WO2001065871A1 - Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls - Google Patents

Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls Download PDF

Info

Publication number
WO2001065871A1
WO2001065871A1 PCT/US2001/000604 US0100604W WO0165871A1 WO 2001065871 A1 WO2001065871 A1 WO 2001065871A1 US 0100604 W US0100604 W US 0100604W WO 0165871 A1 WO0165871 A1 WO 0165871A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
message
unified
user
messages
Prior art date
Application number
PCT/US2001/000604
Other languages
French (fr)
Inventor
Julia Skladman
Robert J. Thornberry, Jr.
Bruce A. Chatterly
Alexandr Siu-Kay Ng
Bruce L. Peterson
Original Assignee
Ameritech Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/514,653 external-priority patent/US6498835B1/en
Priority claimed from US09/515,030 external-priority patent/US6487278B1/en
Priority claimed from US09/515,784 external-priority patent/US6438215B1/en
Application filed by Ameritech Corporation filed Critical Ameritech Corporation
Priority to AU2001226360A priority Critical patent/AU2001226360A1/en
Publication of WO2001065871A1 publication Critical patent/WO2001065871A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/53Centralised arrangements for recording incoming messages, i.e. mailbox systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/224Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/45Aspects of automatic or semi-automatic exchanges related to voicemail messaging
    • H04M2203/4509Unified messaging with single point of access to voicemail and other mail or messaging systems

Definitions

  • the present invention generally relates to communication systems, and in particular to
  • a unified messaging system that processes messages based on user profiles.
  • voice mail messages are typically transferred using a switched telephone network.
  • mail messages are typically sent over computer networks, and to access e-mail messages, the
  • voice mail, e-mail, fax, and other message types can be received by the unified system.
  • storage can be centralized, while retrieval of messages can be accomplished with a user selected
  • a user may choose to receive all
  • FIG. 1 is a block diagram illustrating a messaging system in accordance with an
  • FIG.2 is a block diagram illustrating an alternative architecture ofthe messaging system shown in FIG. 1.
  • FIG. 3 is a block diagram illustrating a second alternative architecture of the
  • FIG.4 is a detailed block diagram illustrating an interface between a server in the
  • FIG. 5 shows a flowchart diagram illustrating the operation of the unified
  • FIG. 6 shows a flowchart diagram illustrating the operation ofthe middleware
  • FIG. 7 is a detailed block diagram illustrating the user interface shown in FIGS.
  • FIG. 8 shows a flowchart diagram illustrating the operation ofthe user interface.
  • FIG. 9 is a block diagram conceptually illustrating the operation of the user
  • FIG. 10 shows a flowchart diagram illustrating the operation of the filter
  • FIG. 11 is a detailed block diagram ofthe telephone adjunct shown in FIGS. 1-3.
  • FIG. 12 shows a flowchart diagram illustrating the operation of the telephone
  • the legacy messaging systems can include voice mail and e-mail servers
  • LANs local area networks
  • firewall servers external access by firewall servers.
  • the system ofthe present invention can include
  • the proxy a unified message server, a proxy interface, and a message protocol converter.
  • the interface is configured to access the legacy systems in response to a request from the unified
  • FIG. 1 there is illustrated an
  • the system 20 includes an enterprise communication system 22 in communication
  • telco central office CO
  • dedicated unified messaging center 26 The enterprise
  • system 22 provides conventional telephony and computer services to users within a
  • the telco CO 24 provides leased telephone and voice mail services to the enterprise.
  • the unified telco CO 24 provides leased telephone and voice mail services to the enterprise.
  • the messaging center 26 provides unified messaging services to the enterprise 22.
  • the system 20
  • the enterprise system 22 includes a legacy e-mail server 28, a plurality of
  • NAS network access server
  • middleware server 34
  • firewall 34
  • a LAN 46 connects the computer workstations 30, the e-
  • enterprise system 22 is a Centrex group 40 and one or more conventional telephones 42.
  • adjunct display 44 for notifying users of messages can be connected to the telephone 42.
  • adjunct display 44 can also be attached to or included with any ofthe terminal units included in
  • the telco CO 24 includes a local digital switch (LDS) 48 and a voice mail server
  • the LDS 48 provides enterprise-wide telephone service to the enterprise system 22, while
  • the voice mail server 50 provides enterprise voice mail services.
  • the LDS 48 can be a
  • class 5 digital switch such as a Meridian 1 switch manufactured by
  • the voice mail server 50 can be
  • the services of LDS 48 and voice mail server 50 can be provided by
  • privately owned equipment residing within the enterprise system 22, such as a privately owned voice mail server connected to a private branch exchange (PBX).
  • PBX private branch exchange
  • the computer workstations 30 can be any type of computer workstations 30.
  • the computer workstations 30 can be any type of computer workstations 30.
  • PCs personal computers having e-mail client software, such as Lotus Notes,
  • the NAS 32 can be a commercially-available modem pool, such as PortMaster ®
  • the NAS 32 permits remote users to
  • the LAN 46 can be a conventional commercially-available computer network,
  • the network router 38 can be a conventional network
  • router permitting data traffic to flow between the LAN 46 and an external computer network 47.
  • the router 38 can be implemented using a commercially-available computer network router,
  • the firewall server 36 can be a conventional PC server configured to limit access
  • firewall server 36 restricts remote access
  • the firewall 36 can be any firewall
  • firewall software application implemented using a PC server running a commercially-available firewall software application
  • FireWall-1 such as FireWall-1 ® from Check Point Software Technologies, Inc. of Redwood City, CA.
  • the middleware server 34 can be a PC server running a software program for
  • the software program can configure the middleware server 34 to provide a proxy
  • the proxy interface 52 establishes communication
  • the protocol convertor 54 translates the retrieved messages into one or
  • the proxy interface 52 can be configured to connect to either the voice mail
  • IP Internet protocol
  • predetermined data representing a command to access a specific legacy messaging system e.g.,
  • the IP packet can also include information
  • This information can include
  • proxy interface 52 connects to the voice mail server 50 to check "envelope information" for
  • the envelop information can include data such as
  • the middleware server 34 can use a standard communication connection, such as
  • a X.25 connection to communicate with the voice mail server 50 by way ofthe LDS 48.
  • the presence of envelope information corresponding to the access request from the message server 64 indicates that retrievable messages are present at the voice mail server 50.
  • the proxy interface 52 performs a login
  • proxy interface 52 returns a message to the unified message server 64 indicating that no voice
  • the login emulation connects to the voice mail server 50 using a conventional
  • the middleware server 34 includes a dual tone multi-frequency (DTMF)
  • the DTMF dialer (not shown) for calling into the voice-mail server 50.
  • the DTMF dialer can be interfaced
  • OS operating system
  • interface 52 executes a predetermined sequence of DTMF signals to playback the stored voice
  • the predetermined sequence of DTMF signals can be programmed into the
  • sequences are ordered gain access by way of the voice mail server's interactive voice response
  • the proxy interface to playback the messages.
  • the proxy interface 52 then records and digitizes the
  • the middleware server 50 includes a standard audio/digital
  • A/D converter (not shown), for converting the audio playback to digitized voice mail
  • the A/D converter can be interfaced to the proxy interface 52 using standard OS
  • the digitized voice-mail messages are then converted and compressed by the protocol converter 54 using standard digital audio compression formats such as .wav or .32k adpcm.
  • protocol converter 54 then transfers these compressed, digitized voice mail messages to the
  • the proxy interface 52 sends a connection
  • the e-mail server 28 can be established using an industry standard e-mail protocol, such as POP3
  • connection request can include the user's e-mail account
  • the proxy interface 52 transfers the messages to the protocol converter 54. To transfer the
  • the proxy interface 52 can command the e-mail server 28 to forward the
  • the proxy converter Upon receiving the e-mail messages, the proxy converter
  • the unified message server 64 can bypass the middleware server
  • server 64 can include one or more software programs for directly connecting to the e-mail server
  • the access request and user account information can be directly
  • unified message server 54 accesses the e-mail server 28 through the middleware server 34.
  • the proxy interface 52 can be configured to communicate with the legacy e-mail
  • the interface 52 Upon retrieving messages, the interface 52 passes the e-mail messages to the protocol converter 54, which translates the e-mail
  • the proxy interface 52 and protocol convertor 54 can be implemented using the
  • OS operating system
  • Windows NT or UNIX provides session and interface management between the unified message
  • the Congruity software is built using a software Development Environment available with
  • the adaptors are software components that can define the behavioral
  • adaptors can be built to handle the middleware server 34 responses to unified message server
  • the communication network 47 can be a public IP-based network such as the
  • the unified messaging center 26 includes the unified message server 64, a
  • notification server 66 a user interface 68, a network router 70 and a firewall server 71.
  • components of the messaging center 26 operate in conjunction with those of the enterprise
  • the firewall server 22 to provide unified messaging services to the enterprise users.
  • the router 70 serves essentially the same purpose as the firewall 36 included in the enterprise system 22, i.e., it restricts access to the messaging center 26 over the public network 47.
  • the router 70 can
  • the unified message server 64 can be a PC server configured to receive various
  • the unified message server 64 permits
  • accessing mechanism is user selectable. For example, by way of the user interface 68, a
  • the subscriber can configure the unified message server 64 to deliver different types of messages to
  • PSTN public switch telephone network
  • the unified message server 64 can be implementing using a PC server executing
  • each user is provided with a
  • the JFAX server can poll disparate remote messaging systems where the
  • the retrieved messages are
  • messages can be provided as .wav e-mail attachments that can be audibly played back at a user' s
  • JFAX.COM also provides a 1-800 dial-up service for retrieving disparate type
  • the unified message server 64 can be interfaced to a text-to-speech (TTS), generator
  • the notification server 66 can be a PC based server configured to transfer
  • notification messages to users, notifying them of particular events, such as the receipt of a new
  • the notification server 66 can be configured to transfer notification
  • notification server 66 can transfer notifications by way of fax, voice-mail or conventional
  • server 66 can be configured to deliver notices over any or all ofthe available communication
  • the notification server 66 generates and transmits message notices based on
  • the message information received from the unified message server 64.
  • the message information can be
  • the notices include the identification ofthe sender, a subject header
  • the time and date of receipt (if available), the time and date of receipt, and the message type, e.g., voice mail, e-mail, fax,
  • the notification server 66 can be configured to
  • the notification server 66 and the unified message server 64 can communicate using a conventional
  • the message information can be stored in predetermined data files having
  • the user interface 68 permits users to generate user profile.
  • the user profile are
  • the user profiles can define specific
  • FIG. 2 is a block diagram of a unified messaging system 100 having an
  • the messaging system 100 is shown in FIG. 1.
  • the messaging system 100 is shown in FIG. 1.
  • the alternative messaging system 100 relies on a trusted network
  • connection 101 instead of a public network, for communications between the unified messaging
  • firewall servers 36, 71 are not
  • FIG. 3 is a block diagram illustrating a second alternative architecture 110 ofthe
  • the middleware server 34 resides in this architecture 110.
  • the middleware server 34 resides in this architecture 110.
  • FIGS. 1-3 show several specific architectures for implementing the messaging
  • the communication networks 47, 101 can be readily configured to support this
  • FIG.4 is a detailed block diagram illustrating an interface 120 for connecting the
  • the interface 120 can
  • notification server 66 also be incorporated in the notification server 66 to likewise provide a connection to the notification server 66
  • the interface 120 When included in the notification server 66, the interface 120
  • the interface 120 includes a text-to-synthesizer (TTS) 122, a conventional TTS 122, and a conventional TTS 122.
  • TTS text-to-synthesizer
  • facsimile (fax) interface 124 facsimile (fax) interface 124, a conventional dual-tone multi-frequency (DTMF) dialer 126, a
  • Each interface component can be implemented using
  • the TTS 122 generates spoken messages in response to computer
  • the synthesized speech can be any suitable speech derived from the unified message server.
  • the synthesized speech can be any suitable speech derived from the unified message server.
  • the voice mail 136 may be used to audibly notify a subscriber by way ofthe voice mail 136, cellular phone 138, or the
  • the TTS 122 can be implemented using standard components, such as
  • the fax and MODEM interfaces 124, 130 can be a conventional personal computer fax card, such as a FAX/Modem PC Card from Boca
  • the fax interface 124 can permit the unified server 64
  • the DTMF dialer 126 can be a
  • the DTMF dialer 126 can be used to
  • telecommunications network such as the PSTN 62.
  • the TCP IP stack 128 can be commercially-available software program nmning
  • the stack 128 permits the server 64
  • TCP/IP protocol such as
  • FIG. 5 illustrates a flow chart diagram 160 depicting the operation ofthe unified
  • step 162 the
  • unified message server 64 submits an access request to the firewall server 36.
  • the access request
  • the firewall server
  • the firewall 36 This can be accomplished by configuring the firewall 36 to recognize the IP
  • message server 64 are allowed to pass through the firewall 36 onto the LAN 46.
  • firewall server 36 can be configured to insure that all returned messages
  • the firewall server 36 permits the unified
  • the request can specify which
  • the request can specify user account information, such as
  • the unified message server 34 After submitting the request to the middleware server 34, the unified message server
  • the unified message server 64 terminates the communication session with the
  • middleware server 34 returns one or more messages from
  • FIG. 6 is a flow diagram 190 illustrating the operation ofthe middleware server
  • step 192 the middleware server 34 receives an access request from the unified message
  • the proxy interface 52 can first query the legacy message server to
  • the proxy interface 52 determines the presence of messages. If there are messages stored on the legacy message server, the proxy interface 52 then performs a login emulation to access the stored messages.
  • the proxy interface 52 retrieves stored messages
  • protocol converter 54 transfers the converted messages to the
  • FIG. 7 is a detailed block diagram illustrating the user interface 68 included in
  • the user interface 68 can include a web server 220, an
  • the user interface 68 The user interface 68
  • the user profiles are data files that define how the unified
  • the user profiles can be stored on the profile server 224 and made available to the
  • notification server 66 the middleware server 34, and the unified message server 64.
  • Users can generate user profiler by way ofthe web server 220 or the INR 222.
  • the web server 220 can be a standard PC server running conventional web site server software,
  • the web server software can be configured to present one or more web pages that collect user
  • the information includes information, selections, and preferences that can be used to compile a profile.
  • the information includes information, selections, and preferences that can be used to compile a profile.
  • gathered can include user PL ⁇ s, account login IDs, as well as Internet addresses, phone numbers, or other similar information regarding access to legacy messaging systems. Preferences and
  • selections input by users can include instructions on how to process incoming messages. This
  • processing includes the routing of incoming messages and the notifications thereof. It also
  • a user includes storing or discarding incoming messages based on their attributes. For example, a user
  • the INR 222 can be a commercially available INR system configured to gather
  • the INR 222 can then play a
  • the INR 222 can
  • the web server 220 and INR 222 generate user profiles in standard data file
  • the profile server 224 can be a conventional PC server running a standard OS such as
  • the profile server 224 is configured to store a user profile for each user ofthe unified
  • Default user profiles can be stored for users not updating or entering
  • the profile server 224 can
  • FIG. 8 illustrates a flow chart diagram 260 of a method of operating the user
  • step 262 the user interface
  • interface can be a web page configured to gather user selections and information to generate an
  • the user can use a touch-tone phone to key in selections, configuring a user profile which is then
  • step 264 the profile selections made by the user are received and stored by the
  • the user selections can identify message attributes and their corresponding
  • Message attributes are items of information associated with messages, such as sender ID,
  • the flags can be software variables indicating
  • notification server 66 or message server 64.
  • a flag can be set to indicate that an incoming message is to be stored, while another
  • flag can indicate whether a notice is to be generated, and yet another flag can indicate which
  • step 266 the user profile
  • the user profile is generated and stored by the profile server 224.
  • the user profile is
  • the servers 64, 66 can actively poll the profile server 224 at predetermined intervals to receive updated user profiles.
  • FIG. 9 is a block diagram conceptionally illustrating the operation of the user
  • the filter mechanism 240 included in the unified message server 64.
  • the user profile 242 is a computer-usable data file
  • the user profile 240 can be used
  • the filter mechanism 240 can transfer the
  • the filter mechanism 240 is configured to filter the message to the message storage 244 or the notification server 246.
  • the notification server 66 relies on user profile information to generate the route
  • a user can generate a profile that indicates whether
  • An “exclude list” includes
  • message attributes such as sender IDs or subjects, that define incoming messages for which no
  • the unified message server 64 includes a filter mechanism 240 that applies
  • the filter mechanism 240 can be a software routine executed by the server
  • FIG. 10 shows a flow chart diagram illustrating a method 280 of operating the
  • step 282 message information corresponding to an incoming message
  • the message information can include various
  • message attributes such as the identification of the sender, recipient, subject header, and the
  • step 284 the user profile 242 is received by the filter mechanism 240.
  • the filter mechanism 240 retrieves the user profile corresponding to the intended
  • the recipient of the incoming message.
  • the recipient can be identified from the message
  • the filter mechanism 240 can temporarily store information derived from the incoming message.
  • the filter mechanism 240 compares the incoming message information to the attributes
  • the filter mechanism 240 processes the incoming message.
  • processing actions include, among other things, discarding the message, storing the message in
  • the filter mechanism 240 compares attributes contained
  • the filter mechanism 240 checks any flags in the user profile 242 corresponding to matching attributes, and accordingly,
  • FIG. 11 is a detailed block diagram of the telephone adjunct 44 shown in FIGS. 1-3.
  • telephone adjunct 44 permits a user to be visually notified of an incoming messages.
  • notification can be a flashing light emitting diode (LED) and/or a human-readable display
  • sender sender, subject header, message type, time and date received, and the like.
  • the telephone adjunct 44 includes an interface, such as a conventional modem
  • modem 302 can be a commercially-available modem that is software configurable and has a
  • modem 302 is processed by a conventional microprocessor ( ⁇ P) 300 and then visually displayed
  • a memory 308 can store incoming message information
  • microprocessor 300 to receive, process and display the message information.
  • a standard for arithmetic microprocessor 300 to receive, process and display the message information.
  • microprocessor bus 310 connects the components included in the adjunct 44.
  • a conventional microprocessor bus 310 connects the components included in the adjunct 44.
  • LCD microprocessor-compatible driver 306 permits digital information carried on the bus 310
  • FIG. 12 shows a flow chart diagram of a method 320 of operating the adjunct 44
  • adjunct 44 gathers message information from the notification server 66 by dialing up the notification server using the modem 302 to retrieve message information at regular intervals.
  • step 322 the adjunct first determines whether the host phone to which it is attached is in use.
  • the host phone can be a conventional telephone 42 to which the adjunct 44 is connected. This
  • dial tone is present on the phone line to which the adjunct 44 is connected.
  • the adjunct 44 resets a polling interval and waits a predetermined time before trying to
  • the microprocessor 300 directs the modem 302
  • step 3234 the adjunct 44 retrieves message
  • the adjunct 44 first presents a conventional caller ID
  • the notification server 66 can be configured to detect the incoming caller ID
  • the notification server 66 determines whether any
  • the notification server 66 answers the
  • adjunct 44 information is retrieved by the adjunct 44 using a predetermined standard data transfer protocol
  • the transfer session can be initiated by the microprocessor 300, which can be programmed to execute the predetermined protocol.
  • the message information itself can be
  • adjunct 44 The information can be represented as ASCII text. After the adjunct 44 has
  • the server 66 disconnects the call.
  • the adjunct 44 After receiving message information from the server 66, the adjunct 44 generates
  • the visual indicator can be a symbol or alphanumeric
  • the message presented on the LCD 304 can be a light emitting diode (LED)
  • the alphanumeric message can be text
  • the adjunct 44 can include a user interface (not shown), such a
  • momentary-contact push button for permitting a user to scroll through the message information
  • the user interface can be controlled by the microprocessor 300.
  • a push-button can be provided that generates an interrupt to the microprocessor 300.
  • the microprocessor 300 executes a software routine that retrieves
  • the adjunct 44 After downloading message information, the adjunct 44 waits a predetermined
  • step 330 a check is made to determined whether the polling
  • the microprocessor 300 can execute a software routine providing a timer
  • adjunct 44 determines the interval. If the interval has not elapsed, the adjunct 44 continues
  • step 330 If the interval has expired, the adjunct 44 returns to step 322 to repeat the polling routine.
  • the notification server 66 As described earlier herein in connection with FIG. 4, the notification server 66
  • the modem can include a modem interface 130.
  • the modem can include a modem interface 130.
  • the modem can include a modem interface 130.
  • interface 130 can be configured to receive incoming calls from adjuncts requesting transfers of
  • the server 66 can include software for

Abstract

A method and system (26) for processing messages in a unified messaging system. In particular, the system enables legacy e-mail (28), voice mail (50) and facsimile systems (134) to be integrated with a unified messaging system (26). The system includes a filter or mechanism (240) which enables the user to filter certain message attributes such as the identification of the sender, recipient or the subject header or the message type to enable messages to be processed in accordance with the recipient's wishes.

Description

METHOD AND SYSTEM FOR INTERFACING SYSTEMS UNIFIED MESSAGING
WITH LEGACY SYSTEMS LOCATED BEHIND CORPORATE FIREWALLS
TECHNICAL FIELD OF THE INVENTION
The present invention generally relates to communication systems, and in particular to
a unified messaging system that processes messages based on user profiles.
BACKGROUND OF THE INVENTION
In business and consumer environments, several types of electronic messages are
commonly used. These message types include voice mail, e-mail and facsimile (fax). Each type
of electronic message requires its own transmission protocol and access mechanism. For
instance, voice mail messages are typically transferred using a switched telephone network. To
access conventional voice mail messages, a user must dial into a voice mail server using a
telephone. In contrast, e-mail messages rely on different protocols and access mechanisms. E-
mail messages are typically sent over computer networks, and to access e-mail messages, the
user must usually login to a computer.
The commonplace use of disparate message types requires users to access
different messaging systems to retrieve all of their messages. This can be time consuming and
burdensome. To overcome this problem, unified messaging systems have been developed. In
these systems, voice mail, e-mail, fax, and other message types can be received by the unified
system for retrieval by the user using a single access interface. Communication and message
storage can be centralized, while retrieval of messages can be accomplished with a user selected
access mechanism. For example, in a unified environment, a user may choose to receive all
incoming faxes, voice mails and e-mails by way of an e-mail account. To check messages, the user needs only to check the e-mail account, instead of individually checking the voice mail, e-
mail and fax accounts. Thus, unified messaging systems significantly improve the electronic
message environment by providing a single access point for disparate types of messages.
Unified messaging services are currently available over the Internet. One such
service is Personal Telecom, provided by JFAX.COM, Inc. Personal Telecom permits
subscribers to access voice mail, e-mail or fax by way of an Internet page or a phone call to an
automated call processing center. A drawback to systems such as JFAX is that they do not
interface to legacy messaging systems, particularly those located behind corporate firewalls.
Many business enterprises have invested significantly in voice mail and e-mail
systems for use in their workplace environments. These legacy systems are generally not
integrated to provide unified messaging. Moreover, current unified messaging systems do not
interface to these pre-existing voice and e-mail systems. Thus, for many enterprises, migrating
to a unified messaging system would require scrapping substantial investment in legacy
messaging systems. Accordingly, there is a need for a method and system of incorporating
legacy messaging systems into a modern unified messaging environment.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings provide an understanding of the invention as
described in one or more embodiments to illustrate and explain the principles ofthe invention.
FIG. 1 is a block diagram illustrating a messaging system in accordance with an
exemplary embodiment ofthe present invention.
FIG.2 is a block diagram illustrating an alternative architecture ofthe messaging system shown in FIG. 1.
FIG. 3 is a block diagram illustrating a second alternative architecture of the
messaging system shown in FIG. 1.
FIG.4 is a detailed block diagram illustrating an interface between a server in the
unified messaging center and the various communication networks.
FIG. 5 shows a flowchart diagram illustrating the operation of the unified
message server shown in FIGS. 1 and 3.
FIG. 6 shows a flowchart diagram illustrating the operation ofthe middleware
server shown in FIGS. 1-3.
FIG. 7 is a detailed block diagram illustrating the user interface shown in FIGS.
1-3.
FIG. 8 shows a flowchart diagram illustrating the operation ofthe user interface.
FIG. 9 is a block diagram conceptually illustrating the operation of the user
profile filter mechanism included in the unified message server.
FIG. 10 shows a flowchart diagram illustrating the operation of the filter
mechanism.
FIG. 11 is a detailed block diagram ofthe telephone adjunct shown in FIGS. 1-3.
FIG. 12 shows a flowchart diagram illustrating the operation of the telephone
adjunct shown in FIG. 11.
DETAILED DESCRIPTION
It will be understood that the following detailed description is exemplary and intended to provide further explanation ofthe invention as claimed. The present invention relates to an
improved unified messaging system that permits one or more legacy messaging systems to be
integrated therewith. The legacy messaging systems can include voice mail and e-mail servers
using industry standard or proprietary message protocols and formats. Additionally, the legacy
systems may be connected to private local area networks (LANs) that are protected against
external access by firewall servers.
To integrate the legacy systems, the system ofthe present invention can include
a unified message server, a proxy interface, and a message protocol converter. The proxy
interface is configured to access the legacy systems in response to a request from the unified
message server. Messages stored on the legacy system are then converted by the protocol
convertor to a predetermined format usable by the unified message server. The converted
messages are then transferred to the unified message server, which is capable of providing
messages from disparate messaging systems to users in a predetermined format.
This arrangement is advantageous in that it permits enterprise-wide
communication systems to provide unified messaging without abandoning pre-existing legacy
messaging systems.
Turning now to the drawings, and in particular to FIG. 1, there is illustrated an
exemplary unified messaging system 20 in accordance with an embodiment of the present
invention. The system 20 includes an enterprise communication system 22 in communication
with a telco central office (CO) 24 and a dedicated unified messaging center 26. The enterprise
system 22 provides conventional telephony and computer services to users within a
predetermined enterprise, such as a business or government organization. In the example shown, the telco CO 24 provides leased telephone and voice mail services to the enterprise. The unified
messaging center 26 provides unified messaging services to the enterprise 22. The system 20
is configured so that the legacy messaging systems serving the enterprise 22 are integrated into
the unified messaging service provided by the center 26.
The enterprise system 22 includes a legacy e-mail server 28, a plurality of
computer workstations 30, a network access server (NAS) 32, a middleware server 34, a firewall
server 36 and a network router 38. A LAN 46 connects the computer workstations 30, the e-
mail server 28, the NAS 32, the middleware server 34 and the router 38. Also included in the
enterprise system 22 is a Centrex group 40 and one or more conventional telephones 42. An
adjunct display 44 for notifying users of messages can be connected to the telephone 42. The
adjunct display 44 can also be attached to or included with any ofthe terminal units included in
the Centrex group 40.
The telco CO 24 includes a local digital switch (LDS) 48 and a voice mail server
50. The LDS 48 provides enterprise-wide telephone service to the enterprise system 22, while
the voice mail server 50 provides enterprise voice mail services. The LDS 48 can be a
commercially-available class 5 digital switch, such as a Meridian 1 switch manufactured by
Nortel, Inc. or a 5ESS switch from Lucent Technologies, Inc. The voice mail server 50 can be
a commercially-available voice mail platform, such as the Octel Messaging Server from Lucent
Technologies, Inc. or Meridian mail from Nortel, Inc.
Although the system 20 depicts the LDS 48 and voice mail server 50 as residing
within the telco CO 24, the services of LDS 48 and voice mail server 50 can be provided by
privately owned equipment residing within the enterprise system 22, such as a privately owned voice mail server connected to a private branch exchange (PBX).
Within the enterprise system 22, the computer workstations 30 can be
conventional personal computers (PCs) having e-mail client software, such as Lotus Notes,
available from Lotus DevelopmentCorporation of Cambridge, Massachusetts. The e-mail server
28 can be a conventional PC server including e-mail server software, such as the Lotus Notes
server software .
The NAS 32 can be a commercially-available modem pool, such as PortMaster®
from Lucent Technologies, Inc. The NAS 32 permits remote users to
access the enterprise LAN 46 and its associated resources using a conventional modem dial-up
scheme.
The LAN 46 can be a conventional commercially-available computer network,
such as an ethernet or token ring LAN. The network router 38 can be a conventional network
router permitting data traffic to flow between the LAN 46 and an external computer network 47.
The router 38 can be implemented using a commercially-available computer network router,
such as one available from Cisco Systems, Inc.
The firewall server 36 can be a conventional PC server configured to limit access
to the enterprise LAN and its resources. Typically, the firewall server 36 restricts remote access
attempts from outside the enterprise over the computer network 47. The firewall 36 can be
implemented using a PC server running a commercially-available firewall software application,
such as FireWall-1® from Check Point Software Technologies, Inc. of Redwood City, CA.
The middleware server 34, can be a PC server running a software program for
interfacing the unified message server 64 to the legacy voice mail server 50 and/or the e-mail server 28. The software program can configure the middleware server 34 to provide a proxy
interface 52 and a protocol converter 54. The proxy interface 52 establishes communication
sessions with the legacy messaging systems so that messages stored by the systems can be
accessed and retrieved. The protocol convertor 54 translates the retrieved messages into one or
more predetermined formats usable by the unified message 64 and the transfers the converted
messages to the server 64.
The proxy interface 52 can be configured to connect to either the voice mail
server 50 or e-mail server 28 upon receiving a request from the unified message server 64. The
request can be an Internet protocol (IP) packet addressed to the middleware server 34 containing
predetermined data representing a command to access a specific legacy messaging system, e.g.,
the e-mail server 28 or voice mail server 50. The IP packet can also include information
regarding the specific user for which messages are to be retrieved. This information can include
the user ID and any PIN numbers or access codes required to access the user's account on the
legacy systems.
In response to a voice mail access request from the unified message server 64, the
proxy interface 52 connects to the voice mail server 50 to check "envelope information" for
voice mail messages stored at the server 50. The envelop information can include data such as
the identification ofthe intended recipient(s), the identification ofthe sender, the date and time
the message was received, or information of the same nature. To access the envelop
information, the middleware server 34 can use a standard communication connection, such as
a X.25 connection, to communicate with the voice mail server 50 by way ofthe LDS 48.
The presence of envelope information corresponding to the access request from the message server 64 indicates that retrievable messages are present at the voice mail server 50.
Accordingly, if envelope information is detected, the proxy interface 52 performs a login
emulation to gain access to the messages stored on the voice mail server 50. Otherwise, the
proxy interface 52 returns a message to the unified message server 64 indicating that no voice
mail messages are currently retrievable from the voice mail server 50.
The login emulation connects to the voice mail server 50 using a conventional
dial-up login sequence. The middleware server 34 includes a dual tone multi-frequency (DTMF)
dialer (not shown) for calling into the voice-mail server 50. The DTMF dialer can be interfaced
and controlled by the proxy interface 52 using conventional operating system (OS) drivers.
When the voice-mail server 50 answers the call placed by the proxy interface 52, the proxy
interface 52 executes a predetermined sequence of DTMF signals to playback the stored voice
mail messages. The predetermined sequence of DTMF signals can be programmed into the
proxy interface 52 for particular voice mail servers. The timing and the tones generated in the
sequence are ordered gain access by way of the voice mail server's interactive voice response
(INR) interface normally used by subscribers. The information represented by the sequence can
include user ID or PLΝ numbers, and touch-tone key strokes sufficient to navigate the INR
interface to playback the messages. The proxy interface 52 then records and digitizes the
messages as they are played back.
To accomplish this the middleware server 50 includes a standard audio/digital
code (A/D) converter (not shown), for converting the audio playback to digitized voice mail
messages. The A/D converter can be interfaced to the proxy interface 52 using standard OS
drivers. The digitized voice-mail messages are then converted and compressed by the protocol converter 54 using standard digital audio compression formats such as .wav or .32k adpcm. The
protocol converter 54 then transfers these compressed, digitized voice mail messages to the
unified message server 64 by way of communications network 47.
To access the legacy e-mail server 28, the proxy interface 52 sends a connection
request to the server 28 over the LAN 46. Communication between the proxy interface 52 and
the e-mail server 28 can be established using an industry standard e-mail protocol, such as POP3
(post office protocol 3) or IMAP4. The connection request can include the user's e-mail account
identifier and password, if necessary. If e-mail messages are retrieved from the e-mail server
50, the proxy interface 52 transfers the messages to the protocol converter 54. To transfer the
e-mail messages, the proxy interface 52 can command the e-mail server 28 to forward the
messages to the protocol converter 54. Upon receiving the e-mail messages, the proxy converter
54 sends them to the unified message server 64 using either the POP3 or IMAP4 protocol.
Alternatively, the unified message server 64 can bypass the middleware server
34 and directly access the legacy e-mail server 28. To accomplish this, the unified message
server 64 can include one or more software programs for directly connecting to the e-mail server
28 using POP3 or IMAP4. The access request and user account information can be directly
passed to the e-mail server 28 once an e-mail session is established between the unified message
server 64 and e-mail served 28.
For interfacing to legacy e-mail servers using non-standard e-mail protocols, the
unified message server 54 accesses the e-mail server 28 through the middleware server 34. In
such cases, the proxy interface 52 can be configured to communicate with the legacy e-mail
server 28 using the proprietary or non-standard protocol. Upon retrieving messages, the interface 52 passes the e-mail messages to the protocol converter 54, which translates the e-mail
from the non-standard format to a standard format, such as POP3 or IMAP4.
The proxy interface 52 and protocol convertor 54 can be implemented using the
Congruity Software Package available from Nortel Networks, Inc. The Congruity software that
runs on a conventional PC or workstation with a standard operating system (OS) such as
Windows NT or UNIX provides session and interface management between the unified message
server 64 and legacy messaging systems, such as the voice-mail server 50 and the e-mail server
28. The Congruity software is built using a software Development Environment available with
the software package. Using the Development Environment, the Congruity software adaptors
can be built for carrying out the functionalities ofthe proxy interface 52 and protocol convertor
54, respectively. Typically, a predetermined library of software adaptors is provided with the
Congruity software. The adaptors are software components that can define the behavioral
aspects ofthe proxy interface 52 and protocol converter 54. For example, Congruity software
adaptors can be built to handle the middleware server 34 responses to unified message server
requests in accordance with the invention.
The communication network 47 can be a public IP-based network such as the
Internet.
The unified messaging center 26 includes the unified message server 64, a
notification server 66, a user interface 68, a network router 70 and a firewall server 71. The
components of the messaging center 26 operate in conjunction with those of the enterprise
system 22 to provide unified messaging services to the enterprise users. The firewall server
71 serves essentially the same purpose as the firewall 36 included in the enterprise system 22, i.e., it restricts access to the messaging center 26 over the public network 47. The router 70 can
be a conventional commercially-available router, such as one available from Cisco Systems, Inc.
The unified message server 64 can be a PC server configured to receive various
types of messages from disparate messaging systems. The unified message server 64 permits
users to receive their messages by way of a single interface. The particular interface and
accessing mechanism is user selectable. For example, by way of the user interface 68, a
subscriber can configure the unified message server 64 to deliver different types of messages to
an e-mail account that is accessible over the Internet 56. Alternatively, the subscriber can
configure the message server 64 to deliver messages to a cellular phone by way of a cellular
network 58 or a pager by way of a paging network 60, or a conventional telephone by way of
a public switch telephone network (PSTN) 62.
The unified message server 64 can be implementing using a PC server executing
software to provide the services available from the JFAX.COM. The JFAX unified messaging
service receives voice mail, e-mail, and fax messages and provides them to respective users by
way of e-mail or telephone. For message retrieval using e-mail, each user is provided with a
JFAX e-mail account. The JFAX server can poll disparate remote messaging systems where the
user has pre-existing accounts, including the legacy messaging servers 28, 50, in order to retrieve
messages and then store them locally on the unified server 64. The retrieved messages are
placed in the respective JFAX e-mail accounts, where users can then retrieve them using
standard e-mail software on a PC or a web page interface provided by JFAX.COM. Voice mail
messages can be provided as .wav e-mail attachments that can be audibly played back at a user' s
PC if the PC includes standard audio .wav decompression software. JFAX.COM also provides a 1-800 dial-up service for retrieving disparate type
of messages. Using this scheme, a user can dial into JFAX and listen to voice mail and e-mail
messages. The unified message server 64 can be interfaced to a text-to-speech (TTS), generator
to convert the e-mail messages to audio messages that can be heard over the phone. Details of
a TTS interface are described herein in connection with FIG. 4.
The notification server 66 can be a PC based server configured to transfer
notification messages to users, notifying them of particular events, such as the receipt of a new
message by the unified message server 64. Users can configured the notification server 66 by
way of a user interface 68. The notification server 66 can be configured to transfer notification
messages to users over one or more preselected communication networks. For example, the
notification server 66 can transfer notifications by way of fax, voice-mail or conventional
telephone over the PSTN 62, or messages to pagers or cellular phones over the paging network
60 and cellular network 58, respectively, or messages over the Internet 56. The notification
server 66 can be configured to deliver notices over any or all ofthe available communication
networks, depending on the preferences ofthe respective users.
The notification server 66 generates and transmits message notices based on
message information received from the unified message server 64. The message information can
include any ofthe envelope information described herein in connection with the legacy voice
mail server 50. Generally, the notices include the identification ofthe sender, a subject header
(if available), the time and date of receipt, and the message type, e.g., voice mail, e-mail, fax,
etc. To facilitate timely delivery ofthe notices, the notification server 66 can be configured to
poll the unified message server 64 at predetermined intervals to check for new messages. The notification server 66 and the unified message server 64 can communicate using a conventional
PC LAN. The message information can be stored in predetermined data files having
predetermined format on the unified server 64, the data files being accessible to the notification
server 66.
The user interface 68 permits users to generate user profile. The user profile are
computer data files that specify operational parameters for the notification and unified message
servers 64, 66 corresponding to each user. In particular, the user profiles can define specific
actions to be taken by the servers 64, 66 in response to messages received from particular
sources or regarding particular subjects.
FIG. 2 is a block diagram of a unified messaging system 100 having an
alternative architecture to the messaging system 20 shown in FIG. 1. The messaging system 100
performs essentially the same function and has the same features as the messaging system 20
shown in FIG. 1. However, the alternative messaging system 100 relies on a trusted network
connection 101, instead of a public network, for communications between the unified messaging
center 26 and the enterprise system 22. In this arrangement, firewall servers 36, 71 are not
required to restrict public access to the enterprise system 22 or unified messaging center 26.
FIG. 3 is a block diagram illustrating a second alternative architecture 110 ofthe
messaging system 20 shown in FIG. 1. In this architecture 110, the middleware server 34 resides
in the unified messaging center 26 and is connected to the unified message server 64 by way of
a LAN 65.
FIGS. 1-3 show several specific architectures for implementing the messaging
system ofthe present invention. It will be readily apparent to one of ordinary skill in the art that many alterative architectures exist that fall within the scope ofthe invention. For instance, any
or all ofthe components ofthe unified messaging center 26 can be included within the enterprise
system 22. The communication networks 47, 101 can be readily configured to support this
arrangement.
FIG.4 is a detailed block diagram illustrating an interface 120 for connecting the
unified message server 64 to the various communication networks 56-62. The interface 120 can
also be incorporated in the notification server 66 to likewise provide a connection to the
communication networks 56-62. When included in the notification server 66, the interface 120
can pass notification messages on the users.
The interface 120 includes a text-to-synthesizer (TTS) 122, a conventional
facsimile (fax) interface 124, a conventional dual-tone multi-frequency (DTMF) dialer 126, a
conventional TCP/IP interface 128, and a conventional MODEM interface 130. These interface
components permit the unified server 64 to communicate with each of the various
communication networks 56-62. Each interface component can be implemented using
commercially-available PC peripheral devices configured to communicate with the server 64
using standard APIs in the Windows OS.
In particular, the TTS 122 generates spoken messages in response to computer
readable text messages received from the unified message server. The synthesized speech can
be used to audibly notify a subscriber by way ofthe voice mail 136, cellular phone 138, or the
conventional telephone 142. The TTS 122 can be implemented using standard components, such
as TruNoice from Centigram Communications Corp. of San Jose, California or DECtalk from
Digital Equipment Corp. of Massachusetts. The fax and MODEM interfaces 124, 130 can be a conventional personal computer fax card, such as a FAX/Modem PC Card from Boca
Research, Inc. of Boca Raton, Florida. The fax interface 124 can permit the unified server 64
to transfer messages to subscribers by way of the fax 134. The DTMF dialer 126 can be a
conventional telephony interface for use with standard personal computers, such as the Alcatel
4961 TAPI Middleware from Alcatel of Paris, France. The DTMF dialer 126 can be used to
connect to each of the communications networks that rely on a conventional dial-up
telecommunications network, such as the PSTN 62.
The TCP IP stack 128 can be commercially-available software program nmning
on a standard PC operating system, such as Window NT. The stack 128 permits the server 64
to communicate messages to subscribers over data networks using the TCP/IP protocol, such as
the Internet 132.
FIG. 5 illustrates a flow chart diagram 160 depicting the operation ofthe unified
message server 64 in accordance with an embodiment ofthe present invention. In step 162, the
unified message server 64 submits an access request to the firewall server 36. The access request
can be an IP message requesting that the firewall server 36 ofthe enterprise system 22 permit
the unified message server 64 to remotely query the middleware server 34. The firewall server
36 can be configured so that only the unified message server 64 can query servers residing on
the LAN 46. This can be accomplished by configuring the firewall 36 to recognize the IP
address of the unified message server 64 so that the incoming IP packets from the unified
message server 64 are allowed to pass through the firewall 36 onto the LAN 46. To further
insure security, the firewall server 36 can be configured to insure that all returned messages
passing from the LAN 46 to the communications network 47 are returned only to the IP address of the unified message server 64. In this manner, the firewall server 36 permits the unified
message server 64 to submit access requests to the middleware server 34, which in turn transfers
messages from the legacy message systems 28, 50 to the unified message server 64.
After negotiating access to the LAN 46 from the firewall 36, the unified message
server 64 submits an access request to the middleware server 34 (step 168). The access request
is a message instructing the middleware server 34 to access the legacy message systems to
determine whether or not there are any messages residing therein. The request can specify which
legacy system is to be accessed. Also, the request can specify user account information, such
as login IDs and passwords, defining which messages are to be retrieved from the legacy
systems. After submitting the request to the middleware server 34, the unified message server
64 waits for a response from the middleware server 34 (step 170). If the middleware server 34
sends an acknowledgment to the unified server 64 indicating that there are no messages on the
legacy systems, the unified message server 64 terminates the communication session with the
middleware server 34. However, if the middleware server 34 returns one or more messages from
the legacy message servers associated with the enterprise system 22, the unified message server
64 stores the messages internally for later retrieval by a user (step 172).
FIG. 6 is a flow diagram 190 illustrating the operation ofthe middleware server
34. In step 192, the middleware server 34 receives an access request from the unified message
server 64. In response to this request, the proxy interface 52 of the middleware server 34
accesses a specified legacy messaging system 28, 50 (step 194). As described earlier in
connection with FIG. 1, the proxy interface 52 can first query the legacy message server to
determine the presence of messages. If there are messages stored on the legacy message server, the proxy interface 52 then performs a login emulation to access the stored messages. Upon
successfully logging-in to the message server, the proxy interface 52 retrieves stored messages
and provides them to the protocol converter 54 (step 198). The protocol converter 54 then
converts the messages to a standard digital format usable by the unified message server 64.
After converting the messages, protocol converter 54 transfers the converted messages to the
unified message server 64 (step 200).
User Interface to the Unified Messaging Center
FIG. 7 is a detailed block diagram illustrating the user interface 68 included in
the unified messaging center 26. The user interface 68 can include a web server 220, an
integrated voice response (INR) system 222, and a profile server 224. The user interface 68
permits subscribers ofthe unified messaging system to generate user profiles by way of either
the Internet 56 or the PSTN 62. The user profiles are data files that define how the unified
messaging system will respond to incoming messages, according to the specific desires ofthe
users. The user profiles can be stored on the profile server 224 and made available to the
notification server 66, the middleware server 34, and the unified message server 64.
Users can generate user profiler by way ofthe web server 220 or the INR 222.
The web server 220 can be a standard PC server running conventional web site server software,
and having an assigned an IP address so that it is readily accessible by users over the Internet 56.
The web server software can be configured to present one or more web pages that collect user
information, selections, and preferences that can be used to compile a profile. The information
gathered can include user PLΝs, account login IDs, as well as Internet addresses, phone numbers, or other similar information regarding access to legacy messaging systems. Preferences and
selections input by users can include instructions on how to process incoming messages. This
processing includes the routing of incoming messages and the notifications thereof. It also
includes storing or discarding incoming messages based on their attributes. For example, a user
can request that all incoming messages are sent to an e-mail box and all notifications are sent to
a particular pager number. Additionally, the user can also request that messages from a
particular source or regarding a specific subject are discarded, rather than stored for later
retrieval. As will be discussed herein below, a filter mechanism is included in the unified
message system for processing incoming messages in accordance with the user profiles.
The INR 222 can be a commercially available INR system configured to gather
user profile information by way of a touch-tone phone. Users can dial into predetermined phone
number using the PSTN 62 to access the INR interface 222. The INR 222 can then play a
predetermined sequence of voice-prompted menus that permit the user to enter information,
preferences, and selections by way of touch-tone responses. In addition, the INR 222 can
include voice recognition capabilities that permit users to speak their responses.
The web server 220 and INR 222 generate user profiles in standard data file
formats. These profiles are transferred to the profile server 224 by way of a conventional LAN
225. The profile server 224 can be a conventional PC server running a standard OS such as
Windows. The profile server 224 is configured to store a user profile for each user ofthe unified
messaging system. Default user profiles can be stored for users not updating or entering
particular requests into their profiles through the user interface 68. The profile server 224 can
provide user profiles to the notification server 68 and the unified message server 64 using a conventional LAN interface.
FIG. 8 illustrates a flow chart diagram 260 of a method of operating the user
interface 68 in a set-up mode to generate the user profile. In step 262, the user interface
presented to the user on the web server 220 or the INR 222. With the web server 220, the user
interface can be a web page configured to gather user selections and information to generate an
HTTP file which is then provided to the profile server 224 as a user profile. With the INR 222,
the user can use a touch-tone phone to key in selections, configuring a user profile which is then
output by the INR 222 as a computer data file having a standard format and stored on the profile
server 224.
In step 264, the profile selections made by the user are received and stored by the
profile server 224. The user selections can identify message attributes and their corresponding
flags for determining which actions are to be taken with respect for incoming messages to the
user. Message attributes are items of information associated with messages, such as sender ID,
destination ID, subject header, and the like. The flags can be software variables indicating
particular actions to be taken by either the notification server 66 or message server 64. For
example, a flag can be set to indicate that an incoming message is to be stored, while another
flag can indicate whether a notice is to be generated, and yet another flag can indicate which
network is to be used to communicate the notice of the user. In step 266, the user profile
containing the selections is generated and stored by the profile server 224. The user profile is
then provided to the notification server 66 and the unified message server 64. The user profiles
can be provided directly to the servers 64 and 66, and stored there or alternatively, the profile
can be stored locally on the profile server 224 and the servers 64, 66 can actively poll the profile server 224 at predetermined intervals to receive updated user profiles.
FIG. 9 is a block diagram conceptionally illustrating the operation of the user
profile filter mechanism 240 included in the unified message server 64. The filter mechanism
240 receives as input the user profile 242 and message information derived from each incoming
message to the unified message server 64. The user profile 242 is a computer-usable data file
that can indicate various operational actions to be taken with respect to the incoming message,
such as which communication network(s) are to be used for transferring message notices, as well
as the messages themselves, to a respective user. In addition, the user profile 240 can be used
to indicate whether messages from specific sources or regarding specific subjects are to be stored
244 on the server 64 or discarded. Based on the user flag selections contained in the user profile
corresponding to an attribute of a received message, the filter mechanism 240 can transfer the
message to the message storage 244 or the notification server 246. The filter mechanism 240
can also generate a log file 248 summarizing the processing actions taken regarding particular
messages received by the server 64. In the example shown, the first column of the log 248
identifies the incoming message, while the second column indicates the action(s) taken with
respect to the message.
The notification server 66 relies on user profile information to generate the route
notice messages according to user selection. A user can generate a profile that indicates whether
notices are to be generated, that includes "exclude lists" or "include lists", and that indicates
which communication network(s) are to be used for notification. An "exclude list" includes
message attributes such as sender IDs or subjects, that define incoming messages for which no
notices are to be generated, while "include lists" include message attributes that define incoming messages for which notices are to be generated.
The unified message server 64 includes a filter mechanism 240 that applies
profile information to each incoming message in order to process the message according to the
recipients wishes. The filter mechanism 240 can be a software routine executed by the server
64 to provide the message filtering functions disclosed herein.
FIG. 10 shows a flow chart diagram illustrating a method 280 of operating the
filter mechanism 240. In step 282, message information corresponding to an incoming message
is received from the unified message server 64. The message information can include various
message attributes, such as the identification of the sender, recipient, subject header, and the
message type. In step 284, the user profile 242 is received by the filter mechanism 240.
Generally, the filter mechanism 240 retrieves the user profile corresponding to the intended
recipient of the incoming message. The recipient can be identified from the message
information derived from the incoming message. The filter mechanism 240 can temporarily
store the user profile 242 for later comparison with incoming messages. Upon receiving the user
profile, the filter mechanism 240 compares the incoming message information to the attributes
in the user profile 242 (step 286). Based on the comparison between the message information
and the user profile 242, the filter mechanism 240 processes the incoming message. The
processing actions include, among other things, discarding the message, storing the message in
the message storage 244 in a user selected format, and generating a message notification 246 by
alerting the notification server 66 (step 288).
To perform comparisons, the filter mechanism 240 compares attributes contained
in the message information to those stored in the user profile. The filter mechanism 240 then checks any flags in the user profile 242 corresponding to matching attributes, and accordingly,
processes the message according to the user-set flags contained in the user profile.
Telephone Adjunct Display
FIG. 11 is a detailed block diagram of the telephone adjunct 44 shown in FIGS. 1-3. The
telephone adjunct 44 permits a user to be visually notified of an incoming messages. The visual
notification can be a flashing light emitting diode (LED) and/or a human-readable display
describing characteristics of each of the waiting messages, such as the identification of the
sender, subject header, message type, time and date received, and the like.
The telephone adjunct 44 includes an interface, such as a conventional modem
302, for transferring information between the notification server 66 and the adjunct 44. The
modem 302 can be a commercially-available modem that is software configurable and has a
predetermined microprocessor-compatible interface. The message information received by the
modem 302 is processed by a conventional microprocessor (μP) 300 and then visually displayed
by a liquid crystal display (LCD) 304. A memory 308 can store incoming message information
from the notification server 66, as well as a computer program for configuring the
microprocessor 300 to receive, process and display the message information. A standard
microprocessor bus 310 connects the components included in the adjunct 44. A conventional
LCD microprocessor-compatible driver 306 permits digital information carried on the bus 310
to be displayed on the LCD 304.
FIG. 12 shows a flow chart diagram of a method 320 of operating the adjunct 44
for providing visual message notification to a user located within the enterprise system 22. The
adjunct 44 gathers message information from the notification server 66 by dialing up the notification server using the modem 302 to retrieve message information at regular intervals.
In step 322, the adjunct first determines whether the host phone to which it is attached is in use.
The host phone can be a conventional telephone 42 to which the adjunct 44 is connected. This
check is performed by the microprocessor 300 configuring the modem 302 to sense whether the
dial tone is present on the phone line to which the adjunct 44 is connected. When the phone is
in use, the adjunct 44 resets a polling interval and waits a predetermined time before trying to
dial-up the notification server 66.
When the phone line is not in use, the microprocessor 300 directs the modem 302
to dial-up the notification server 66 (step 324). In step 326, the adjunct 44 retrieves message
information from the notification server 66 and stores it locally within the memory 308. In
connecting to the notification server 66, the adjunct 44 first presents a conventional caller ID
signal including the alphanumeric identification (ANI) ofthe telephone 42 to which the adjunct
44 in connected. The notification server 66 can be configured to detect the incoming caller ID
signal. In response to the caller ID signal, the notification server 66 determines whether any
message information is currently available for the particular adjunct 44 corresponding to phone
number included in the caller ID signal. If not, a notification server 66 simply hangs up on the
calling adjunct 44, or alternatively, it does not answer the phone call. The message information
is stored at the notification server 66 corresponding to the user's ANI. If message information
corresponding to the adjunct 44 is stored on the server 66, the notification server 66 answers the
incoming call and permits the adjunct 44 to retrieve the message information. The message
information is retrieved by the adjunct 44 using a predetermined standard data transfer protocol,
such as TCP/IP. The transfer session can be initiated by the microprocessor 300, which can be programmed to execute the predetermined protocol. The message information itself can be
stored in predetermined data files and formats usable by both the notification server 66 and
adjunct 44. The information can be represented as ASCII text. After the adjunct 44 has
completed downloading the message information, the server 66 disconnects the call.
After receiving message information from the server 66, the adjunct 44 generates
the user indicator which visually indicates to a user that message information has been
downloaded to the adjunct 44 (step 328). The visual indicator can be a symbol or alphanumeric
message presented on the LCD 304, or alternatively, it can be a light emitting diode (LED)
which is lit when message information is available. The alphanumeric message can be text
describing characteristics of a particular message, such as the type of message, its subject and
sender. For multiple messages, the adjunct 44 can include a user interface (not shown), such a
momentary-contact push button, for permitting a user to scroll through the message information
on the display 304. The user interface can be controlled by the microprocessor 300. For
example, a push-button can be provided that generates an interrupt to the microprocessor 300.
In response to the interrupt, the microprocessor 300 executes a software routine that retrieves
the next record of message information from the memory 308 and displays it on the LCD 304.
After downloading message information, the adjunct 44 waits a predetermined
amount of time before polling the notification server 66 to check if additional messages have
been received (step 330). In step 332, a check is made to determined whether the polling
interval has elapse. The microprocessor 300 can execute a software routine providing a timer
function for determining the interval. If the interval has not elapsed, the adjunct 44 continues
to wait (step 330). If the interval has expired, the adjunct 44 returns to step 322 to repeat the polling routine.
As described earlier herein in connection with FIG. 4, the notification server 66
can include a modem interface 130. In addition to sending outgoing notices, the modem
interface 130 can be configured to receive incoming calls from adjuncts requesting transfers of
message information for local display to users. The server 66 can include software for
transferring message information to the adjunct 44 according to the predetermined protocol.
It should be appreciated that a wide range of changes and modifications may be
made to the embodiment of the invention as described herein. Thus, it is intended that the
foregoing detailed description be regard as illustrative rather than limiting and that the following
claims, including all equivalents, are intended to define the scope ofthe invention.
What is claimed is:

Claims

1. A system for integrating at least one legacy messaging system into a unified
messaging system, comprising:
a unified message server for providing messages from disparate messaging systems to
users in a predetermined format;
at least one proxy interface for accessing the at least one legacy messaging system in
response to a request from the unified message server; and
a message protocol converter, operatively associated with the proxy interface, for
converting messages stored by the at least one legacy messaging system to a predetermined
protocol usable by the unified message server.
2. The system of claim 1, furhter comprising means for accessing the at least one
legacy messaging system through a firewall server.
3. The system of claim 2, wherein the accessing means includes a software program
for configuring the firewall server to accept remote queries from the unified message server that
are directed to the at least one legacy messaging system.
4. The system of claim 1, wherein the at least one legacy messaging system is
selected from the group consisting of a voice mail system and an emal system.
5. The system of claim 1, wherein the proxy interface includes one or more data
files containing predetermined user information for accessing the at least one legacy messaging
system.
6. The system as recited in claim 1 for visually notifying a user of a message, further
including:
a notification server, operatively coupled to the unified message server, for retrieving
information regarding the message received by the unified message server; a telephone adjunct including an interface for receiving the information from the
notification server, the adjunct for displaying the information regarding the message.
7. The system of claim 6, wherein the telephone adjunct includes means for polling
the notification server for the information at predetermined intervals.
8. The system of claim 6, wherein the interface ofthe telephone adjunct includes
a modem.
9. The system of claim 8, wherein the telephone adjunct includes a programmable
processor for directing the modem to establish a communication session with the notification
server.
10. The system of claim 6, wherein the information regarding the message includes
information selected from the group consisting of sender identity, subject header, type of
message, and time of receipt by the unified message server.
11. The system of claim 6, further comprising:
at least one proxy interface for accessing at least one legacy messaging system in
response to a request from the unified message server to receive the message;
a message protocol converter, operatively associated with the proxy interface, for
converting the message stored by the at least one legacy messaging system to a predetermined
protocol usable by the unified message server; and
a communication network for transferring the message from the protocol converter to the
unified message server.
12. A unified messaging system, comprising:
an interface for permitting a user to select at least one predetermined attribute associated
with messages;
a user profile for storing the predetermined attribute selected by the user; and a filter mechanism for processing an incoming message based on the predetermined
attribute stored in the user profile.
13. The unified messaging system of claim 12, wherein the filter mechanism includes
means for selectively discarding or storing the incoming message as a function of the
predetermined attribute in the user profile.
14. The unified messaging system of claim 12, wherein the filter mechanism includes
means for selectively notifying the user of the incoming message based on the predetermined
attribute in the user profile.
15. The unified messaging system of claim 12, wherein the filter mechanism includes
a message server configured to process the incoming message according to the predetermined
attribute in the user profile.
16. The unified message system of claim 12, wherein the interface includes a web
page configured to allow the user to input the predetermined attribute.
17. The unified message system of claim 12, wherein the interface includes an
interactive voice response (INR) system configured to allow the user to input the predetermined
attribute.
18. The unified message system of claim 12, wherein the predetermined attribute
includes a message attribute selected from the group consisting of send identification and subject
header.
PCT/US2001/000604 2000-02-29 2001-01-09 Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls WO2001065871A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001226360A AU2001226360A1 (en) 2000-02-29 2001-01-09 Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US09/515,784 2000-02-29
US09/514,653 US6498835B1 (en) 2000-02-29 2000-02-29 Method and system for providing visual notification in a unified messaging system
US09/515,030 US6487278B1 (en) 2000-02-29 2000-02-29 Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls
US09/514,653 2000-02-29
US09/515,030 2000-02-29
US09/515,784 US6438215B1 (en) 2000-02-29 2000-02-29 Method and system for filter based message processing in a unified messaging system

Publications (1)

Publication Number Publication Date
WO2001065871A1 true WO2001065871A1 (en) 2001-09-07

Family

ID=27414579

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/000604 WO2001065871A1 (en) 2000-02-29 2001-01-09 Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls

Country Status (2)

Country Link
AU (1) AU2001226360A1 (en)
WO (1) WO2001065871A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2366164A (en) * 2000-07-07 2002-02-27 Anodyne Developments Ltd Filtering messages within a computer network
US8537989B1 (en) 2010-02-03 2013-09-17 Tal Lavian Device and method for providing enhanced telephony
US8548131B1 (en) 2010-02-03 2013-10-01 Tal Lavian Systems and methods for communicating with an interactive voice response system
US8548135B1 (en) 2010-02-03 2013-10-01 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8553859B1 (en) 2010-02-03 2013-10-08 Tal Lavian Device and method for providing enhanced telephony
US8572303B2 (en) 2010-02-03 2013-10-29 Tal Lavian Portable universal communication device
US8594280B1 (en) 2010-02-03 2013-11-26 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US8625756B1 (en) 2010-02-03 2014-01-07 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8681951B1 (en) 2010-02-03 2014-03-25 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8687777B1 (en) 2010-02-03 2014-04-01 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8731148B1 (en) 2012-03-02 2014-05-20 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8867708B1 (en) 2012-03-02 2014-10-21 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8879698B1 (en) 2010-02-03 2014-11-04 Tal Lavian Device and method for providing enhanced telephony
US8903073B2 (en) 2011-07-20 2014-12-02 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US9001819B1 (en) 2010-02-18 2015-04-07 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
CN110519288A (en) * 2019-09-02 2019-11-29 珠海格力电器股份有限公司 Communication protocol configuration method, device and the configuration system of data converter

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5608786A (en) * 1994-12-23 1997-03-04 Alphanet Telecom Inc. Unified messaging system and method
US5742905A (en) * 1994-09-19 1998-04-21 Bell Communications Research, Inc. Personal communications internetworking
US5828833A (en) * 1996-08-15 1998-10-27 Electronic Data Systems Corporation Method and system for allowing remote procedure calls through a network firewall
US5870605A (en) * 1996-01-18 1999-02-09 Sun Microsystems, Inc. Middleware for enterprise information distribution
US6167253A (en) * 1995-01-12 2000-12-26 Bell Atlantic Network Services, Inc. Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742905A (en) * 1994-09-19 1998-04-21 Bell Communications Research, Inc. Personal communications internetworking
US5742668A (en) * 1994-09-19 1998-04-21 Bell Communications Research, Inc. Electronic massaging network
US5608786A (en) * 1994-12-23 1997-03-04 Alphanet Telecom Inc. Unified messaging system and method
US6167253A (en) * 1995-01-12 2000-12-26 Bell Atlantic Network Services, Inc. Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java
US5870605A (en) * 1996-01-18 1999-02-09 Sun Microsystems, Inc. Middleware for enterprise information distribution
US5828833A (en) * 1996-08-15 1998-10-27 Electronic Data Systems Corporation Method and system for allowing remote procedure calls through a network firewall

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2366164A (en) * 2000-07-07 2002-02-27 Anodyne Developments Ltd Filtering messages within a computer network
US8681951B1 (en) 2010-02-03 2014-03-25 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8687777B1 (en) 2010-02-03 2014-04-01 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8548135B1 (en) 2010-02-03 2013-10-01 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8553859B1 (en) 2010-02-03 2013-10-08 Tal Lavian Device and method for providing enhanced telephony
US8572303B2 (en) 2010-02-03 2013-10-29 Tal Lavian Portable universal communication device
US8594280B1 (en) 2010-02-03 2013-11-26 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US8548131B1 (en) 2010-02-03 2013-10-01 Tal Lavian Systems and methods for communicating with an interactive voice response system
US8537989B1 (en) 2010-02-03 2013-09-17 Tal Lavian Device and method for providing enhanced telephony
US8625756B1 (en) 2010-02-03 2014-01-07 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8879698B1 (en) 2010-02-03 2014-11-04 Tal Lavian Device and method for providing enhanced telephony
US9001819B1 (en) 2010-02-18 2015-04-07 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US8903073B2 (en) 2011-07-20 2014-12-02 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US8867708B1 (en) 2012-03-02 2014-10-21 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8731148B1 (en) 2012-03-02 2014-05-20 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
CN110519288A (en) * 2019-09-02 2019-11-29 珠海格力电器股份有限公司 Communication protocol configuration method, device and the configuration system of data converter

Also Published As

Publication number Publication date
AU2001226360A1 (en) 2001-09-12

Similar Documents

Publication Publication Date Title
US7068762B2 (en) Method and system for providing visual notification in a unified messaging system
US6438215B1 (en) Method and system for filter based message processing in a unified messaging system
US6868144B2 (en) Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls
US8503639B2 (en) Method and apparatus for adaptive message and call notification
US7006609B2 (en) System for the remote notification and retrieval of electronically stored messages
US8488761B2 (en) Methods and systems for a call log
US7181495B2 (en) Method and system for filtering notification of e-mail messages
US8761355B2 (en) Methods and systems for notification of call to device
US20050157858A1 (en) Methods and systems for contact management
WO1999065256A2 (en) System and method for delivering e-mail notification to mobile phones
WO2001065871A1 (en) Method and system for interfacing systems unified messaging with legacy systems located behind corporate firewalls
JP2006507780A (en) Method and apparatus for call notification to a device
JP2006507771A (en) Method and apparatus for adaptive message notification
JP2006507607A (en) Method and system for single number text messaging.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP