsvoice recognition mechanisms to effect versatility in connection withstate machine navigation.

SUMMARY

The following presents a simplified summary of the invention in order toprovide a basic understanding of some aspects of the invention. Thissummary is not an extensive overview of the invention. It is notintended to identify key/critical elements of the invention or todelineate the scope of the invention. Its sole purpose is to presentsome concepts of the invention in a simplified form as a prelude to themore detailed description that is presented later.

The subject invention, in one aspect thereof, allows a user to connectto a server (e.g., messaging server) via a telephonic communicationcomponent thereby accessing the rich information therein. The inventioncomprises a system and/or methodology that unifies a telephoniccommunication component and/or system with an application state machine(e.g., messaging server component and/or system). More particularly, inone aspect, the invention creates two relatively distinct userexperiences, one through the use of dual tone multi-frequency (DTMF)navigation and one through speech recognition navigation. In accordancethereto, one single underlying state machine can be used.

Navigation and flow control (e.g., state transitions) in the statemachine can be leveraged by multiple user interface (UI) mechanisms thatco-exist actively. The invention introduces speech recognition featurestogether with other input mechanisms to drive the user interface of anapplication state machine (e.g., a unified messaging system (UM)). Inaccordance with an aspect of the invention, the speech recognition UI isdesigned to provide a natural navigation through the applicationindependent of a DTMF user interface. The user can navigate through thespeech menu without having to enter any DTMF data.

In accordance with the subject invention, both the DTMF-based menuinfrastructure and the speech recognition menu structure can be activeand available to the user at any time. For example, at any time duringthe experience the user can switch from speech mode to DTMF driven mode.Because the switch does not need to be explicit, the user can issueeither a DTMF or a speech command at any time.

In another aspect, the prompts that will be played for the user uponentering any part of the application can be based on the UI mechanismthat the user used to enter the state. For example, the speech menu willbe played if speech commands brought the user to the state. On the otherhand, the DTMF menu will be played if a DTMF command brought the user tothe state.

In yet another aspect, from either the speech or DTMF UI the user can,at any time, say “help” to review available speech commands or press “0”to review available DTMF commands. In accordance with the co-existenceof the UI mechanisms, both sets of commands are available at all times.The default UI that is presented to the user on first entry to the UMsystem can be set as a personal option. Rule-based logic and/orartificial intelligence reasoning mechanisms can be employed todetermine the default UI.

The underlying application state machine is leveraged for the multipleco-existent UI models. Specific to aspects of the speech UI areadditional design paradigms selected to exploit some unique features ofspeech recognition. For example, the speech UI can have distinct promptsand menus for handling user input, input validation, and error handlingfor low confidence recognition results.

In still other aspects, a set of “anytime” shortcuts can be available atall times to jump to the main functionality of the underlying statemachine (e.g., unified messaging application). In the unified messagingapplication example, these main functionality locations can bevoicemail, calendar, call someone, email, and personal options.

Each speech menu can also have menu commands that are specific to themenu context. For example, with access to an application programminginterface, the invention can add functionality to enable telephonicgeneration and retrieval of email communications. The invention canfurther facilitate accepting or canceling calendar items (e.g., meetingrequests and appointments) via a telephonic communications device.

To the accomplishment of the foregoing and related ends, certainillustrative aspects of the invention are described herein in connectionwith the following description and the annexed drawings. These aspectsare indicative, however, of but a few of the various ways in which theprinciples of the invention can be employed and the subject invention isintended to include all such aspects and their equivalents. Otheradvantages and novel features of the invention will become apparent fromthe following detailed description of the invention when considered inconjunction with the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a high-level exemplary system architecture that facilitatesstate machine user interface selection in accordance with an aspect ofthe invention.

FIG. 2 is an exemplary system that illustrates a user interface storehaving disparate state machine user interface components in accordancewith a disclosed aspect.

FIG. 3 illustrates a system architecture that facilitates user interfaceselection with respect to a unified messaging system in accordance witha disclosed aspect.

FIG. 4 illustrates a user interface selection component that employs arule-based logic engine in accordance with a disclosed aspect.

FIG. 5 illustrates a user interface selection component that employs anartificial intelligence component in accordance with an exemplaryaspect.

FIG. 6 illustrates a high-level exemplary system architecture thatfacilitates communication in accordance with an aspect of the subjectinvention.

FIG. 7 illustrates an exemplary system architecture that employs aunified messaging system in accordance with a disclosed aspect.

FIG. 8 is a call control component that facilitates content conversionand interpretation in accordance with a disclosed aspect.

FIG. 9 illustrates a flow diagram of an exemplary communicationmethodology in accordance with a disclosed aspect.

FIG. 10 illustrates a call control component that employs a rule-basedlogic engine in accordance with a disclosed aspect.

FIG. 11 illustrates a call control component that employs an artificialintelligence component in accordance with an aspect.

FIG. 12 is an exemplary flow diagram of calling into a unified messagingsystem in accordance with a disclosed aspect.

FIG. 13 is an exemplary flow diagram of accessing voicemail and email inaccordance with an aspect.

FIG. 14 is an exemplary flow diagram of accessing an electronic calendarin accordance with an exemplary aspect.

FIG. 15 is an exemplary flow diagram of accessing electronic contacts inaccordance with a disclosed aspect.

FIG. 16 is an exemplary flow diagram of recording a message inaccordance with a disclosed aspect.

FIG. 17 is an exemplary flow diagram of calling into a unified messagingsystem that employs voice commands in accordance with a disclosedaspect.

FIG. 18 is an exemplary flow diagram of accessing voicemail and emailthat employs voice commands in accordance with an aspect of theinvention.

FIG. 19 is an exemplary flow diagram of accessing an electronic calendarthat employs voice commands in accordance with a disclosed aspect.

FIG. 20 is an exemplary flow diagram of accessing electronic contactsthat employs voice commands in accordance with a disclosed aspect.

FIG. 21 is an exemplary flow diagram of recording a message that employsvoice commands in accordance with a disclosed aspect.

FIG. 22 illustrates a block diagram of a computer that can execute thedisclosed architecture.

FIG. 23 illustrates a schematic block diagram of an exemplary computingenvironment in accordance with the subject invention.

DETAILED DESCRIPTION

The subject invention is now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of the subject invention. It may be evident, however, thatthe subject invention can be practiced without these specific details.In other instances, well-known structures and devices are shown in blockdiagram form in order to facilitate describing the subject invention.

As used in this application, the terms “component” and “system” areintended to refer to a computer-related entity, either hardware, acombination of hardware and software, software, or software inexecution. For example, a component can be, but is not limited to being,a process running on a processor, a processor, an object, an executable,a thread of execution, a program, and/or a computer. By way ofillustration, both an application running on a server and the server canbe a component. One or more components can reside within a processand/or thread of execution, and a component can be localized on onecomputer and/or distributed between two or more computers.

As used herein, the term to “infer” or “inference” refer generally tothe process of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

Referring now to FIG. 1, there is illustrated a high-level architecturaldiagram of a system 100 in accordance with an aspect of the subjectinvention. Generally, the system 100 can include a user interface (UI)selection component 102, a UI store 104 and a state machine component106. It will be understood and appreciated that a novel aspect of theinvention is to decouple the UI mechanisms from the state machine 106.The invention can employ multiple UI mechanisms to effect navigationwithin an application state machine. Further, a novel aspect of theinvention can concurrently employ multiple UI interfaces (e.g., dualtone multi-frequency (DTMF), speech recognition).

In other words, in accordance with novel aspects of the invention,multiple UI mechanisms can be active at any time allowing a user tofreely switch between UI mechanisms. In the example that follows, thisinvention employs a novel design that allows for the co-existence of twoor more UI mechanisms (e.g., DTMF and speech recognition) that enabletelephone access to a user inbox. Furthermore, the two or more UImechanisms can simultaneously leverage the underlying application statemachine.

The exemplary aspects that follow are directed to the use of the UIselection component 102 and the UI store 104 in connection with avoicemail application (e.g., state machine 106). However, it is to beappreciated that the state machine component 106 can be any applicationstate machine. Accordingly, the UI selection component 102 can effectutilization of any available UI mechanisms. By way of example, inoperation, a user can employ the UI selection component 102 to select aDTMF navigational technique to control the operation of an underlyingstate machine (e.g., voicemail system). As well, the UI selectioncomponent 102 can be employed to facilitate a speech recognitionnavigational technique. It is to be understood that the UI selectioncomponent 102 can be continuously available thereby providing a user theability to toggle between UI navigational techniques at any time duringa session.

While the exemplary aspects described herein are directed to systemsthat employ a DTMF and/or voice recognition navigational technique, itis to be understood that any navigational technique can be employedwithout departing from the spirit and/or scope of the functionality ofthe invention. For example, other aspects can employ a pointing deviceto effect navigation with reference to a state machine.

Turning now to FIG. 2, there is illustrated a more detailedarchitectural diagram of an aspect of the invention. As described supra,in order to create two distinct user experiences, one single underlyingstate machine component 106 can be used in connection with multiple UImechanisms. In accordance therewith, flow control (e.g., statetransitions) in the state machine can be leveraged by both UImechanisms.

As shown in FIG. 2, the UI store 104 can include 1 to N UI components,where N is an integer. It will be appreciated that 1 to N UI componentscan be referred to individually or collectively as UI components 202. Amore specific example of the UI store 104 is illustrated in FIG. 3.

Referring to the exemplary aspect of FIG. 3, as illustrated, the UIstore 104 can include UI components 202 including, but not limited to, aDTMF UI component and a speech UI component. Additionally, the statemachine component 106 can include a unified messaging system 302. Theunified messaging system 302 can unite a telephonic system with anelectronic messaging and/or organization system. An exemplary unifiedmessaging system will be discussed in detail infra.

As described supra, the invention introduces speech recognition featurestogether with DTMF features to drive the UI of unified messaging system302. In accordance with an aspect, the speech recognition UI 202 can bedesigned to provide a natural navigation through the application (e.g.,state machine 106) independent of the DTMF UI 202. Because the inventiondecouples these UI mechanisms, the user will be able to drive throughthe speech menu without having to enter any DTMF input(s).

It is a novel feature of the invention to enable both the DTMF-basedmenu infrastructure and the speech recognition menu structure to beactive and available to the user at any time. At any time during asession or experience, the user can independently switch from speechmode to DTMF driven mode. The switch need not be explicit; the user needonly issue either a DTMF signal or a speech command to automaticallyeffect the transition.

Continuing with the voicemail system example, the prompts that will beplayed for the user on entering any part of the application will bebased on the UI mechanism the user employed to enter the state. Ifspeech commands were employed to bring the user to a state, the speechmenu will be played. On the other hand, if a DTMF command brought theuser to the state, the DTMF menu will be played. Additionally, fromeither the speech or DTMF UI 202 the user can employ “help” to determinethe commands. For example, at any time the user can say “help” to reviewavailable speech commands or press “0” to review available DTMFcommands. Both sets of commands are available at all times.

A default UI that is presented to the user on first entry to the unifiedmessaging system 302 can be set as a personal option. As well, it willbe appreciated that rule-based logic and/or artificial intelligence (AI)techniques can be employed to automate the selection process. Theserule-based logic and AI based reasoning techniques will be discussed ingreater detail infra.

Specific to the speech UI 202 are additional design paradigms selectedto exploit some novel features of speech recognition. The speech UI 202can have distinct prompts and menus for handling user input, inputvalidation, and error handling for low confidence recognition results.Further, the DTMF prompts will not be reused or converted to “press orsay”. The speech prompts and menus can go through a full usability passincluding user education review. Menus can be generated to sound naturalfor the user. For example, a menu can be generated to say “Would youlike to make a call or access your mailbox?” rather than “Say ‘make acall’ to call someone or ‘access mailbox’ to access your mailbox”.

A set of “anytime” shortcuts can be available at all times to jump tothe main functionality of the unified messaging application 302. As willbe discussed in detail infra, the main functionality can includevoicemail, calendar, call someone, email, and personal options. Eachspeech menu can also have menu commands that are specific to the menucontext.

In an alternative aspect, the invention can limit access to features ofthe unified messaging application 106. In other words, if it makes theapplication flow more natural, some more obscure or less importantfeatures may only be provided through DTMF mode. These features can bepreprogrammed and/or defined by a user as desired. As will be betterunderstood with reference to FIGS. 17 to 21, within the speech menus,menu flexibility can be increased since there is no concern aroundreusing DTMF digits. For example, in the voicemail, email and calendarplayback menus there does not need to be a distinction between the“during playback” and the “after message” menu.

It will be appreciated that, in connection with using speech commands,the DTMF paths of typing an extension and spelling out a name collapseto a single item with “Find [Person Name]”. Furthermore, theinfrastructure around contact navigation can also collapse into “Find[Person Name].” Occasional word combinations such as “I'll be 15 minuteslate” combine what was previously two entries under DTMF mode (e.g., anentry for late and then a separate entry for the time.)

An overview of the speech recognition menu structure is described withreference to FIGS. 17 to 21. These figures display both the DTMF menuinfrastructure and the speech user interface overlay. The speechdiagrams are intended to show the main grammar elements of an exemplaryUI and the overall flow rather than every specific prompt and errorhandling condition. The flow diagrams included are not intended to limitthe scope and/or novel functionality of the invention in any way.

The aforementioned novel aspects of the invention can employ rule-basedlogic and/or AI reasoning technology to effect, predict and/or infer anaction. More particularly, it will be appreciated that the subjectinvention (e.g., in connection with state analysis, UI selection, voicerecognition) can employ various rule-based and/or AI based schemes forcarrying out various aspects thereof.

Continuing with the above-described scenarios and with reference to FIG.4, a block schematic view of an alternative UI selection component 102is shown. As illustrated, UI selection component 102 can include arule-based logic engine 402. As will later be described with referenceto FIG. 5, an optional AI component (not shown) can be used togetherwith, or in place of, the rule-based logic engine 402 to automaticallyinfer an action or set of actions to be employed in connection with thefunctionality of the UI selection component 102 described supra.

In the exemplary aspect of FIG. 4, the rule-based logic engine 402 canbe programmed or configured in accordance with a predefined preference(e.g., a rule). For example, a rule (e.g., logic) can be constructed toautomatically select a specific UI based upon defined criteria.Accordingly, the system can automatically select and employ a specificUI. More particularly, a rule can be established to take intoconsideration the origination location (e.g., internal, external,Internet . . . ), originator, target location, etc., to automaticallyselect and employ a UI.

A schematic diagram of another alternative aspect of the subjectinvention is illustrated in FIG. 5. The UI selection component 102 ofthis alternative aspect illustrated in FIG. 5 employs an AI component502 that can automatically infer and/or predict an action. Thisalternative aspect can optionally include an inference module (notshown) that facilitates automatic selection of the UI selectioncomponent 102.

In accordance with this aspect, the optional AI component 502 canfacilitate automatically performing various aspects (e.g., stateanalysis, UI selection, and voice recognition) of the subject inventionas described herein. The AI component 502 can optionally include aninference component (not shown) that can further enhance automatedaspects of the AI component utilizing, in part, inference-based schemesto facilitate inferring intended actions to be performed at a given timeand/or state. The AI-based aspects of the invention can be effected viaany suitable machine-learning based technique and/or statistical-basedtechniques and/or probabilistic-based techniques.

In the alternate aspect, as further illustrated by FIG. 5, the subjectinvention (e.g., in connection with state analysis, UI selection, andvoice recognition) can optionally employ various AI-based schemes forautomatically carrying out various aspects thereof. Specifically, the AIcomponent 502 can optionally be provided to implement aspects of thesubject invention based upon AI processes (e.g., confidence, inference .. . ). For example, a process for initiating a UI based upon userpreferences or sender identification can be facilitated via an automaticclassifier system and process. Further, the optional AI component 502can be employed to facilitate an automated process of selecting a UIbased upon a predicted and/or inferred preference.

A classifier is a function that maps an input attribute vector, x=(x1,x2, x3, x4, xn), to a confidence that the input belongs to a class, thatis, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action that auser desires to be automatically performed.

A support vector machine (SVM) is an example of a classifier that can beemployed. The SVM operates by finding a hypersurface in the space ofpossible inputs, which hypersurface attempts to split the triggeringcriteria from the non-triggering events. Intuitively, this makes theclassification correct for testing data that is near, but not identicalto training data. Other directed and undirected model classificationapproaches include, e.g., naive Bayes, Bayesian networks, decisiontrees, and probabilistic classification models providing differentpatterns of independence can be employed. Classification as used hereinalso is inclusive of statistical regression that is utilized to developmodels of priority.

As will be readily appreciated from the subject specification, thesubject invention can employ classifiers that are explicitly trained(e.g., via a generic training data) as well as implicitly trained (e.g.,via observing user behavior, receiving extrinsic information). Forexample, SVM's can be configured via a learning or training phase withina classifier constructor and feature selection module. In other words,the use of expert systems, fuzzy logic, support vector machines, greedysearch algorithms, rule-based systems, Bayesian models (e.g., Bayesiannetworks), neural networks, other non-linear training techniques, datafusion, utility-based analytical systems, systems employing Bayesianmodels, etc. are contemplated and are intended to fall within the scopeof the hereto appended claims.

Referring now to FIG. 6, there is illustrated a high-level architecturaldiagram of a system 600 in accordance with an aspect of the subjectinvention. Generally, the system 600 can include a unified messaging(UM) system component 602, a telephonic communication component 604 anda computer application, state machine and/or server component 606. Asdescribed supra, the UI selection component 102 (FIG. 1) and subsequentfunctionality of the subject invention can be employed in connectionwith the unified messaging system 602. More particularly, as illustratedin FIG. 6, the subject invention can be employed to enable a UI to beselected thus effecting telephonic access to rich data maintained withina server component. This telephonic access can be effected via a unifiedmessaging system 602.

The telephonic communication component 604 can include any devicecapable of communicating voice and/or audible sounds and signals (e.g.,DTMF). By way of example, the telephonic communication component 604 caninclude a traditional wired telephone as well as wireless (e.g.,cellular) telephones. Further, the telephonic communication component604 can be effected via a portable wireless device and/or computer thatemploys voice over Internet protocol (VOIP) or fax over Internetprotocol (FOIP).

The server component 606 can be employed to host any communicationand/or organizational application. For example, the server component 606can host communication applications including, but not limited to,voicemail, email, text messaging applications or the like in connectionwith aspects of the subject invention.

In one aspect, the UM system 602 can unite the telephonic communicationssystem 604 with the server component 606 (e.g., mailbox server).Accordingly, the telephonic communications system 604 can access therich information maintained in the server component 606 thereby,unifying the systems. Although FIG. 6 illustrates a single telephoniccommunications system 604 and a single server component 606, it is to beunderstood and appreciated that the invention is extensible therebybeing capable of uniting multiple telephonic and/or server systems.

Referring now to FIG. 7, there is illustrated an exemplary systemarchitecture in accordance with an aspect of the invention. The system700 generally includes the UM system 602, telephonic communicationssystem 604 and server component 606. In one aspect, as illustrated, thetelephonic communication component 604, the server component 606 and aplurality of clients 702 can be connected to the UM system 602 via awired local area network (LAN) connection 704 (e.g., Ethernet). Althoughthree specific clients 702 (e.g., smart phone, desktop, laptop) areshown, it is to be appreciated that any number of clients 702 (e.g.,email clients) can be employed without departing from the spirit and/orscope of the subject invention. It will be understood that, in alternateaspects, connections illustrated in FIG. 7 can be wired, wireless or acombination thereof.

Furthermore, it is to be appreciated that the clients 702 can employdisparate communication techniques in order to communicate with theserver component 606. For example, a smart phone, pocket personalcomputer (PC) or other handheld device can employ specializedcommunication software to synchronize to the mailbox server 706 or theactive directory server 708. In another example, a desktop (e.g., client702) can employ a wired (e.g., Ethernet) connection thereby gainingaccess to the server component 606. Yet another exemplary client of thethree clients 702 (e.g., laptop) can employ a wireless Internetconnection to access the server component 606.

Turning now to the UM system component 602, a call control component710, text-to-speech (TTS) engine 712, speech recognition engine 714,voice media processing component 716, fax media processing component 718and UM application component 720 can be provided. Each of thesecomponents can be better understood with reference to the exemplaryscenarios infra.

The telephonic communications component 604 can include a publictelephone 722 connected via a public switched telephone network (PSTN)724, a private (e.g., in-house company) phone 726 connected via aprivate branch exchange (PBX) 728 or private telephone switchboard, andcomputer system 730 that employs VOIP or FOIP via gateway 732. It willbe appreciated that these components are exemplary and are not intendedto be an exhaustive list of the telephonic communications component 604.In other words, telephonic communications component 604 can include anymechanism capable of generating and/or transmitting audible (e.g.,voice, fax) signals.

Additionally, UM system 602 can include a UI selection component 734 toeffect selection of an appropriate UI as described supra. Although notillustrated in FIG. 7, it is to be understood that the UI selectioncomponent 734 can communicate with a UI store (not shown) in order toeffect the desired and/or selected UI. It will further be appreciatedthat the UI store (not shown) can be co-located or located remotely fromthe UI selection component 734. For example, the UI store (not shown)can be located within server component 606.

FIG. 8 illustrates an implementation of the call control component 710.More particularly, UM application component 720 can include an emailintegration component 802, a calendar integration component 804, acontact list integration component 806 and a security component 808.Each of these components (802, 804, 806, 808) will be better understoodupon a discussion of the exemplary scenarios that follow. Although theUM application component 720 of FIG. 8 illustrates four exemplaryfunctional components, it is to be appreciated that the functionality ofthese components described in the following scenarios can be combined(or separated) into disparate components. As well, it will beappreciated that the components described herein can be co-located orremotely located without departing from the scope of the subjectinvention.

In order to provide context to the invention, the following exemplaryscenarios are provided. It is to be appreciated that the followingscenarios are included merely to provide context to the invention. Itwill also be appreciated that additional scenarios exist which are notspecifically disclosed herein. To this end, the scenarios infra are notintended to limit the scope and/or functionality of the subjectinvention.

A first exemplary scenario is directed to a discussion of the emailintegration component 802. More particularly, this scenario is directedto integration of an “out-of-office” (OOF) voicemail greeting and email.With reference again to FIG. 7, conventionally, the OOF status can beseparately set on both a user specific email account (e.g., via client702) or voicemail account (e.g., via telephone 722, 726). As will beappreciated, an OOF email auto-reply generated via the server componentas well as the voicemail extended absence (e.g., OOF) greeting oftencontain similar information. The subject invention can facilitatesetting both the email and the voicemail OOF status from a singlelocation in a single operation.

With continued reference to FIG. 7, when a user sets the OOF status fromthe email application (e.g., client 702), the UM system 602 canintegrate (e.g., synchronize) the OOF message into the telephoniccommunications component 604. Accordingly, calls to the user via thetelephonic communications system 604 will include an audible version ofthe OOF extended absence greeting. Through the use of text-to-speechconversion techniques of the TTS engine 712, this greeting can audiblyrender the text contained in the email OOF auto-reply.

Similarly, in the event that a user sets the OOF from the telephoniccommunications component 604 (e.g., telephone 722), through voicerecognition techniques of the speech recognition engine 714, the unifiedmessaging system 602 can automatically set an email OOF message in themailbox server 706. Thereafter, a sender of an email to the user willreceive a text version of the OOF auto-reply that was originated viatelephonic communication mechanisms.

A second scenario is directed to the calendar integration component 804and particularly to calendar or planner access and management. Today,users have limited access to their calendar from telephonic systems(e.g., 722, 726, 730) and can only read the information corresponding toappointments, which is maintained within server component 606. Inaccordance with an aspect of the subject invention, users can manageappointments and initiate communications related to appointments via thetelephonic communications component 604 (e.g., telephone 722, 726, 730).It will be appreciated that full planner functionality can befacilitated via speech recognition component 714 of the UM system 602.For example, via the telephonic communications device 604, a user canaccept, decline, modify, cancel, and communicate with respect toappointments contained within the server component 606.

In one aspect, a telephonic session with the UM system 602 can beautomatically transferred to a telephone of a meeting location. In otherwords, via the telephonic communications component 604, a user canconnect to the UM system 602 whereby, based upon a calendar (e.g.,appointment) entry in the server component 606, a determination can bemade with respect to an appropriate transfer target location for thecall. Finally, by contacting the UM system 602 via any telephoniccommunications device 604, a user can initiate a targeted or broadcastelectronic message (e.g., email) to the meeting participants. Forexample, a user can inform meeting participants of a delayed arrival toa meeting.

Yet another aspect is directed to remote access of contact list entriesvia the contact list integration component 806. In connection withsystems today, users cannot telephonically access their personal contactlist, which is frequently stored on the email system (e.g., server 606).In accordance with an aspect of the invention, from the telephoniccommunications device 604 (e.g., telephone 722, 726, 730), a user cansearch for contacts in the contact list maintained within the server606. If desired, the user can immediately connect to or leave a message(e.g., voice, text, email) for the contact. If the contact is anexternal contact with only an email address, this invention can allow auser to communicate an audible message by creating an email with a soundfile attachment (e.g., .wav) thereby forwarding the communication to theintended target.

Turning now to a discussion of the security component 808 functionalityof the UM application component 720, the subject invention can beemployed to reset a personal identification number (PIN) via an email orother application. By way of example, when users forget their telephonevoicemail PIN (e.g., password), they frequently have to contact aninformation technology (IT) helpdesk or system administrator to resetit. In accordance with the UM system 602, this invention can allow auser to log into their email on the server component 606 using domaincredentials and reset/change their telephone voicemail PIN (e.g.,password).

Yet another scenario involving the security component 808 is directed todigital rights management for voicemail. When leaving a voicemail todayon the telephone, senders do not have any way to restrict the access toand/or management of the message. With this invention, voice messagescan be sent with restricted access. For instance, a voicemail can besent whereby a recipient can listen to the voicemail, but can berestricted from forwarding or saving the message.

Referring again to the email integration component 802, conventionally,in situations where listening to a sound file is not appropriate (e.g.,in a meeting), users are unable find out the contents of theirvoicemail. The UM system 602 (e.g., email integration component 802) ofthe subject invention provides for text preview of voicemails (and viceversa). In accordance with the UM system 602, via an email client 702,users can textually access voicemails on their computer, laptop or othersuitable device (e.g., smart phone). Through voice recognitiontechniques (e.g., speech recognition engine 714), the subject inventioncan convert the voicemail thereby transcribing it into text. Therefore,users can review the content of the voice message without playing thesound file. Similarly, the TTS engine 712 can be employed to convert anddeliver email communications via the telephonic communications device604.

Additionally, the invention can facilitate converting electronic messageattachments (e.g., word processing documents) to audible files (e.g.,voice). This can be accomplished via the TTS component 712. Inaccordance therewith, in addition to rendering the audible content of anelectronic communication, the subject invention can render an audiblefile that contains the content of a textual attachment. It will beunderstood that the TTS conversion techniques and navigational conceptsdescribed herein can be applied to file system directories and the like.In other words, the speech recognition engine 714 can be employed toeffect navigation within a file system directory. Accordingly, the TTSengine 712 can be employed to convert a target document to speech thusrendering the audible (e.g., voice) file to a user via the telephoniccommunications component 604.

Another aspect is directed to employing the email integration component802 to facilitate analyzing the content of an email communicationsmessage. For example, when email messages are audibly rendered to a uservia the telephonic communications device 604, (e.g., telephone), oftenthe messages can be very long and difficult to follow. A novel featureof an aspect of this invention can employ logic and/or reasoningtechniques to identify the most important messages and/or sentences(e.g., content) included in a communication. These logic and/orreasoning mechanisms can employ rule-based and/or artificialintelligence (AI) mechanisms to effect filtering and/or sorting of thecontent. Once identified, a streamlined or condensed version of thecontent can be audibly rendered to a user.

As previously described, the UM system 602 can limit the audibleplayback of email messages to include only the most important messagesand/or sentences included therein. It will be appreciated that becausethe content can be filtered and/or sorted in accordance with a desiredalgorithm (e.g., rule based, AI), the quantity and length of themessage(s) that are read to the user can be decreased. Likewise,important voicemail messages can be handled (e.g., filtered, sorted) inthe same manner. Of course, when people receive many email messages overthe telephone it can be difficult to navigate to the particular messagesthat are important to the user. With this invention, importantvoicemails can be identified by the UM system 702 and read to the userfirst. As well, voice messages can be filtered whereby only portions ofthe voicemails are read to the user.

Another novel feature of the subject invention is directed to facsimiletransmissions. By way of example, in some organizations, all inboundfacsimiles are directed to one mailbox where a router looks at thefacsimile and directs it, via electronic means, to the appropriateperson in the organization. If the facsimile message contains sensitiveinformation, the person who is redirecting the facsimile would haveaccess to information that was intended to be confidential. Inaccordance with an aspect of this invention, the UM system 602 canemploy the fax media processing component 718 to separate the cover pagefrom the remaining pages of a facsimile transmission. Therefore, therouter who is redirecting the message can only have access to the coverpage of the facsimile and not the confidential contents.

In another scenario, when people call a user and are transferred to thevoicemail system, but do not leave a message, the callee does not alwaysknow that someone has called. In accordance with an aspect of thisinvention, the UM system 602 can generate and forward an email messageto the callee thereby notifying that someone has called but did notleave a voicemail message.

Still another novel aspect of the invention is directed to policy andcompliance integration with an email system. Conventionally, voicemessages are stored on a server (e.g., server component 606) and areretained and/or archived according to an arbitrary or preprogrammedpolicy. For example, one such policy can delete messages after aspecific number of days (e.g., 21). With this invention (e.g.,integration with the email system), a user can control which messagesare deleted or archived from the telephonic communications component604. As well, logic and/or reasoning mechanisms can be applied toautomatically manage retention and/or deletion of messages.

Yet another aspect of the invention is directed to a system and/ormethodology to permit a user to select a keystroke profile scheme. Itwill be appreciated that different voicemail systems can have differentkeys to navigate and control the telephone user interface. If userschange from one system to another, they often have to learn the new keysto use the new system. With this invention, button profiles can beemployed for the most commonly used systems. Accordingly, a user canchoose a predetermined profile that is familiar to that particular user.As well, buttons can be programmed as desired by a specific user. Inthis manner, the user does not necessarily have to learn a new keystrokeprofile scheme to access a new system.

Another novel aspect of the security component 808 is directed toemploying voice recognition techniques to effect voicemailauthentication. Today, when users access their mailbox from thetelephone, they typically key in a PIN as their password. In many cases,this is not very secure and is inconvenient to the user (e.g., accessingwhile driving a car). With this invention, users can audibly speak aphrase or desired PIN to gain access to their mailbox. This can be moreconvenient and also more secure as the voice phrase must match apreviously recorded phrase by the user. As well, the system can beprogrammed to learn qualities (e.g., voice tonal qualities) specific toa user.

Yet another exemplary aspect is directed to end-user configuration ofmenus and prompts. When end-users access their mailbox via thetelephone, they do not have the capability to change the buttons or theinformation that is played back to them during the greeting. With thisinvention, users can specify a location of their greeting, therefore,depending on the user role, a more detailed greeting that containsadditional information may be used. For example, an IT administratormight choose to put the number of critical escalation cases in theirmain mailbox greeting. In alternate aspects, it is to be appreciatedthat prompts (e.g., audio) can be customized on a per user basis. Aswell, the ordering of the state machine can user customizable.

In summary, aspects of the subject invention are directed toward atleast the following novel components employed in connection with the UMsystem 602.

OOF Voicemail Greeting Integration with Email Application—The aspectthat the email and voicemail systems OOF status can be content matchedthereby enabling a user to set the OOF status from one place. Forexample, the auto-reply email body can be read to the user as thetelephone greeting using TTS mechanisms.

Calendar Access—Capability to act on and interact with calendarappointments from the telephone in a novel manner. For example, a usercan accept, decline, cancel, transfer to the phone of the meetinglocation, and initiate an email message to the meeting participants.

Contact List Access—Capability to access personal contact list, ratherthan just the company directory. Ability to send, via the telephone, anemail and sound file attachment to an email account.

PIN Reset—Allowing the user to reset a password (e.g., voicemailpassword) via an email client. It will be understood that the operatingsystem security credentials can maintain security.

Digital Rights Management for Voicemail—Digital rights for voicemailsare a new and novel concept. In other words, the invention can beemployed to control and/or restrict access to voicemail content. Forinstance, a recipient can listen to a voicemail, but can be restrictedfrom forwarding or saving the message.

Text Preview of Voicemails—Using speech to text conversion techniques,the subject invention can convert recorded voicemails into a textualmessage. The message can then be sent to the recipient via an emailclient application. As well, the system contemplates text-to-speechconversion for text messages. Moreover, the system contemplatesgenerating and attaching a sound file (e.g., .wav format) of a voicemessage to an email. Thus, the email and attachment can be forwarded tothe recipient.

Secure Facsimile Handling—The subject invention can extract the coverpage (e.g., first page) from a received facsimile transmission thereby,retaining confidentiality of remaining pages of the transmission.

Most Importance Sentences—Based upon predefined logic and/or reasoningtechniques, the invention can determine and rank sentences of acommunication (e.g., email and/or voicemail) in terms of importance. Forexample, ranking can occur with regard to a given an email thread andkey words contained therein. It will be appreciated that the ranking ofsentences and/or keywords can generally provide a summary of the entireemail without having to review it completely. Additionally, aspects aredirected to using this technology for reading textual emails via thetelephone, which is also a novel concept of the invention.

Important Messages—The fact that users can optionally apply filteringcriteria (e.g., rule-based, AI) is particularly novel with respect toemail messages. The subject invention can analyze email threads and rankthem accordingly. By way of example, the system can determine the senderof a message, employ a policy, logic and/or reasoning mechanism therebyranking and/or categorizing the importance of the messages. In oneaspect, the system can use this technology to determine an order withrespect to reading the messages to the user over the telephone. As well,this technology can be employed to filter emails prior to presentingthem to a user via a telephone.

Missed Call Notification—This component can be integrated into theunified messaging system thereby providing third party call control bymonitoring traffic. In one aspect, the system can monitor and advise aclient of received calls.

Policy and Compliance Integration with Email System—novel rule-basedand/or AI policies can be applied to voicemails and/or emails therebyeffecting management and retention of the content.

Button Profiles—The subject invention provides for functionality thatintegrates novel button profile definition mechanisms.

Spoken Password Voicemail Authentication—The invention can employ asecure spoken password to access a voicemail and/or email mailboxthrough a telephone. This audible authentication is a novel use of theauthentication technology.

End-User Configuration of Menus and Prompts—The subject inventionprovides for the ability to customize end-user menus and prompts.

FIG. 9 illustrates an exemplary flow chart of acts to employ an OOFvoice message to set an email OOF notification. While, for purposes ofsimplicity of explanation, the one or more methodologies shown herein,e.g., in the form of a flow chart or diagram, are shown and described asa series of acts, it is to be understood and appreciated that thesubject invention is not limited by the order of acts, as some acts may,in accordance with the subject invention, occur in a different orderand/or concurrently with other acts from that shown and describedherein. For example, those skilled in the art will understand andappreciate that a methodology could alternatively be represented as aseries of interrelated states or events, such as in a state diagram.Moreover, not all illustrated acts may be required to implement amethodology in accordance with the subject invention.

At 902, an audible OOF message is recorded. The system can identifycorresponding email account(s) at 904. Once identified, conversion canbegin. At 906, the audible OOF message can be converted to a text OOFmessage. Accordingly, at 908, the text OOF message can be applied to theidentified email account(s). Thus, although different format (e.g.,voicemail vs. email), the content of the OOF can be replicated to thedisparate system. Although the methodology of FIG. 9 illustrates aprocess that can convert a voicemail OOF into an email OOF, it is to beunderstood that an alternate novel aspect of the subject invention canbe employed to convert an email OOF into a voicemail system.

As described supra, it is to be appreciated that the aforementionednovel aspects of the invention can employ rule-based logic and/or AIreasoning technology to effect, predict and/or infer an action. Moreparticularly, it will be appreciated that the subject invention (e.g.,in connection with content analysis, content retention policy,synchronization, voice recognition) can employ various rule-based and/orAI-based schemes for carrying out various aspects thereof.

Continuing with the above described scenarios and with reference to FIG.10, a block schematic view of an alternative UM application component720 is shown. As illustrated, UM application component 720 can include arule-based logic engine 1002. As will later be described with referenceto FIG. 11, an optional AI component (not shown) can be used togetherwith, or in place of, the rule-based logic engine 1002 to automaticallyinfer an action or set of actions to be employed in connection with thefunctionality of the UM application component 720 (and UM system 602)described supra.

In the exemplary aspect of FIG. 10, the rule-based logic engine 1002 canbe programmed or configured in accordance with a predefined preference(e.g., rule). For example, a rule (e.g., logic) can be constructed toautomatically prioritize emails based upon a defined hierarchy. Inaccordance therewith, the emails can be converted and read to a user ina prioritized order. More particularly, a rule can be established totake into consideration the subject, sender identification, recipientidentification, etc., to prioritize and process emails. In anotheraspect, a rule can be established to predetermine or define a policywhereby emails and/or voicemails can be managed (e.g., retained,forwarded, deleted) in accordance with the policy.

A schematic diagram of another alternative aspect of the subjectinvention is illustrated in FIG. 11. The UM application component 720 ofthis alternative aspect illustrated in FIG. 11 employs an optional AIcomponent 1102 that can automatically infer and/or predict an action.This alternative aspect can optionally include an inference module (notshown) that facilitates automatic control and/or operation of the UMapplication component 720.

In accordance with this aspect, the optional AI component 1102 canfacilitate automatically performing various aspects (e.g., analysis andprioritization of content, content retention policy, synchronization,voice recognition) of the subject invention as described herein. The AIcomponent 1102 can optionally include an inference component (not shown)that can further enhance automated aspects of the AI componentutilizing, in part, inference based schemes to facilitate inferringintended actions to be performed at a given time and/or state. TheAI-based aspects of the invention can be effected via any suitablemachine-learning based technique and/or statistical-based techniquesand/or probabilistic-based techniques.

In the alternate aspect, as further illustrated by FIG. 11, the subjectinvention (e.g., in connection with content analysis, content retentionpolicy, synchronization, voice recognition) can optionally employvarious artificial intelligence based schemes for automatically carryingout various aspects thereof. Specifically, the AI component 1102 canoptionally be provided to implement aspects of the subject inventionbased upon AI processes (e.g., confidence, inference). For example, aprocess for determining the prioritization of content in an email basedupon user preferences or sender identification can be facilitated via anautomatic classifier system and process. Further, the optional AIcomponent 1102 can be employed to facilitate an automated process ofrendering prioritized content to a user based upon a predicted and/orinferred preference.

A classifier is a function that maps an input attribute vector, x=(x1,x2, x3, x4, xn), to a confidence that the input belongs to a class, thatis, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action that auser desires to be automatically performed.

A support vector machine (SVM) is an example of a classifier that can beemployed. The SVM operates by finding a hypersurface in the space ofpossible inputs, which hypersurface attempts to split the triggeringcriteria from the non-triggering events. Intuitively, this makes theclassification correct for testing data that is near, but not identicalto training data. Other directed and undirected model classificationapproaches include, e.g., naive Bayes, Bayesian networks, decisiontrees, and probabilistic classification models providing differentpatterns of independence can be employed. Classification as used hereinalso is inclusive of statistical regression that is utilized to developmodels of priority.

As will be readily appreciated from the subject specification, thesubject invention can employ classifiers that are explicitly trained(e.g., via a generic training data) as well as implicitly trained (e.g.,via observing user behavior, receiving extrinsic information). Forexample, SVM's can be configured via a learning or training phase withina classifier constructor and feature selection module. In other words,the use of expert systems, fuzzy logic, support vector machines, greedysearch algorithms, rule-based systems, Bayesian models (e.g., Bayesiannetworks), neural networks, other non-linear training techniques, datafusion, utility-based analytical systems, systems employing Bayesianmodels, etc., are contemplated and are intended to fall within the scopeof the hereto appended claims.

Illustrated in FIGS. 12 to 16 are flow diagrams of an exemplary userinterface (UI) of a UM system in accordance with an aspect of theinvention. As described supra, this UM system can facilitate managementof voicemail, email and faxes stored in a server mailbox. The subjectinvention facilitates access to and management of this information froma telephone UI. In accordance with the UI, users are able to accesstheir voicemail and other useful information from the telephone in lieuof accessing a desktop computer or handheld device.

In accordance with the invention, FIGS. 12 to 16 are illustrativeexamples of a DTMF process flow in accordance with a disclosed aspect.Similarly, FIGS. 17 to 21 are illustrative examples of a speechactivated process flow in accordance with a disclosed aspect. Asdescribed supra, it is to be appreciated that the DTMF and speechrecognition interfaces can be active concurrently with respect to UMsystem navigational mechanisms.

Following are exemplary scenarios that this invention can address. Inthe first scenario, suppose a user is headed to a meeting in a remotelocation, but is not sure which room in the building the meeting will beheld. The user may want to quickly find this information while drivinghis car toward the meeting. One aspect of this invention can facilitatetelephonic retrieval of this information.

In another scenario, suppose a user is actually late to a meeting anddesires to call into the conference room to participate over the phonebefore getting there. Here, the user can telephonically access themeeting location information and subsequently be transferred to themeeting location.

In a third scenario, suppose a user is driving to work in the morningand wants to get a head start on the some of the issues that are pendingin emails or voicemails. From the telephone UI, the user can quicklyreview the different issues, reply as desired, and follow-up with thepeople involved with the issues.

In a final exemplary scenario, suppose a user is in a hotel room withoutaccess to a printer and wishes to send emails as well as calendarappointments for the following day to the hotel fax so that the user canreview materials and plan the day. One aspect of the inventionfacilitates this functionality via a telephonic connection. Theprocedure flow of these and other aspects will be better understood upona review of FIGS. 12 to 16 that follow.

Referring now to FIG. 12, an exemplary process task flow diagram ofcalling into a UM is shown. The process illustrates a flow of proceduresin accordance to a call initiated by an external caller 1202 and aninternal caller 1204. As illustrated, the process flow of the exemplaryaspect is dependent upon the type of caller (e.g., external 1202 orinternal 1204) as well as the contact number dialed at 1206. An externalcaller will be prompted with the company information at 1208 whereby aninternal caller with internal information at 1210.

In each scenario, a caller can contact a user located on the system byspelling the name and employing the directory search at 1212 or byconnecting directly to the extension (1214) by entering the numericextension. If the user does not answer, at 1216, the system can play theappropriate greeting (e.g., external, internal, OOF) in accordance withthe type of caller. Accordingly, a voicemail message can be recorded at1218. If a pre-designated key (e.g., “*”) is pressed, the system canenter the callee mailbox at 1220.

It is to be appreciated that the callee can access the mailbox directlyfrom 1220 by choosing a pre-designated key (e.g., “#”) from the companyand/or internal greeting menu (1208, 1210). This direct access willprompt the callee for necessary information at 1222. In each case, oncethe appropriate security credential information is entered at 1220,access to the UM is gained at 1224. FIG. 13 illustrates a continuedprocedure flow diagram once access is granted.

Referring now to FIG. 13, once access to the UM is granted at 1224, theuser can be prompted with a main menu at 1302. By way of example, theuser can be prompted to press “1” for voicemail, “2” for calendaroptions, “3” for contacts, “4” for email and so on. Option numbers “2”and “3”, e.g., calendar options and contacts, will be discussed ingreater detail with reference to FIGS. 14 and 15 respectfully. By way offurther example, a user can choose “5” to send a message (e.g.,voicemail, email) or “7” to set an OOF. Additional exemplary menuchoices are illustrated in block 1302.

As shown, if voicemail or email is chosen the system proceeds to 1304whereby content can be presented to the user. In other words, the usercan be presented with voicemail, email and/or meeting request content.It is to be appreciated that logic and reasoning mechanisms can beemployed to manage, organize, filter and/or sort the content asdescribed supra. As illustrated, once the content is presented, the usercan be presented with an “after message” menu thereby presentingadditional options. By way of example, by pressing “4” a user can send afacsimile of a desired message. In other words, once a user listens to avoicemail and/or TTS converted email, the user can opt to send afacsimile of the message to a desired location. As well, by pressing“3”, the user can reply to the message or accept a meeting appointmentrequest. By choosing option “2”, a user can call the sender of aparticular message at 1306. This “call” option will be discussed ingreater detail with reference to FIG. 15. It is to be appreciated thatthe options shown in the UI process flow of FIG. 13 are exemplary andare not intended to be an exhaustive list of options available to auser.

At 1308, a list of exemplary play commands, which are presented duringplayback of a message, are shown. Again, this list is not intended to beexhaustive in view of the functionality described herein. Asillustrated, it will be appreciated that the system can effect a pause,undelete, repeat, etc., task in accordance with options shown at 1306.

Turning now to FIG. 14, an exemplary flow diagram of calendar access isshown. At 1402, the system can play the number of pending meetings. Aswell, as illustrated at 1402, the user can manage the meetingappointments and/or requests by selecting any of various options. Forexample, the user can select option “2” to call the meeting location,“2,2” to call the meeting organizer or “3” to indicate a late arrival tothe subject meeting. As well, additional navigational options can bepresented to the user as illustrated.

FIG. 15 illustrates an exemplary process flow to effect generating acall from the contacts menu. It is to be appreciated that a call canalso be generated in accordance with a meeting request/appointment or areceived communication. Referring again to FIG. 15, once a contact islocated via the directory search at 1212, the system can present userinformation at 1502. The information presented at 1502 can effect anydesired task. By way of example, the user can call or send a message tothe contact by pressing “2” or “3” respectively. If the user chooses tocall, the process continues to generate the call as illustrated.

Illustrated in FIG. 16 is a process flow diagram to record a message.The message is recorded at 1602. At 1604, the user is presented with avariety of options to manage the recording. For example, the user canmark the message with high priority by depressing “1,1” or restrictaccess by depressing “5”. Once complete, the user can exit the system at1606.

FIGS. 17 to 21 illustrate exemplary process flow diagrams of a UM systemthat employs a speech UI. As described supra, a user can selectivelyemploy disparate navigational mechanisms with respect to the applicationstate machine (e.g., UM system). The process flow diagrams of FIGS. 17to 21 illustrate the co-existence of the DTMF UI (FIGS. 12 to 16) and aspeech activated UI. It is to be understood that a user can employ anyavailable UI at any time in connection with navigating within anapplication state machine.

Referring now to FIG. 17, an exemplary process task flow diagram ofcalling into a UM system is shown. As discussed with reference with FIG.12, the process illustrates a flow of procedures in accordance to a callinitiated by an external caller 1202 and an internal caller 1204. Asillustrated, the process flow of the exemplary aspect is dependent uponthe type of caller (e.g., external 1202 or internal 1204) as well as thecontact number dialed at 1206. An external caller will be prompted withthe company information at 1208 whereby an internal caller with internalinformation at 1210.

In each scenario, a caller can contact a user located on the system byemploying the directory search (1212 of FIG. 12) or by connectingdirectly to the extension (1214) by entering the numeric extension. Asillustrated in FIG. 17, the user can speak commands at 1702 to effect adesired option. As well, at 1704, the user can verbally instruct thesystem of a desired target person to contact. At any time, a user canspeak the word “help” (1706) to access available system options. FIG. 18illustrates a continued procedure flow diagram that includes voiceoptions once access is granted.

Referring now to FIG. 18, once access to the UM system is granted at1224, the user can be prompted with a main menu at 1302. By way ofexample, the user can be prompted to press “1” for voicemail, “2” forcalendar options, “3” for contacts, “4” for email and so on. By way offurther example, a user can choose “5” to send a message (e.g.,voicemail, email) or “7” to set an OOF. Additional exemplary DTMF menuchoices are illustrated in block 1302. As well, if desired, voicecommands can be employed at 1802 in order to effect navigation.

As shown, if voicemail or email is chosen the system proceeds to 1304whereby content can be presented to the user. In other words, the usercan be presented with voicemail, email and/or meeting request content.It is to be appreciated that logic and reasoning mechanisms can beemployed to manage, organize, filter and/or sort the content asdescribed supra. As illustrated, once the content is presented, the usercan be presented with an “after message” menu thereby presentingadditional options. By way of example, by pressing “4” a user can send afacsimile of a desired message. In other words, once a user listens to avoicemail and/or TTS converted email, the user can opt to send afacsimile of the message to a desired location. As well, by pressing“3”, the user can reply to the message or accept a meeting appointmentrequest. By choosing option “2”, a user can call the sender of aparticular message at 1306. It is to be appreciated that the optionsshown in the UI process flow of FIG. 18 are exemplary and are notintended to be an exhaustive list of options available to a user.

It will further be appreciated that the voice commands shown at 1804 canbe employed “during” or “after message” playback. In other words, thevoice commands can be reused in either scenario. These reusable commandsare listed on FIG. 18 as “anytime” commands.

At 1308, a list of exemplary DTMF play commands, which are presentedduring playback of a message, are shown. Again, this list is notintended to be exhaustive in view of the functionality described herein.As illustrated, it will be appreciated that the system can effect apause, undelete, repeat, etc., task in accordance with options shown at1308. In one aspect at 1806, speech commands and options can be employedin connection with pausing a playback.

Turning now to FIG. 19, an exemplary flow diagram of calendar access isshown. At 1402, the system can play the number of pending meetings. Aswell, as illustrated at 1402, the user can manage the meetingappointments and/or requests by selecting any of various options. Forexample, the user can select option “2” to call the meeting location,“2,2” to call the meeting organizer or “3” to indicate a late arrival tothe subject meeting. As well, additional navigational options can bepresented to the user as illustrated. For example, as illustrated, auser can employ speech commands at 1902 to effect calendar playback.

FIG. 20 illustrates an exemplary process flow to effect generating acall from the contacts menu. It is to be appreciated that a call canalso be generated in accordance with a meeting request/appointment or areceived communication. Referring again to FIG. 20, once a contact isverbally located via the directory search at 2002, the system canpresent user information at 1502. The information presented at 1502 caneffect any desired task. By way of example, the user can call or send amessage to the contact by pressing “2” or “3” respectively. If the userchooses to call, the process continues to generate the call asillustrated. Additionally, at 2004, the user can effect communicationwith a contact by employing speech commands. For example, the user canaudibly instruct the system to “find” a particular person. Next, theuser can audibly tell the system to send an email message to the locatedcontact.

Illustrated in FIG. 21 is a process flow diagram to record a message.The message is recorded at 1602. At 1604, the user is presented with avariety of options to manage the recording. For example, the user canmark the message with high priority by depressing “1,1” or restrictaccess by depressing “5”. Once complete, the user can exit the system at1606. As discussed with respect to the other exemplary flow diagrams, auser at any time can opt to communicate with the system via anotheravailable UI (e.g., speech recognition). In the example of FIG. 21, theuser can speak the commands identified at 2102 thus navigating throughthe application state machine (e.g., UM system).

Referring now to FIG. 22, there is illustrated a block diagram of acomputer operable to execute the disclosed architecture. In order toprovide additional context for various aspects of the subject invention,FIG. 22 and the following discussion are intended to provide a brief,general description of a suitable computing environment 2200 in whichthe various aspects of the subject invention can be implemented. Whilethe invention has been described above in the general context ofcomputer-executable instructions that may run on one or more computers,those skilled in the art will recognize that the invention also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the invention may also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and nonvolatile media,removable and non-removable media. By way of example, and notlimitation, computer readable media can comprise computer storage mediaand communication media. Computer storage media includes both volatileand nonvolatile, removable and non-removable media implemented in anymethod or technology for storage of information such as computerreadable instructions, data structures, program modules or other data.Computer storage media includes, but is not limited to, RAM, ROM,EEPROM, flash memory or other memory technology, CD-ROM, digital videodisk (DVD) or other optical disk storage, magnetic cassettes, magnetictape, magnetic disk storage or other magnetic storage devices, or anyother medium which can be used to store the desired information andwhich can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 22, there is illustrated an exemplaryenvironment 2200 for implementing various aspects of the invention thatincludes a computer 2202, the computer 2202 including a processing unit2204, a system memory 2206 and a system bus 2208. The system bus 2208couples system components including, but not limited to, the systemmemory 2206 to the processing unit 2204. The processing unit 2204 can beany of various commercially available processors. Dual microprocessorsand other multi-processor architectures may also be employed as theprocessing unit 2204.

The system bus 2208 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 2206includes read only memory (ROM) 2210 and random access memory (RAM)2212. A basic input/output system (BIOS) is stored in a non-volatilememory 2210 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 2202, such as during start-up. The RAM 2212 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 2202 further includes an internal hard disk drive (HDD)2214 (e.g., EIDE, SATA), which internal hard disk drive 2214 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 2216, (e.g., to read from or write to aremovable diskette 2218) and an optical disk drive 2220, (e.g., readinga CD-ROM disk 2222 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 2214, magnetic diskdrive 2216 and optical disk drive 2220 can be connected to the systembus 2208 by a hard disk drive interface 2224, a magnetic disk driveinterface 2226 and an optical drive interface 2228, respectively. Theinterface 2224 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1394 interfacetechnologies.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 2202, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the exemplary operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the subject invention.

A number of program modules can be stored in the drives and RAM 2212,including an operating system 2230, one or more application programs2232, other program modules 2234 and program data 2236. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 2212. It is appreciated that the subject invention canbe implemented with various commercially available operating systems orcombinations of operating systems.

A user can enter commands and information into the computer 2202 throughone or more wired/wireless input devices, e.g., a keyboard 2238 and apointing device, such as a mouse 2240. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 2204 through an input deviceinterface 2242 that is coupled to the system bus 2208, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 2244 or other type of display device is also connected to thesystem bus 2208 via an interface, such as a video adapter 2246. Inaddition to the monitor 2244, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 2202 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 2248. The remotecomputer(s) 2248 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer2202, although, for purposes of brevity, only a memory storage device2250 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 2252 and/orlarger networks, e.g., a wide area network (WAN) 2254. Such LAN and WANnetworking environments are commonplace in offices, and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich may connect to a global communication network, e.g., the Internet.

When used in a LAN networking environment, the computer 2202 isconnected to the local network 2252 through a wired and/or wirelesscommunication network interface or adapter 2256. The adaptor 2256 mayfacilitate wired or wireless communication to the LAN 2252, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adaptor 2256. When used in a WAN networkingenvironment, the computer 2202 can include a modem 2258, or is connectedto a communications server on the WAN 2254, or has other means forestablishing communications over the WAN 2254, such as by way of theInternet. The modem 2258, which can be internal or external and a wiredor wireless device, is connected to the system bus 2208 via the serialport interface 2242. In a networked environment, program modulesdepicted relative to the computer 2202, or portions thereof, can bestored in the remote memory/storage device 2250. It will be appreciatedthat the network connections shown are exemplary and other means ofestablishing a communications link between the computers can be used.

The computer 2202 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™.wireless technologies. Thus, the communication can be a predefinedstructure as with conventional network or simply an ad hoc communicationbetween at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room or a conference room at work,without wires. Wi-Fi is a wireless technology like a cell phone thatenables such devices, e.g., computers, to send and receive data indoorsand out; anywhere within the range of a base station. Wi-Fi networks useradio technologies called IEEE 802.11 (a, b, g, etc.) to provide secure,reliable, fast wireless connectivity. A Wi-Fi network can be used toconnect computers to each other, to the Internet, and to wired networks(which use IEEE 802.3 or Ethernet). Wi-Fi networks operate in theunlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11 a) or 54Mbps (802.11 b) data rate, for example, or with products that containboth bands (dual band), so the networks can provide real-worldperformance similar to the basic 10 BaseT wired Ethernet networks usedin many offices.

Referring now to FIG. 23, there is illustrated a schematic block diagramof an exemplary computing environment 2300 in accordance with thesubject invention. The system 2300 includes one or more client(s) 2302.The client(s) 2302 can be hardware and/or software (e.g., threads,processes, computing devices). The client(s) 2302 can house cookie(s)and/or associated contextual information by employing the subjectinvention, for example. The system 2300 also includes one or moreserver(s) 2304. The server(s) 2304 can also be hardware and/or software(e.g., threads, processes, computing devices). The servers 2304 canhouse threads to perform transformations by employing the subjectinvention, for example. One possible communication between a client 2302and a server 2304 can be in the form of a data packet adapted to betransmitted between two or more computer processes. The data packet mayinclude a cookie and/or associated contextual information, for example.The system 2300 includes a communication framework 2306 (e.g., a globalcommunication network such as the Internet) that can be employed tofacilitate communications between the client(s) 2302 and the server(s)2304.

Communications can be facilitated via a wired (including optical fiber)and/or wireless technology. The client(s) 2302 are operatively connectedto one or more client data store(s) 2308 that can be employed to storeinformation local to the client(s) 2302 (e.g., cookie(s) and/orassociated contextual information). Similarly, the server(s) 2304 areoperatively connected to one or more server data store(s) 2310 that canbe employed to store information local to the servers 2304.

What has been described above includes examples of the subjectinvention. It is, of course, not possible to describe every conceivablecombination of components or methodologies for purposes of describingthe subject invention, but one of ordinary skill in the art mayrecognize that many further combinations and permutations of the subjectinvention are possible. Accordingly, the subject invention is intendedto embrace all such alterations, modifications and variations that fallwithin the spirit and scope of the appended claims. Furthermore, to theextent that the term “includes” is used in either the detaileddescription or the claims, such term is intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

1. A method of employing a unified messaging system, the methodcomprising: concurrently providing a plurality of user interfaces thatfacilitate navigating through the unified messaging system; selectingone of the plurality of user interfaces; transmitting an instruction tothe unified messaging system via the selected user interface; andprocessing the instruction to control operation of the unified messagingsystem.
 2. The method of claim 1, further comprising alternativelyselecting another of the plurality of user interfaces and transmitting asecond instruction in accordance with the alternative user interface. 3.The method of claim 1, wherein processing the instruction comprises:receiving a message of a first format from a first device; analyzing themessage; transforming the message to a second format that corresponds toa second device; and synchronizing the messages of the first format andthe second format.
 4. The method of claim 3, wherein receiving themessage of the first format comprises receiving a voicemailcommunication.
 5. The method of claim 3, wherein transforming themessage to the second format comprises transforming the message to anemail communication.
 6. The method of claim 3, further comprisingconveying content of the message.
 7. The method of claim 6, whereinconveying the content of the message comprises employing at least one ofthe following: rule-based logic and artificial intelligence.
 8. Themethod of claim 7, wherein employing at least one of the following: therule-based logic and the artificial intelligence comprises at least oneof the following: analyzing the content of the message, and ranking themessage according to importance.
 9. The method of claim 1, furthercomprising: receiving audible information from an individual viatelephone; and reformatting the information.
 10. The method of claim 9,further comprising populating a calendar with the reformattedinformation.
 11. The method of claim 1, further comprising: receiving afirst navigation command via a first navigation input mechanism; andselecting a first user interface of the plurality of user interfacesbased on a first type of the first navigation input mechanism, the firstuser interface being associated with the first navigation inputmechanism.
 12. The method of claim 11, further comprising entering afirst state within the unified messaging system via the first userinterface in accordance with the first navigation command.
 13. Themethod of claim 12, further comprising: receiving a second navigationcommand via a second navigation input mechanism, the second navigationinput mechanism being a second type different from the first type; andselecting a second user interface of the plurality of user interfacesbased on the second type of the second navigation input mechanism, thesecond user interface being associated with the second navigation inputmechanism.
 14. The method of claim 13, further comprising entering asecond state within the unified messaging system via the second userinterface in accordance with the second navigation command, the secondstate being different from the first state.
 15. The method claim 1,further comprising conveying, by the unified messaging system, availablecommands associated with the selected one of the plurality of userinterfaces.
 16. The method of claim 15, wherein conveying, by theunified messaging system, the available commands comprises conveying theavailable commands based on an input mechanism used to interact with theunified messaging system.
 17. A system that facilitates navigatingwithin an application state machine, the system comprising: a processor;a user interface store that retains a plurality of user interfaces thatare each associated with a navigation input mechanism; a user interfaceselection component, executed by the processor, that facilitatesselecting one of the plurality of user; and a user interface component,executed by the processor, that conveys a distinct set of prompts andmenus associated with each user interface, wherein the distinct set ofprompts and menus associated with each user interface change based onthe navigation input mechanism.
 18. The system of claim 17, wherein theuser interface component is configured to provide, upon first entry intothe application state machine: a default user interface based on a setpersonal option, and a corresponding distinct set of prompts and menusassociated with the default user interface, the corresponding distinctset of prompts being cooperative with both: a dual tone multi-frequencyinput and a microphone input.
 19. The system of claim 18, wherein theplurality of user interfaces is concurrently available during a singlenavigation session to effect navigation within the application statemachine.
 20. A computer-readable medium having a set of instructionswhich when executed performs a method for facilitates navigating withinan application state machine, the method executed by the set ofinstructions comprising: presenting, upon first entry into theapplication state machine, a default user interface mechanism of aplurality of user interface mechanisms; enable, at any point within theapplication state machine, user interaction with any one of a pluralityof user interface mechanisms that facilitate navigating through theapplication state machine, each of the plurality of user interfacemechanisms being associated with a different navigation input mechanismof a plurality of navigation input mechanisms and having a distinct setof prompts and menus; receive a navigation command via a navigationinput mechanism of the plurality of navigation input mechanisms; selecta user interface mechanism of the plurality of user interface mechanismsbased on a type of the navigation input mechanism; receive aninstruction via the user interface mechanism; and process theinstruction to control the application state machine.