WO2004021688A1 - Intelligent peripheral for speech recognition in networks - Google Patents

Intelligent peripheral for speech recognition in networks Download PDF

Info

Publication number
WO2004021688A1
WO2004021688A1 PCT/EP2002/009822 EP0209822W WO2004021688A1 WO 2004021688 A1 WO2004021688 A1 WO 2004021688A1 EP 0209822 W EP0209822 W EP 0209822W WO 2004021688 A1 WO2004021688 A1 WO 2004021688A1
Authority
WO
WIPO (PCT)
Prior art keywords
switch
vpn
network
telecommunication
address
Prior art date
Application number
PCT/EP2002/009822
Other languages
French (fr)
Inventor
Jan Bengt Kenneth THÖRNER
Original Assignee
Telefonaktiebolaget L M Ericsson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson filed Critical Telefonaktiebolaget L M Ericsson
Priority to CA002500100A priority Critical patent/CA2500100A1/en
Priority to GB0504016A priority patent/GB2407737B/en
Priority to AU2002331103A priority patent/AU2002331103A1/en
Priority to PCT/EP2002/009822 priority patent/WO2004021688A1/en
Priority to US10/525,586 priority patent/US7606713B2/en
Publication of WO2004021688A1 publication Critical patent/WO2004021688A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42204Arrangements at the exchange for service or number selection by voice
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
    • H04M3/4931Directory assistance systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services or time announcements
    • H04M3/493Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
    • H04M3/4936Speech interaction details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/12Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place intelligent networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13098Mobile subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13345Intelligent networks, SCP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13378Speech recognition, speech analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13384Inter-PBX traffic, PBX networks, e.g. corporate networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13399Virtual channel/circuits

Definitions

  • SR Speech Recognition
  • SR implemented in networks, however, is more difficult to perform, as a SR service in a network must be able to be used by many users, and, consequently, then, the SR service must be speaker-independent.
  • SR in networks exists in some implementations today, but the trend is that it now starts to be commodity for many applications. Important to consider is that SR in mobile telephones (or other telecommunication apparatus) and SR in networks do not compete, as they cover different user needs. SR in mobile telephones is of a personal nature. The user enters mostly his/her own colleagues, relatives, and friends with names or sometimes with nicknames in the memory of the mobile telephone. Moreover, sometimes some names of companies, shops, etc. which are frequently called are entered into the memory of the mobile telephone.
  • SR Apart from SR in mobile telephones, SR is to some extent integrated in network products. Examples of deployed speech driven services nowadays are:
  • This invention makes it possible to introduce SR in an existing network, with minimal changes to the IN system. Upon that, the invention facilitates the use of SR, making it possible to talk in plain text with the system, not having to remember- or looking up telephone numbers or email addresses. Summary of the invention
  • the service VPN is used as an example.
  • the invention is, however, applicable to all IN based services (2G) and all 3G services where the user makes a call or sends an email to either a person, place or terminal or service.
  • IN based services (2G) at state of the art networks today, where the invention can be used are like Freephone (also known as 800-service), Premium rate (also known as 900-service), UPT, Credit Call, Televoting, 3G services, etc. Combinations are also allowed and shows the strength of the invention, as when UPT and VPN are combined, by building up a private VPN network, where all members are persons with individual UPT- addresses.
  • the present invention provides an intelligent peripheral as claimed in claim 1.
  • Intelligent peripherals are already on the market and need only be amended with the functionality according to the present invention. They perform the speech-to- VPN-address transition for the network apparatus that controls the switch in the telecommunication network. In that sense, the intelligent peripheral is an easy add-on, installed substantially transparent to the existing network. There is no need to either change the network apparatus or the switch heavily. The network apparatus and the switch need only be programmed to communicate with the intelligent peripheral. No new standards are necessary for either the network apparatus or the switch, which is considered as an operational advantage for the network provider in reducing the threshold for deployment of the invention.
  • the intelligent peripheral stores VPN-addresses including at least one of the following sets: private persons, personal functions (as peoples roles, my dentist, my plumber, my bank man, "grandmother", etc, specific terminals or services.
  • the intelligent peripheral translates the spoken name of the persons, personal functions, specific terminals or services into a corresponding code of said person, function, terminal or service. These codes represents the person, function, terminal or service and are transferred to the network apparatus which translates them into the current place or terminal where the person, personal function, terminal or service are reached, like the fixed telephone addresses, mobile telephone addresses, e-mail addresses, and facsimile addresses.
  • this intelligent peripheral can easily be used for all kinds of telecommunication apparatus, like fixed telephones, mobile telephones, personal computers, lap tops, palm tops, personal digital assistants, facsimile machines, etc., provided that they are provided with a microphone to receive speech instructions from a user.
  • the present invention also relates to a telecommunication network as claimed in any of the claims 5-14. In such a network, speech recognition may have the following advantages:
  • VPN is one possible service, used here as an example.
  • the list of services where this concept may be used is not limited.
  • the intelligent peripheral may be provided as an add-on to the network apparatus within an IN-system or anywhere else in a network, the existing functionality of the network apparatus in the network and the network itself is maintained.
  • the network apparatus may, as in the prior art, provide services like divert, voicemail, etc.
  • the telecommunication network may support a Parlay/OSA API architecture.
  • the network apparatus comprises a Service Capability Server (SCS) arranged to control the switch, and at least one application server connected to the SCS, the intelligent peripheral being also connected to the SCS and the application server.
  • SCS Service Capability Server
  • the telecommunication network supports an intelligent network (IN) architecture.
  • the network apparatus may comprise a SCP arranged to control the switch, the intelligent peripheral being also connected to the service control point.
  • the UPT service may be used, with support of the invention in combination with information on actual location of a user, to provide location dependent switching.
  • a user calling for a person with a certain profession, e.g. a dentist will be connected to the closest dentist in the actual neighborhood of the user, by requesting for "A dentist” instead of "My dentist", which would be addressed as the user's dentist, probably residing in the user's hometown.
  • the invention also relates to a method as claimed in claim 15 or 16. Moreover, the invention relates to a computer program product as claimed in claim 17. Finally, the invention relates to a data carrier provided with such a computer program product.
  • Figure 1 shows one example of a network structure in which the invention may be applied.
  • FIGS 2 and 3 show embodiments of the invention.
  • Figure 4 shows a schematic diagram of an intelligent peripheral.
  • FIGS 5 and 6 show alternative embodiments of the present invention.
  • ATN Advanced Intelligent Network
  • IN Intelligent Network
  • CTI enterprise Computer- Telephony Integration
  • edge of network approach As to the edge of network approach the following is observed. This approach is good for providing customized services to meet the specific needs of a customer. However, often the ability to use information or resources within the network domain would provide a more efficient solution than an edge of network approach, e.g., calls are often unnecessarily "tromboned" to and from edge of network devices.
  • an arrangement is proposed that combines the benefits of the network centric approach of economies of scale and reliability, and those of the edge of network approach with its inherent flexibility.
  • the application may be built, tested and operated by enterprises outside of the network domain.
  • access to network information and resources e.g., like IVR's
  • control of network capabilities are available to the enterprise domain.
  • Parlay/OSA API Architecture (which is next generation network architecture) an Application Programming Interface resides between an application layer and a service component layer as illustrated in figure 1.
  • Figure 1 shows a network architecture with a plurality of application servers/applications 1. They are arranged to communicate with a unified service network 5. The connections may be physical connections, however, they may also be based on wireless connections. Between the unified service network 5 and the application servers/applications 1 there is an Application Programming Interface (API)
  • API Application Programming Interface
  • the unified service network 5 comprises one or more service capability servers 7.
  • These service capability servers 7 are all connected to one or more of the application servers/applications 1, as shown.
  • the unified service network 5 is also connected to a connectivity/backbone network 9 providing different network protocols to connect to a plurality of access networks.
  • the access networks may comprise one or more of the following, i.e. all 2G and 3G networks are relevant: • PSTN 11 (Public Switched Telephone Network);
  • GSM 13 Global System for Mobile Communications
  • UMTS 15 Universal Mobile Telecommunications System
  • CDMA 17 Code Division Multiple Access
  • TDMA 19 Time Division Multiple Access
  • Each of the access networks 11-21 is "connected" to a plurality of telecommunication devices. Again, these connections may be physical connections (like copper wire or glass fibers) or wireless.
  • Figure 1 shows some examples of telecommunication devices widely used, e.g., a fixed telephone 23, a facsimile machine 25, a personal computer 26, a laptop 39, and one or more mobile telephones 41.
  • each one of the telecommunication devices is provided with a microphone.
  • the facsimile machine 25 is shown to be provided with a separate microphone 27, whereas the personal computer 26 is also provided with a separate microphone 29.
  • these microphones 27-29 may be integrated in the facsimile machine and the personal computer 26, respectively.
  • the laptop 39 is also provided with a microphone 40, however, this is shown to be integrated with the apparatus itself.
  • the personal computer 26 is further shown to comprise box 35 that is provided with the intelligence (processor), the memories and the disc drives, etc., as is known to a personal skilled in the art, a monitor 37, a keyboard 33 and a mouse 31.
  • Parlay/OSA API By enabling access to network capabilities via the Parlay/OSA API, service providers, independent software venders and other developers in the IT (Information Technology) and telecommunication industries are empowered to generate a new range of applications that benefit from, add value to, functionality resident in public and/or private communications networks.
  • the Parlay/OSA API does not need to directly open up the networks signaling of public users. Rather, network capabilities that are useful to enterprise business applications can be encapsulated and may be visible in a manner that maintains the integrity, performance and security of networks. Network integrity protection is an integral part of the Parlay/OSA API design and implementation.
  • Parlay/OSA API specifications are provided by the Parlay group which, nowadays, consists not only of the major telecom network suppliers but also of major IT vendors, as well as of the operators including Ericsson, British Telecom, France Telecom, AT&T, CSELT, Siemens, Nokia, Alcatel, Lucent, Fujitsu, LBM, Cisco, Compaq, Hewlett Packard, Microsoft, Logica, and others. These specifications are in the public domain and are, e.g., available on the Internet (http:Wwww.parlay.org).
  • the current Parlay specification addresses call control, messaging, security, wireless services and IP (Internet Protocol) services. It is an open and technology-independent specification.
  • the specification is based on an architecture with two categories of interfaces: service interfaces and framework interfaces.
  • the services interfaces offer access to network capabilities and information.
  • these interfaces are restricted to generic, enhanced, conference, multi-media, INAP1 (Intelligent Network Application Part) and CAP (Competitive Access Provider) call control, generic messaging, generic user interaction, collectivity management, location and user status services.
  • the framework interfaces provide the supporting capabilities necessary for the service interfaces to be secure, resilient, located and managed: authentication, authorization, service discovery, event notification, integrity management, heart beat mechanism, logging, auditing, service registration and subscription.
  • the Parlay/OSA interface provides access to the network-held information and capabilities but by carefully encapsulating them in capability features and forcing the access to be integrated with its framework mechanisms, it ensures the networks integrity and safety.
  • the Parlay interface is, thus, well suited to bind the service network together with the connectivity/backbone network 9 to give the service network a secure access to the access networks.
  • FIG 2 shows an embodiment of the invention.
  • an intelligent peripheral in the form of a Speech Recognition User Interaction Service Capability Server 43 (SRUI SCS) is provided.
  • SRUI SCS Speech Recognition User Interaction Service Capability Server 43
  • This service capability server 7 may be a Jambala service capability server marketed by Ericsson.
  • This services capability server 7 comprises an open system architecture (OSA) framework 42, a user interaction unit 44, and a call control unit 46.
  • OSA open system architecture
  • FIG 2 shows a service switching point (SSP) 49 provided in the cormectivity/backbone network 9 (cf. figure 1).
  • SSP service switching point
  • the SRUI SCS 43 is connected via a connection 45 with the SSP 49, and with one or more of the application servers/applications 1 that are connected to the service capability server 7 via a connection 59.
  • the connection 45 between the SSP 49 and the SRUI SCS 43 is preferably an ISDN connection. However, any other suitable connection may be provided instead.
  • the SSP 49 is connected via a connection 47 to the service capability server 7 via, preferably, an INAP/SS 7 link (Intelligent Network Application Protocol/CCITT Signaling System number 7). These connections may be physical or wireless.
  • the OSA framework 42 offers Parlay authentication, access, initial and registration services.
  • the user interface UI 44 offers the Parlay generic user interaction services.
  • the call control CC 46 offers the Parley generic call control services.
  • the SRUI SCS 43 is an intelligent peripheral that is arranged to communicate with the application servers/applications 1, the call control CC 46, and the service switching point SSP 49. It can be provided as a separate box with the appropriate input and output connections to the others components shown. Therefore, the SRUI SCS 43 does not demand any physical change to the Parlay/OSA API architecture as shown in figure 1. The only amendment needed is that the application servers/applications 1, the call control CC 46, and the SSP 49 need by provided with appropriate functionality to allow communications with the SRUI SCS 43 to provide the required functionality.
  • the SRUI SCS is arranged such that it provides the Parlay user interaction service with text-to-speech and speech recognition functions. The order of the functioning may be as follows.
  • An incoming call from a party A desiring to reach a party B is reported from SSP 49 to call control CC 46.
  • the CC 46 informs one of the application servers/applications 1. That application server/application 1, then, asks the SRUI SCS 43 to perform a speech recognition operation.
  • the SRUI SCS 43 is provided with a processor (or a plurality of processors) (figure 4). This processor of the SRUI SCS 43 is arranged to receive the request of the application server/application 1 for speech recognition. The processor, then, asks the call control CC 46 to ask the SSP 49 to set up a link between the party A and the SRUI SCS 43 via the SSP 49.
  • party A is requested to speak the name of party B.
  • this name need not be the "real" name of party B. It can be any code or term under which party B is registered in a memory (not shown) of the SRUI SCS 43.
  • the VPN-address is sent by the SRUI SCS 43 to the requesting application server/application 1.
  • the application server/application 1 instructs the SRUI SCS 43 to release the connection with the SSP 49.
  • the SRUI SCS 43 instructs the call control CC 46 to further instruct the SSP 49 to disconnect the speech channel between the SSP 49 and the SRUI SCS 43.
  • the application server/application 1 is able to route the call from party A to party B in accordance with prior art operations, since it is now knowing the VPN-address of the party B to be called.
  • the application server/application 1 may support known functions like divert, voice, etc.
  • FIG. 3 shows a further embodiment of the present invention.
  • Like reference numbers in figure 3 as in figures 1 and 2 refer to the same components.
  • box 35' instead of a box 35 as in figure 1. This is just to show that the box 35 may be provided in the form of a tower.
  • the architecture shown in figure 3 comprises a Service Control Point 51 (SCP) and a Speech Recognition Intelligent Peripheral (SR LP) 53.
  • SCP Service Control Point
  • SR LP Speech Recognition Intelligent Peripheral
  • SCP 51 via a connection 47'.
  • Communication between the SSP 49 and the SCP 51 may be provided using the LNAP (Intelligent Network Application Protocol).
  • ISUP Integrated Services User Part
  • ISDN Integrated Services Digital Network
  • the SSP sets up a Speech channel to the SR IP 53. After this speech channel is established between SSP 49 and the SR IP 53, the SR IP 53 notifies the party A that it can now speak the name of party B.
  • the spoken name of party B is sent to the SR IP 53 through SSP 49 via connection 45'.
  • the SR IP 53 translates the received spoken name of party B to the VPN-address of party B as stored in it's memory (of figure 4). It then sends this VPN-address via the SSP to the SCP 51. Upon having sent this VPN-address, the SR IP 53 releases it's speech channel with SSP 49.
  • the SCP should not have to be changed when Speech Recognition is introduced
  • the SCP receives a VPN-number, and does not know if Speech Recognition was involved or if it was a normal dialing of the VPN number.
  • SCP 51 is able to route the call of party A to party B in accordance with prior art techniques, since it now knows the VPN-address of party B.
  • the SCP 51 may support known functions like divert, voice mail, etc.
  • Figures 5 and 6 show alternative embodiments of the present invention. The same reference numbers in these figures as in the other figures refer to the same components/elements.
  • Figures 5 and 6 show a party A with one or more telecommunications apparatuses (a mobile 41 and a personal computer 40 being shown) trying to establish a call with a party B with one or more telecommunications apparatuses (a mobile 41 and a personal computer 40 being shown) through a network with a plurality of switches SSP 49.
  • one box 7; 51 is shown to schematically indicate a location of an SCS or an SCP, respectively.
  • Another box 43; 53 is shown to schematically indicate the location of the intelligent peripheral.
  • the SCS/SCP 7; 51 is connected to another switch SSP 49 than in figure 6.
  • the SCS/SCP 7; 51 is connected to the same switch SSP that is communicating with party A, whereas the intelligent peripheral is connected to another switch SSP 49.
  • the SCS/SCP 7; 51 is connected to the same switch SSP 49 as is the intelligent peripheral 43; 53.
  • (a) party A indicates in some way to the network that Speech Recognition in the network is to be used. This could be done in different ways, like pressing a short code on the mobile phone or the personal computer, speaking a word to the Speech Recognition function on the mobile phone or the personal computer or simply dialling a telephone number.
  • (a) party A indicates in some way to the network that Speech Recognition in the network is to be used. This could be done in different ways, like pressing a short code on the mobile phone or the personal computer, speaking a word to the Speech
  • Speech recognition in UPT VPN may provide for speech recognition in UPT (), for a Freephone, a Premium Rate, etc in an easy way.
  • SR Speech Recognition
  • SR for initiation of a communication to a person by using name, for addressing email or initiating calls by phone or addressing Home pages, has many advantages: • One does do not have to remember email-addresses, telephone numbers or web- addresses. One verbal address, the name, complemented by the way of communication is enough and easier to remember, e.g.: - "Nils Jonsson by email"
  • Voice activated services provides a hands-free alternative that allows use of mobile phones much more secure when driving.
  • Name is better than numbers from the SR perspective. Numbers can be of the length of 10-12 digits, all independent of each other, i.e. after one digit comes another that, from addressing perspective, is not related to the preceding one. When using a name that is different. First, mostly, there are only two words (instead of 10-12) to remember and for the SR system to understand. Secondly, the first and the last name are dependent on each other, which is a clear advantage if the number of persons in the directory is small, like in a VPN or in a Centrex group.
  • VPN/Centrex are mainly used within an organization / a company.
  • characteristics on the VPN service are, that it:
  • VPN or Centrex (which is similar to VPN) is a good choice as a first service example for SR, preferably a VPN or Centrex of a maximum of 500 persons.
  • SR SR within a VPN or within a Centrex-group increases the hit-rate, as the vocabulary is limited.
  • the number of persons with the same or with similar names are simply less than in the public network. And for combinations of given names and family name it is even more true.
  • the SR system identifies in the first case the name and looks up the phone number of Lars Svensson in the directory, which shows where he wants to be reached (which terminal) for the moment and connects the user to that telephone number. If the user said "Lars Svensson by email”, the email number of Lars Svensson was fetched from the directory and an email is sent.
  • SR addressing has its clear advantages in some situations when it is difficult to use push buttons, like when driving and walking. Especially in the car, the usage of SR could minimise he risk of accidents. Also when dark, the use of the voice is superior to other ways of handling a terminal.
  • the application server/application 1 which is still able to operate with the VPN-address of party B to be called by party A since it receives the VPN-address from the SRUI SCS 43 that performs the speech recognition function required.
  • One possible backup option after failure of the speech recognition function is, that the application server/application 1 informs the telecommunication apparatus of party A that the speech recognition has failed. This information may be provided either by a simulated voice message or a message in the display of the telecommunication apparatus.
  • Another backup possibility is that, if the telecommunication apparatus is a GSM or a DTMF fixed telephone, party A is requested to enter the name of party B by using the keys of the GSM or the DTMF fixed telephone to produce DTMF code that can be recognized by the SRUI SCS 43 or the SR IP 53, respectively.
  • Another option is that, if the telecommunication apparatus is a personal computer, party A is requested to simply key in the name of party B by means of keyboard 33.
  • a final fall back position is that party A is coimected to an operator of the application server/application 1 or the SCP 51, respectively.
  • Both the SRUI SCS 43 and the SR LP 53 can be seen as an intelligent peripheral providing the services as defined earlier.
  • Figure 4 shows that the intelligent peripheral 43, 53 is provided with a processor 55 and a memory 57, connected to the processor 55.
  • the processor 55 is arranged with suitable connections to communicate with the other devices shown in the figures 2, 3. This may be done in any way known to persons skilled in the art. The connections may be either fixed or wireless.
  • the memory 57 may, as the case may be, be provided with one or more of the following memory units: hard disc, ROM (Read Only Memory), RAM (Random Access Memory) and EEPROM (Electrically Erasable Programmable Read Only Memory). Of course, other types of memory units may be provided.
  • the processor 55 may be implemented as a plurality of processors, as the case may be.
  • SRUI SCS 43 and SR LP 53 may be comiected to other units (e.g., processors, memories, etc.).
  • the memory 57 stores VPN-addresses of a set of persons, personal functions, specific terminals or services.
  • the memory 57 also stores instructions to provide the processor 55 with the required SR (and JVR) capacity.
  • Speech recognition can enhance the effectiveness of call routing in Information and Business services.
  • Speech recognition technology can be integrated into IVR platforms.
  • IVR platforms E.g. call centre and AST-DR (Announcement Service Terminal, Digital Recording).
  • Speaker verification This future feature, where a person is identified by his/her voice will, will simplify the authentication process, bringing benefits in user acceptance and satisfaction - “easy of use”. Speaker Verification is used in some applications today, but is still too uncertain to use as the only identification tool (e.g. when collecting money in the cash dispensing machine), but it is sure of interest for the future.
  • Speech Recognition and Location based services e.g. to find the closest petrol station or restaurant, dentist etc, is starting up today, and this combination is very interesting to further develop in future.
  • Speech control to, e.g., WAP based services provides an alternative access. It is not always possible to read a message (drivers) and not all mobiles are WAP compatible (yet).
  • a direct voice command is quicker and more convenient than keying in the name or browsing.
  • a name of a stock which is not listed on a personal list of stock, is easier pronounced than written.
  • Blue-tooth will further stress the importance of voice access, simply because the mobile device could be out of eyesight. - And it will, that is one of the strengths with Bluetooth.

Abstract

A telecommunication network with an intelligent peripheral that is provided with a processor and a memory, as well as speech recognition functionality. The memory stores a list of VPN-addresses of at least one of a set of persons, personal functions, specific terminals and services. The telecommunication network also has a switch and a network apparatus. The intelligent peripheral provides for speed recognition and is provided as an add-on in the network.

Description

INTELLIGENT PERIPHERAL FOR SPEECH RECOGNITION IN NETWORKS
Prior art
Voice dialing in mobile telephones has been a success, and this feature is rated as one of best and innovative features in new handsets. Since some years, a number of mobile telephones include Speech Recognition (SR). SR in mobile telephones facilitates performing of good SR-quality as it could be implemented as speaker-dependent since, most of the time, only one user uses the mobile telephone.
SR implemented in networks, however, is more difficult to perform, as a SR service in a network must be able to be used by many users, and, consequently, then, the SR service must be speaker-independent. SR in networks exists in some implementations today, but the trend is that it now starts to be commodity for many applications. Important to consider is that SR in mobile telephones (or other telecommunication apparatus) and SR in networks do not compete, as they cover different user needs. SR in mobile telephones is of a personal nature. The user enters mostly his/her own colleagues, relatives, and friends with names or sometimes with nicknames in the memory of the mobile telephone. Moreover, sometimes some names of companies, shops, etc. which are frequently called are entered into the memory of the mobile telephone. However, the whole catalogue of worldwide companies, people, etc. is not entered due to practical and technical reasons. One could say that SR in mobile telephones serves a calling party with his/her personal needs. Of importance is also that the user of the mobile telephone is responsible for service management, i.e., to keep the entered list of names in the memory of the mobile telephone updated with relevant information. Nowadays, for technical reasons, mobile telephones lack features such as:
• speaker independent SR
• large vocabulary • speaker verification
• "natural language" design
• designing easy to use and intuitive speech interfaces and dialogs is very demanding and requires special experience and knowledge about human behavior. Doing this on a network scale would make sense, however, it is very difficult to do this on a very wide scale.
Apart from SR in mobile telephones, SR is to some extent integrated in network products. Examples of deployed speech driven services nowadays are:
• operator services
• automated handling of collect call
• automated directory inquiries
• automated call routing • value added services
• voice announcement application
• voice activated dialing.
To build up an Intelligent Network (IN) system in a network to introduce IN based services is
• expensive
• time consuming
This is also true for making changes in the IN system, working in the traditional way, including introduction of SR. Therefore, the ideal situation is if we can find a way when a new feature can be introduced with minimum needs (or no needs) for updating the IN system, hence the introduced new feature should be substantially transparent for the existing LN-system.
This invention makes it possible to introduce SR in an existing network, with minimal changes to the IN system. Upon that, the invention facilitates the use of SR, making it possible to talk in plain text with the system, not having to remember- or looking up telephone numbers or email addresses. Summary of the invention
In this description, the service VPN is used as an example. The invention is, however, applicable to all IN based services (2G) and all 3G services where the user makes a call or sends an email to either a person, place or terminal or service. Examples of IN based services (2G) at state of the art networks today, where the invention can be used are like Freephone (also known as 800-service), Premium rate (also known as 900-service), UPT, Credit Call, Televoting, 3G services, etc. Combinations are also allowed and shows the strength of the invention, as when UPT and VPN are combined, by building up a private VPN network, where all members are persons with individual UPT- addresses.
The present invention provides an intelligent peripheral as claimed in claim 1.
Such an intelligent peripheral can be easily developed. Intelligent peripherals are already on the market and need only be amended with the functionality according to the present invention. They perform the speech-to- VPN-address transition for the network apparatus that controls the switch in the telecommunication network. In that sense, the intelligent peripheral is an easy add-on, installed substantially transparent to the existing network. There is no need to either change the network apparatus or the switch heavily. The network apparatus and the switch need only be programmed to communicate with the intelligent peripheral. No new standards are necessary for either the network apparatus or the switch, which is considered as an operational advantage for the network provider in reducing the threshold for deployment of the invention. In an embodiment, the intelligent peripheral stores VPN-addresses including at least one of the following sets: private persons, personal functions (as peoples roles, my dentist, my plumber, my bank man, "grandmother",...)., specific terminals or services. The intelligent peripheral translates the spoken name of the persons, personal functions, specific terminals or services into a corresponding code of said person, function, terminal or service. These codes represents the person, function, terminal or service and are transferred to the network apparatus which translates them into the current place or terminal where the person, personal function, terminal or service are reached, like the fixed telephone addresses, mobile telephone addresses, e-mail addresses, and facsimile addresses. Then, this intelligent peripheral can easily be used for all kinds of telecommunication apparatus, like fixed telephones, mobile telephones, personal computers, lap tops, palm tops, personal digital assistants, facsimile machines, etc., provided that they are provided with a microphone to receive speech instructions from a user. The present invention also relates to a telecommunication network as claimed in any of the claims 5-14. In such a network, speech recognition may have the following advantages:
• it is easy to use, user-friendly during use and easy to access from any telecommunications apparatus; • it's use can be an alternative (and is not necessarily a substitute) to existing user interfaces;
• it is user-independent;
• it may have a good probability of success. That is it may be implemented in such a way that it provides a good hit rate for speech recognition. It could work in the most common environments for the users, taken into account background noise, etc. It can be used with most widely used telecommunication apparatuses, like GSM telephones, fixed telephones, IP-telephony (as well as mobile telephony using UMTS, GPRS, etc. etc.). Moreover, since it is supporting the network apparatus that is controlling the switch, the speech recognition can be used in most common 2G and 3G networks, like GSM, PSTN, ISDN, and IP-networks.
• It may clear the path for other SR services because it may provide good quality, easiness to use and create a habit among users regarding SR.
• It may provide a very quick response time in the order of two seconds.
As said above, VPN is one possible service, used here as an example. The list of services where this concept may be used is not limited.
Since the intelligent peripheral may be provided as an add-on to the network apparatus within an IN-system or anywhere else in a network, the existing functionality of the network apparatus in the network and the network itself is maintained. For instance, the network apparatus may, as in the prior art, provide services like divert, voicemail, etc. In one embodiment, the telecommunication network may support a Parlay/OSA API architecture. Then, to that end, the network apparatus comprises a Service Capability Server (SCS) arranged to control the switch, and at least one application server connected to the SCS, the intelligent peripheral being also connected to the SCS and the application server.
In another embodiment, the telecommunication network supports an intelligent network (IN) architecture. Then, the network apparatus may comprise a SCP arranged to control the switch, the intelligent peripheral being also connected to the service control point. In still another embodiment, in an IN architecture, the UPT service may be used, with support of the invention in combination with information on actual location of a user, to provide location dependent switching. A user calling for a person with a certain profession, e.g. a dentist, will be connected to the closest dentist in the actual neighborhood of the user, by requesting for "A dentist" instead of "My dentist", which would be addressed as the user's dentist, probably residing in the user's hometown.
The invention also relates to a method as claimed in claim 15 or 16. Moreover, the invention relates to a computer program product as claimed in claim 17. Finally, the invention relates to a data carrier provided with such a computer program product.
Below, the invention will be illustrated with reference to some figures which are only examples and not intended to limit the scope of protection as claimed.
Figure 1 shows one example of a network structure in which the invention may be applied.
Figures 2 and 3 show embodiments of the invention.
Figure 4 shows a schematic diagram of an intelligent peripheral.
Figures 5 and 6 show alternative embodiments of the present invention.
Description of embodiments
The evolution of intelligent capabilities in conventional switched networks and data networks has generated opportunities to- expose control of many telecommunication network capabilities to enterprises outside of the network operators domain. Historically, these capabilities have been exclusively under the control and exploitation of the network operators themselves. This has particularly been as a result of incompatible standards but also to ensure network security and integrity. This has resulted in:
• network centric communications service delivery mechanisms (e.g., ATN = Advanced Intelligent Network and IN = Intelligent Network), which run "in" the network domain but generally cannot access data in the enterprise domain for critical decision making; • "edge of network" service delivery mechanisms (e.g., enterprise Computer- Telephony Integration (CTI)) which run outside the network domain but generally cannot access critical information and resources or capabilities within the network.
As to the network centric approach the following is observed. This is an excellent approach for simple mass-market applications. The services are relatively easy to manage and they can be built in a very robust fashion. The disadvantages of this architecture in the modern market place are significant, as already observed in the introduction. For example, because the network operator is responsible for the creation and operation of all applications it is difficult to achieve the necessary flexibility to deploy many customized versions of services to different customer groups. Also the time-to-market for new applications is too long. This is due to the prolonged application development phase plus the requirement of network operators for extensive integration testing. Both these phases are long because the specialist software developers and the network operators apply rigorous quality control to ensure both the robustness of the new application and avoid any adverse impact on existing network services.
As to the edge of network approach the following is observed. This approach is good for providing customized services to meet the specific needs of a customer. However, often the ability to use information or resources within the network domain would provide a more efficient solution than an edge of network approach, e.g., calls are often unnecessarily "tromboned" to and from edge of network devices. Here, an arrangement is proposed that combines the benefits of the network centric approach of economies of scale and reliability, and those of the edge of network approach with its inherent flexibility.
In the arrangement as proposed, the application may be built, tested and operated by enterprises outside of the network domain. However, like in the network centric approach, access to network information and resources (e.g., like IVR's) and control of network capabilities are available to the enterprise domain.
Two approaches will be illustrated hereinafter as examples only. The first approach is an Parlay/OSA API (OSA = Open System Architecture, API = Application Programming Interface), embodiment whereas the second approach is an IN embodiment. Parlay/OSA API embodiment
In the Parlay/OSA API Architecture (which is next generation network architecture) an Application Programming Interface resides between an application layer and a service component layer as illustrated in figure 1.
Figure 1 shows a network architecture with a plurality of application servers/applications 1. They are arranged to communicate with a unified service network 5. The connections may be physical connections, however, they may also be based on wireless connections. Between the unified service network 5 and the application servers/applications 1 there is an Application Programming Interface (API)
3.
The unified service network 5 comprises one or more service capability servers 7.
These service capability servers 7 are all connected to one or more of the application servers/applications 1, as shown.
The unified service network 5 is also connected to a connectivity/backbone network 9 providing different network protocols to connect to a plurality of access networks. The access networks may comprise one or more of the following, i.e. all 2G and 3G networks are relevant: • PSTN 11 (Public Switched Telephone Network);
• ISDN 12 (Integrated Services Digital Network)
• GSM 13 (Global System for Mobile Communications);
• UMTS 15 (Universal Mobile Telecommunications System); • CDMA 17 (Code Division Multiple Access);
• TDMA 19 (Time Division Multiple Access);
• Data Network 21
Of course, other access networks (also those to be developed in the future) may be provided in the network architecture of figure 1.
Each of the access networks 11-21 is "connected" to a plurality of telecommunication devices. Again, these connections may be physical connections (like copper wire or glass fibers) or wireless. Figure 1 shows some examples of telecommunication devices widely used, e.g., a fixed telephone 23, a facsimile machine 25, a personal computer 26, a laptop 39, and one or more mobile telephones 41.
In accordance with the invention, each one of the telecommunication devices is provided with a microphone. The facsimile machine 25 is shown to be provided with a separate microphone 27, whereas the personal computer 26 is also provided with a separate microphone 29. However, these microphones 27-29 may be integrated in the facsimile machine and the personal computer 26, respectively. The laptop 39 is also provided with a microphone 40, however, this is shown to be integrated with the apparatus itself. The personal computer 26 is further shown to comprise box 35 that is provided with the intelligence (processor), the memories and the disc drives, etc., as is known to a personal skilled in the art, a monitor 37, a keyboard 33 and a mouse 31. Of course, other internal and external devices extending the capabilities of the personal computer 26 may be provided, as is known to a person skilled in the art. By enabling access to network capabilities via the Parlay/OSA API, service providers, independent software venders and other developers in the IT (Information Technology) and telecommunication industries are empowered to generate a new range of applications that benefit from, add value to, functionality resident in public and/or private communications networks. The Parlay/OSA API does not need to directly open up the networks signaling of public users. Rather, network capabilities that are useful to enterprise business applications can be encapsulated and may be visible in a manner that maintains the integrity, performance and security of networks. Network integrity protection is an integral part of the Parlay/OSA API design and implementation. Only by achieving high integrity with deployed API's will the operation of applications in the enterprise domain be effectively prevented from impacting existing network-hosted applications. New applications can be developed to meet the needs of a particular customer group and can be tested in isolation from existing network applications, thus, enabling both rapid development and flexibility. The Parlay/OSA API specifications are provided by the Parlay group which, nowadays, consists not only of the major telecom network suppliers but also of major IT vendors, as well as of the operators including Ericsson, British Telecom, France Telecom, AT&T, CSELT, Siemens, Nokia, Alcatel, Lucent, Fujitsu, LBM, Cisco, Compaq, Hewlett Packard, Microsoft, Logica, and others. These specifications are in the public domain and are, e.g., available on the Internet (http:Wwww.parlay.org).
The current Parlay specification addresses call control, messaging, security, wireless services and IP (Internet Protocol) services. It is an open and technology-independent specification. The specification is based on an architecture with two categories of interfaces: service interfaces and framework interfaces. The services interfaces offer access to network capabilities and information. In phase 2 of the development of Parlay/OSA API, these interfaces are restricted to generic, enhanced, conference, multi-media, INAP1 (Intelligent Network Application Part) and CAP (Competitive Access Provider) call control, generic messaging, generic user interaction, collectivity management, location and user status services. The framework interfaces provide the supporting capabilities necessary for the service interfaces to be secure, resilient, located and managed: authentication, authorization, service discovery, event notification, integrity management, heart beat mechanism, logging, auditing, service registration and subscription. The Parlay/OSA interface provides access to the network-held information and capabilities but by carefully encapsulating them in capability features and forcing the access to be integrated with its framework mechanisms, it ensures the networks integrity and safety.
The Parlay interface is, thus, well suited to bind the service network together with the connectivity/backbone network 9 to give the service network a secure access to the access networks.
Figure 2 shows an embodiment of the invention. In accordance with the invention an intelligent peripheral in the form of a Speech Recognition User Interaction Service Capability Server 43 (SRUI SCS) is provided. In the embodiment shown in figure 2, in which the same reference numbers as in figure 1 refer to the same components as in figure 1, the SRUI SCS 43 is connected to one service capability server 7. This service capability server 7 may be a Jambala service capability server marketed by Ericsson. This services capability server 7 comprises an open system architecture (OSA) framework 42, a user interaction unit 44, and a call control unit 46.
Figure 2 shows a service switching point (SSP) 49 provided in the cormectivity/backbone network 9 (cf. figure 1).
The SRUI SCS 43 is connected via a connection 45 with the SSP 49, and with one or more of the application servers/applications 1 that are connected to the service capability server 7 via a connection 59. The connection 45 between the SSP 49 and the SRUI SCS 43 is preferably an ISDN connection. However, any other suitable connection may be provided instead. The SSP 49 is connected via a connection 47 to the service capability server 7 via, preferably, an INAP/SS 7 link (Intelligent Network Application Protocol/CCITT Signaling System number 7). These connections may be physical or wireless.
The OSA framework 42 offers Parlay authentication, access, initial and registration services.
The user interface UI 44 offers the Parlay generic user interaction services. The call control CC 46 offers the Parley generic call control services. The SRUI SCS 43 is an intelligent peripheral that is arranged to communicate with the application servers/applications 1, the call control CC 46, and the service switching point SSP 49. It can be provided as a separate box with the appropriate input and output connections to the others components shown. Therefore, the SRUI SCS 43 does not demand any physical change to the Parlay/OSA API architecture as shown in figure 1. The only amendment needed is that the application servers/applications 1, the call control CC 46, and the SSP 49 need by provided with appropriate functionality to allow communications with the SRUI SCS 43 to provide the required functionality. The SRUI SCS is arranged such that it provides the Parlay user interaction service with text-to-speech and speech recognition functions. The order of the functioning may be as follows.
An incoming call from a party A desiring to reach a party B is reported from SSP 49 to call control CC 46. The CC 46 informs one of the application servers/applications 1. That application server/application 1, then, asks the SRUI SCS 43 to perform a speech recognition operation. The SRUI SCS 43 is provided with a processor (or a plurality of processors) (figure 4). This processor of the SRUI SCS 43 is arranged to receive the request of the application server/application 1 for speech recognition. The processor, then, asks the call control CC 46 to ask the SSP 49 to set up a link between the party A and the SRUI SCS 43 via the SSP 49. After the SSP 49 has provided this link between the SRUI SCS 43 and party A, party A is requested to speak the name of party B. Of course, this name need not be the "real" name of party B. It can be any code or term under which party B is registered in a memory (not shown) of the SRUI SCS 43. Upon receiving the name of party B, SRUI SCS 43 translates the name of party B with its speech recognition function into the VPN-address of party B (VPN = Virtual Private Network ). The VPN-address is sent by the SRUI SCS 43 to the requesting application server/application 1. Upon receiving the VPN-address, the application server/application 1 instructs the SRUI SCS 43 to release the connection with the SSP 49. To that end, the SRUI SCS 43 instructs the call control CC 46 to further instruct the SSP 49 to disconnect the speech channel between the SSP 49 and the SRUI SCS 43.
Then, the application server/application 1 is able to route the call from party A to party B in accordance with prior art operations, since it is now knowing the VPN-address of the party B to be called. The application server/application 1 may support known functions like divert, voice, etc.
INIVR (Intelligent Network Interactive Voice Response) Embodiment
Figure 3 shows a further embodiment of the present invention. Like reference numbers in figure 3 as in figures 1 and 2 refer to the same components.
It is observed, that the personal computers 26 in figures 2 and 3 are provided with a box
35' instead of a box 35 as in figure 1. This is just to show that the box 35 may be provided in the form of a tower.
The architecture shown in figure 3 comprises a Service Control Point 51 (SCP) and a Speech Recognition Intelligent Peripheral (SR LP) 53. The SSP 49 is coimected to the
SCP 51 via a connection 47'. Communication between the SSP 49 and the SCP 51 may be provided using the LNAP (Intelligent Network Application Protocol). The SSP 49 is connected to the SR LP 53 via a connection 45'. Communications between the SSP 49 and the SR LP 53 may be provided using ISUP, INAP or ISDN (ISUP = Integrated Services User Part; ISDN = Integrated Services Digital Network). A typical sequence of operations in accordance with the invention may be as follows. A party A desiring to call a party B notifies in some predetermined way to the SSP 49 that it likes to use speech recognition, instead of normal dialing. This may be done in any suitable way, as having Speech Recognition "always-on" and all calls from A are automatically directed to the Speech Recognition function via the SSP, or by having a special telephone number to reach the Speech Recognition function via the SSP. In the latter case, this telephone number could be programmed into the terminal of the user and be initiated by a short code or by just talking to the Speech recognition function in the terminal ordering it to initiate the number to the Speech Recognition function in the network which initiates a connection to the SSP. The SSP sets up a Speech channel to the SR IP 53. After this speech channel is established between SSP 49 and the SR IP 53, the SR IP 53 notifies the party A that it can now speak the name of party B. The spoken name of party B is sent to the SR IP 53 through SSP 49 via connection 45'. The SR IP 53 translates the received spoken name of party B to the VPN-address of party B as stored in it's memory (of figure 4). It then sends this VPN-address via the SSP to the SCP 51. Upon having sent this VPN-address, the SR IP 53 releases it's speech channel with SSP 49. At this IVR embodiment according to the present invention (the main idea is that the SCP should not have to be changed when Speech Recognition is introduced), the SCP receives a VPN-number, and does not know if Speech Recognition was involved or if it was a normal dialing of the VPN number. Then, SCP 51 is able to route the call of party A to party B in accordance with prior art techniques, since it now knows the VPN-address of party B.
The SCP 51 may support known functions like divert, voice mail, etc. Figures 5 and 6 show alternative embodiments of the present invention. The same reference numbers in these figures as in the other figures refer to the same components/elements. Figures 5 and 6 show a party A with one or more telecommunications apparatuses (a mobile 41 and a personal computer 40 being shown) trying to establish a call with a party B with one or more telecommunications apparatuses (a mobile 41 and a personal computer 40 being shown) through a network with a plurality of switches SSP 49. In the figures 5 and 6 one box 7; 51 is shown to schematically indicate a location of an SCS or an SCP, respectively. Another box 43; 53 is shown to schematically indicate the location of the intelligent peripheral.
In figure 5, the SCS/SCP 7; 51 is connected to another switch SSP 49 than in figure 6. In figure 5, the SCS/SCP 7; 51 is connected to the same switch SSP that is communicating with party A, whereas the intelligent peripheral is connected to another switch SSP 49. In figure 6, the SCS/SCP 7; 51 is connected to the same switch SSP 49 as is the intelligent peripheral 43; 53.
In the arrangement according to figure 5, the following steps are performed to establish a call between party A and B (figure 5 shows steps a-d too):
(a) party A indicates in some way to the network that Speech Recognition in the network is to be used. This could be done in different ways, like pressing a short code on the mobile phone or the personal computer, speaking a word to the Speech Recognition function on the mobile phone or the personal computer or simply dialling a telephone number.
(b) One such action by party A results in a connection set up through the network from party A to the Speech Recognition function performed by intelligent peripheral 43; 53 in the network. After having talked to the SR, telling who or where he wants to call/mail, a translation is made of his spoken words to the corresponding IN address. This IN address is sent back to his own switch SSP 49 in the switching network.
(c) His switch SSP 49 now sends this IN address to the SCS/SCP 7; 51 as a standard IN request, including the identity and the location of party A. The SCS/SCP 7; 51 answers by sending the actual location or terminal of party B to the switch SSP 49. (d) The switching network uses this new address to call B.
In the arrangement according to figure 6, the following steps are performed to establish a call between party A and B (figure 6 shows steps a-d too):
(a) party A indicates in some way to the network that Speech Recognition in the network is to be used. This could be done in different ways, like pressing a short code on the mobile phone or the personal computer, speaking a word to the Speech
Recognition function on the mobile phone or the personal computer or simply dialling a telephone number.
(b) One such action by party A results in a connection set up through the network from party A to the Speech Recognition function performed by intelligent peripheral 43; 53 in the network. After having talked to the SR, telling who or where he wants to call/mail, a translation is made of his spoken words to the corresponding IN address. (c) This IN address is sent directly to the SCS/SCP 7; 51 via their common switch SSP 49 in the switching network as a standard IN request, including the identity and the location .of party A. The SCS/SCP 7; 51 answers by sending the actual location or terminal of party B to the common switch SSP 49. (d) The switching network uses this new address to call B.
Another example of services: Speech recognition in UPT VPN, Freephone, Premium Rate or any other IN service.ΥhQ present invention may provide for speech recognition in UPT (), for a Freephone, a Premium Rate, etc in an easy way.
By its nature, Speech Recognition (SR) will always fail in some cases. All systems fail sometimes and the strength of a system is how it handles those failures. Therefore the key question for SR (like any other system) is to find applications, which compensate for that fact. If an application can be found where the probability of SR failure is of the same small magnitude, or less, as other failure, due to technical reasons, user mistakes etc, the SR is of no problem. But, to be confident with SR, it is always good to have a backup alternative, just in case. (See below)
Example
SR for initiation of a communication to a person by using name, for addressing email or initiating calls by phone or addressing Home pages, has many advantages: • One does do not have to remember email-addresses, telephone numbers or web- addresses. One verbal address, the name, complemented by the way of communication is enough and easier to remember, e.g.: - "Nils Jonsson by email"
- "Karl Svensson by phone"
- "John Svensson by SMS
- "Home page of Lars Olsson" • The service works without having to be changed independent of the person changing his/her actual geographical place computer/phone used for the moment - web-/email-/phone-/facsimile-address
One only has to say his/her name as usual.
• Voice activated services provides a hands-free alternative that allows use of mobile phones much more secure when driving.
• Name is better than numbers from the SR perspective. Numbers can be of the length of 10-12 digits, all independent of each other, i.e. after one digit comes another that, from addressing perspective, is not related to the preceding one. When using a name that is different. First, mostly, there are only two words (instead of 10-12) to remember and for the SR system to understand. Secondly, the first and the last name are dependent on each other, which is a clear advantage if the number of persons in the directory is small, like in a VPN or in a Centrex group.
VPN/Centrex are mainly used within an organization / a company.
Typically, characteristics on the VPN service are, that it:
• is speaker independent • has a limited vocabulary compared with the public network
• has single words or words that are dependent on each other
Further requirements could be added:
• limited number of words to speak when using the service • logical sequence (like, after a given name comes a family name) or a good menu to follow.
This is the reason why VPN or Centrex (which is similar to VPN) is a good choice as a first service example for SR, preferably a VPN or Centrex of a maximum of 500 persons.
The benefits of Name Addressing in a VPN/Centrex is understood better with the following example: During a Name Addressing in a company of 500 persons the SR system happens to understand the last name, e.g. "Karlsson " correctly but is in doubt of the first name. Was it "Jan ", "John " or "Johan "? However, as there is a person in the directory, "John Karlsson" but no "Jan Karlsson " or "Johan Karlsson", the first name has to be "John ".
So, even if one word is not understood exactly by the SR system, it can often in a VPN/Centrex draw an intelligent conclusion and still find the right person.
Impact of introduction ofSR services: ?'
Systems with a SR interface will sometimes fail, that is an axiom, which has to do with the nature of SR and the use of voice by the human beings.
What really is of interest when launching a service to the customer is not only the SR quality, it is the whole total solution that is important, that is how the situation is handled when SR fails. People can accept that SR fails some times (also telephone systems like GSM fails, not to mention the Internet). What is of importance is how the solution to handle the failure works. It is important that a backup exists and that the turnover to this feels smooth for the customer.
The use of SR within a VPN or within a Centrex-group increases the hit-rate, as the vocabulary is limited. The number of persons with the same or with similar names are simply less than in the public network. And for combinations of given names and family name it is even more true.
VPN and SR from the User perspective
Here, it is described how a user in future can be able to use SR for reaching another person within the same company (the same VPN). The idea is that the user initially indicates in some way from his/her Computer/Mobile telephone/fixed phone to a network that speech is to be used. It can be done by a certain telephone number to the Name Addressing service, which could be inserted as a voice demand inserted in the terminal or as a short code. The network connects the user to the SR-device (the LP 43, 53), which is directly connected to the directory of the company. Then the user gets a response that there is an SR ready to listen to him/her. The user simply says the name of the one he/she wants to reach and also indicates the wanted type of communication, like "Lars Svensson by phone" or "Lars Svensson by mail". The SR system identifies in the first case the name and looks up the phone number of Lars Svensson in the directory, which shows where he wants to be reached (which terminal) for the moment and connects the user to that telephone number. If the user said "Lars Svensson by email", the email number of Lars Svensson was fetched from the directory and an email is sent.
It is important to smoothly handle situations where more than one person have the same name. The usage must feel natural for the user. For instance, when the system finds that there are two or more persons named "Lars Olsson", it can ask the user:
"Do you mean Lars Olsson in the sales department or Lars Olsson in the design department?" If it happens that two "Lars Olsson" works in the sales department, the system can ask: "Do you mean Marketing Director Lars Olsson or Asia Sales responsible Lars Olsson?"
What is preferred in all man-machine dialogues is that the response time from the machine never exceeds 2 seconds. There is a huge risk that the user loses his interest in the current dialogue and if this repeats a couple of times the user could easily lose interest in the service or, even worse, the whole SR risks to get a bad reputation.
SR addressing has its clear advantages in some situations when it is difficult to use push buttons, like when driving and walking. Especially in the car, the usage of SR could minimise he risk of accidents. Also when dark, the use of the voice is superior to other ways of handling a terminal.
But there are also situations and places where SR addressing should be avoided. Best example is sending of a mail when being at the theatre. The embodiments shown in figures 2 and 3 show that the speech recognition function provided by the invention is just an option. If the user does not wish to use the speech recognition offered by the SRUI SCS 43 or SR LP 53, respectively, he can simply make a direct call using the keys of his telecommunication apparatus. It is evident that the application of SRUI SCS 43 or SR LP 53 provides a simple solution to existing networks. The existing networks are still allowed to work with NPN-addresses of parties to be called. In the embodiment shown in figure 3, SCP 51 receives the VPN- address of party B and can operate in the same way as it is used to operate without speech recognition. The same is true for the embodiment of figure 2. In the embodiment of figure 2, it is the application server/application 1 which is still able to operate with the VPN-address of party B to be called by party A since it receives the VPN-address from the SRUI SCS 43 that performs the speech recognition function required. There are several backup possibilities if the speech recognition to be provided by SRUI SCS 43 or SR IP 53 fails. One possible backup option after failure of the speech recognition function is, that the application server/application 1 informs the telecommunication apparatus of party A that the speech recognition has failed. This information may be provided either by a simulated voice message or a message in the display of the telecommunication apparatus. Another backup possibility is that, if the telecommunication apparatus is a GSM or a DTMF fixed telephone, party A is requested to enter the name of party B by using the keys of the GSM or the DTMF fixed telephone to produce DTMF code that can be recognized by the SRUI SCS 43 or the SR IP 53, respectively. Another option is that, if the telecommunication apparatus is a personal computer, party A is requested to simply key in the name of party B by means of keyboard 33.
A final fall back position is that party A is coimected to an operator of the application server/application 1 or the SCP 51, respectively.
Intelligent peripheral
Both the SRUI SCS 43 and the SR LP 53 can be seen as an intelligent peripheral providing the services as defined earlier. Figure 4 shows that the intelligent peripheral 43, 53 is provided with a processor 55 and a memory 57, connected to the processor 55. The processor 55 is arranged with suitable connections to communicate with the other devices shown in the figures 2, 3. This may be done in any way known to persons skilled in the art. The connections may be either fixed or wireless. The memory 57 may, as the case may be, be provided with one or more of the following memory units: hard disc, ROM (Read Only Memory), RAM (Random Access Memory) and EEPROM (Electrically Erasable Programmable Read Only Memory). Of course, other types of memory units may be provided. The processor 55 may be implemented as a plurality of processors, as the case may be.
Of course, the SRUI SCS 43 and SR LP 53 may be comiected to other units (e.g., processors, memories, etc.).
The memory 57 stores VPN-addresses of a set of persons, personal functions, specific terminals or services. The memory 57 also stores instructions to provide the processor 55 with the required SR (and JVR) capacity.
Other examples
Examples of deployment of (intelligent peripheral based) IVR within IN Services:
• Integration of calling card services and corporate VPN.
• Additional security features (e.g. speaker verification) • Corporate client automated directory services
• Voice activated dialling with personal phonebook
• Speech activated account recharge
Speech recognition can enhance the effectiveness of call routing in Information and Business services.
Speech recognition technology can be integrated into IVR platforms. E.g. call centre and AST-DR (Announcement Service Terminal, Digital Recording).
Speaker verification This future feature, where a person is identified by his/her voice will, will simplify the authentication process, bringing benefits in user acceptance and satisfaction - "easy of use". Speaker Verification is used in some applications today, but is still too uncertain to use as the only identification tool (e.g. when collecting money in the cash dispensing machine), but it is sure of interest for the future.
Internet services Accessing information from the WEB by voice -"talking to the WEB"
Location based server
Speech Recognition and Location based services, e.g. to find the closest petrol station or restaurant, dentist etc, is starting up today, and this combination is very interesting to further develop in future.
Portals
Accessing a whole range of services using voice as an alternative interface Speech control to, e.g., WAP based services provides an alternative access. It is not always possible to read a message (drivers) and not all mobiles are WAP compatible (yet).
For some applications a direct voice command is quicker and more convenient than keying in the name or browsing. (E.g. a name of a stock, which is not listed on a personal list of stock, is easier pronounced than written). Blue-tooth will further stress the importance of voice access, simply because the mobile device could be out of eyesight. - And it will, that is one of the strengths with Bluetooth.

Claims

Claims
1. Intelligent peripheral for speech recognition provided with a processor (55) and a memory (57) connected to the processor (55) and storing a list of VPN-addresses of at least one of a set of persons, personal functions, specific terminals and services as well as instructions to control said processor, the processor (55) being arranged to:
• communicate with a network apparatus (1, 7; 51) arranged to control a switch (49) in a telecommunication network;
• communicate with said switch (49); • perform the following operations controlled by said instructions:
• to receive a call from said switch (49), to establish a communication channel with said switch (49) and to receive a demand to be able to receive a speech instruction;
• to receive from a first telecommunication apparatus said speech instruction associated with a VPN-number associated with either a desired person, personal function, second telecommunication apparatus or service desired to be called or noticed by said first telecommunication apparatus;
• to translate said speech instruction into a VPN address associated with either a desired person, personal function, second telecommunication apparatus or service and send said VPN address to said network apparatus (1, 7; 51), the
VPN-address having a predetermined format in accordance with a protocol used in the telecommunication network in which the intelligent peripheral is to be operated;
• to transfer at least the VPN-address, as well as the identity and current location of the first telecommunication apparatus to said switch (49) in order to be transferred by said switch (49) to said network apparatus (1, 7; 51) as a standard IN request;
• to release said communication channel with said switch (49).
2. Intelligent peripheral according to claim 1, wherein said processor is arranged to notify said first telecornmunication apparatus with a welcome message that the intelligent peripheral is ready and waiting for said speech instruction.
3. Intelligent peripheral according to claim 1 or 2, wherein said VPN addresses include at least one of the following sets: fixed telephone addresses, mobile telephone addresses, e-mail addresses, facsimile addresses.
4. Intelligent peripheral according to claim 3, wherein said processor is arranged to recognize an additional spoken instruction indication in which set the VPN-address is stored.
5. Telecommunication network comprising an intelligent peripheral according to any of the preceding claims, a first switch (49) connected to said intelligent peripheral (43, 53), and a network apparatus (1, 7; 51) connected both to said first switch (49) and to said intelligent peripheral, said network apparatus (1, 7; 51) being arranged to control said first switch (49).
6. Telecommunication network comprising an intelligent peripheral according to any of the claims 1-4, a first switch (49) connected to said intelligent peripheral (43, 53), and a network apparatus (1, 7; 51) connected to said first switch (49), said network apparatus (1, 7; 51) being arranged to control said first switch (49).
7. Telecommunication network comprising an intelligent peripheral according to any of the claims 1-4, a first switch (49) connected to said intelligent peripheral (43, 53), and a network apparatus (1, 7; 51) connected to a second switch (49), said network apparatus (1, 7; 51) being arranged to control said second switch (49).
8. Telecommunication network according to any of the claims 5-7, wherein said network apparatus is arranged to control said intelligent peripheral.
9. Telecommunication network according to any of the claims 5-8, arranged to support the following operations: • by said intelligent peripheral (43; 53):
• to receive a call from said first switch (49), establish a communication channel with said first switch (49) and to receive a demand to be able to receive a speech instruction; • to receive from a first telecommunication apparatus said speech instruction associated VPN-number associated with either a desired person, personal function, second telecommunication apparatus or service desired to be called or noticed by said first telecommunication apparatus; • to translate said speech instruction into a VPN address associated with either a desired person, personal function, second telecommunication apparatus or service and send said VPN address to said network apparatus (1, 7; 51), the VPN-address having a predetermined format in accordance with a protocol used in the telecommunication network in which the intelligent peripheral is to be operated;
• to transfer at least the VPN-address, as well as the identity and current location of the first telecommunication apparatus to said first switch (49);
• to release said communication channel with said switch (49);
• by said network apparatus (1, 7; 51), to receive from said first switch (49) a standard IN request based on said VPN-address to establish a current address of said desired person, personal function, specific terminal or service and to send it to said first switch (49) to establish said connection between said first and second telecommunication apparatuses.
10. Telecommunication network according to any of the claims 5-9, arranged to support at least one of a UPT-service, a 3G-service, Freephone, Premium rate, Credit Call, Credit Card call, Televoting.
11. Telecommunication network according to any of the claims 5-10, wherein the network apparatus (1, 7; 51) is arranged to translate said VPN-address into another
VPN-address where a user of said VPN-address can be reached temporarily.
12. Telecommunication network according to any of the claims 5-11, wherein the network apparatus (1, 7; 51) is arranged to provide at least one of the following fall back options if the intelligent peripheral (43; 53) fails to provide said VPN-address:
• requesting a user of said first telecommunication apparatus to provide said VPN- address; • requesting a user of said first telecommunication apparatus to provide said spoken name again by either DTMF codes or by using a keyboard.
13. Telecommunication network according to any of the claims 5-12, wherein the network apparatus comprises a service capability server (7) arranged to control the first switch (49), and at least one application server (1) connected to said service capability server (7), the intelligent peripheral (43) being also connected to said service capability server (7) and said application server (1).
14. Telecommunication network according to any of the claims 5-12, wherein the network apparatus comprises a service control point (7) arranged to control the first switch (49), the intelligent peripheral (43) being also connected to said service control point (51).
15. Method to provide speech recognition by an intelligent peripheral provided with a processor (55) and a memory (57) coimected to the processor (55) and storing a list of VPN-addresses of at least one of a set of persons, personal functions, specific terminals and services as well as instructions to control said processor, the processor (55) being arranged to: • communicate with a network apparatus (1, 7; 51) arranged to control a switch (49) in a telecommunication network;
• communicate with said switch (49); the method comprising the following operations controlled by said intelligent peripheral: • to receive a call from said switch (49), to establish a communication channel with said switch (49) and to receive a demand to be able to receive a speech instruction;
• to receive from a first telecommunication apparatus said speech instruction associated with VPN-number associated with either a desired person, personal function, second telecommunication apparatus or service desired to be called or noticed by said first telecommunication apparatus;
• to translate said speech instruction into a VPN address associated with either a desired person, personal function, second telecommunication apparatus or service and send said VPN address to said network apparatus (1, 7; 51), the VPN-address having a predetermined format in accordance with a protocol used in the telecommunication network in which the intelligent peripheral is to be operated;
• to transfer at least the VPN-address, as well as the identity and current location of the first telecommunication apparatus to said switch (49) in order to be transferred by said switch (49) to said network apparatus (1, 7; 51) as a standard IN request;
• to release said communication channel with said switch (49).
16. Method to be performed by a telecommunication network according to any of the claims 5-14, including the following operations: • by said intelligent peripheral (43; 53):
• to receive a call from said first switch (49), establish a communication channel with said first switch (49) and to receive a demand to be able to receive a speech instruction;
• to receive from a first telecommunication apparatus said speech instruction associated with VPN-number associated with either a desired person, personal function, second telecommunication apparatus or service desired to be called or noticed by said first telecommunication apparatus;
• to translate said speech instruction into a VPN address associated with either a desired person, personal function, second telecommunication apparatus or service and send said VPN address to said network apparatus (1, 7; 51), the
VPN-address having a predetermined format in accordance with a protocol used in the telecommunication network in which the intelligent peripheral is to be operated;
• to transfer at least the VPN-address, as well as the identity and current location of the first telecornmunication apparatus to said first switch (49);
• to release said communication channel with said switch (49);
• by said network apparatus (1, 7; 51), to receive from said first switch (49) a standard IN request based on said VPN-address to establish a current address of said desired person, personal function, second telecommunication apparatus or service and to send it to said first switch (49) to establish said connection between said first telecommunication apparatus and said desired person, personal function, second telecommunication apparatus or service.
17. Computer program product to be loaded by an intelligent peripheral and ananged o provide said intelligent peripheral with the capacity to perform the method of claim 15.
18. Data carrier provided with a computer program product according to claim 17.
PCT/EP2002/009822 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks WO2004021688A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CA002500100A CA2500100A1 (en) 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks
GB0504016A GB2407737B (en) 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks
AU2002331103A AU2002331103A1 (en) 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks
PCT/EP2002/009822 WO2004021688A1 (en) 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks
US10/525,586 US7606713B2 (en) 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2002/009822 WO2004021688A1 (en) 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks

Publications (1)

Publication Number Publication Date
WO2004021688A1 true WO2004021688A1 (en) 2004-03-11

Family

ID=31970242

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2002/009822 WO2004021688A1 (en) 2002-08-30 2002-08-30 Intelligent peripheral for speech recognition in networks

Country Status (5)

Country Link
US (1) US7606713B2 (en)
AU (1) AU2002331103A1 (en)
CA (1) CA2500100A1 (en)
GB (1) GB2407737B (en)
WO (1) WO2004021688A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1777929A1 (en) * 2005-06-01 2007-04-25 Huawei Technologies Co., Ltd. A method and system for realizing ring back tone basing on group mobile telephone exchange service

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2845174B1 (en) * 2002-09-27 2005-04-08 Thales Sa METHOD FOR MAKING USER-SYSTEM INTERACTION INDEPENDENT OF THE APPLICATION AND INTERACTION MEDIA
CN1276641C (en) * 2003-06-25 2006-09-20 华为技术有限公司 A method for implementing call leg forwarding
US20080313050A1 (en) * 2007-06-05 2008-12-18 Basir Otman A Media exchange system
US8971503B1 (en) * 2012-04-02 2015-03-03 Ipdev Co. Method of operating an ordering call center using voice recognition technology
US9692550B2 (en) * 2012-11-29 2017-06-27 Huawei Technologies Co., Ltd. Systems and methods for waveform selection and adaptation
US10943603B2 (en) 2018-01-31 2021-03-09 Wells Fargo Bank, N.A. Systems and methods for a neighborhood voice assistant

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001035617A2 (en) * 1999-10-29 2001-05-17 Telera, Inc. Distributed call center with local points of presence
WO2001073750A2 (en) * 2000-03-24 2001-10-04 Dialsurf, Inc. Voice-interactive marketplace providing time and money saving benefits and real-time promotion publishing and feedback
US20020064149A1 (en) * 1996-11-18 2002-05-30 Elliott Isaac K. System and method for providing requested quality of service in a hybrid network
WO2002043362A1 (en) * 2000-11-22 2002-05-30 Elisa Communications Oyj Resource management in a call center

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE9303508L (en) * 1993-10-26 1994-10-31 Telia Ab Device for multimedia communication
SE9702088D0 (en) * 1997-06-02 1997-06-02 Ericsson Telefon Ab L M Method and device for telecommunication
US6233234B1 (en) * 1997-06-03 2001-05-15 Bell Atlantic Network Services, Inc. Secure LAN/internet telephony
US6317484B1 (en) * 1998-04-08 2001-11-13 Mcallister Alexander I. Personal telephone service with transportable script control of services
US6574599B1 (en) * 1999-03-31 2003-06-03 Microsoft Corporation Voice-recognition-based methods for establishing outbound communication through a unified messaging system including intelligent calendar interface
US6453034B1 (en) * 1999-07-29 2002-09-17 Mci Worldcom, Inc. Method of and system for extending internet telephony over virtual private network direct access lines
US6693878B1 (en) * 1999-10-15 2004-02-17 Cisco Technology, Inc. Technique and apparatus for using node ID as virtual private network (VPN) identifiers
US6449474B1 (en) * 1999-11-19 2002-09-10 Nortel Networks Limited Method and apparatus for call interception capabilities for use with intelligent network services in a communications system
US6751308B1 (en) * 1999-12-01 2004-06-15 Nokia Corporation Signaling method and network element for a virtual private network
US6363150B1 (en) * 1999-12-30 2002-03-26 At&T Corporation Billing method for customers having IP telephony service with multiple levels of security
US6690772B1 (en) * 2000-02-07 2004-02-10 Verizon Services Corp. Voice dialing using speech models generated from text and/or speech
EP2858309B1 (en) * 2000-06-16 2016-03-23 Fujitsu Limited Communication device having VPN accomodation function
WO2002009395A2 (en) * 2000-07-07 2002-01-31 Science Applications International Corporation A system or method for calling a vanity number using speech recognition
AU2001284644A1 (en) * 2000-08-16 2002-02-25 Verisign, Inc. A numeric/voice name internet access architecture and methodology
US7177402B2 (en) * 2001-03-01 2007-02-13 Applied Voice & Speech Technologies, Inc. Voice-activated interactive multimedia information processing system
US7181400B2 (en) * 2001-04-20 2007-02-20 Intel Corporation Method and apparatus to provision a network appliance
US7085827B2 (en) * 2001-09-20 2006-08-01 Hitachi, Ltd. Integrated service management system for remote customer support
US7536720B2 (en) * 2002-05-07 2009-05-19 Nortel Networks Limited Method and apparatus for accelerating CPE-based VPN transmissions over a wireless network
US7139387B2 (en) * 2002-10-18 2006-11-21 Outsmart Ltd Method and system for integrating multi services for intelligent networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020064149A1 (en) * 1996-11-18 2002-05-30 Elliott Isaac K. System and method for providing requested quality of service in a hybrid network
WO2001035617A2 (en) * 1999-10-29 2001-05-17 Telera, Inc. Distributed call center with local points of presence
WO2001073750A2 (en) * 2000-03-24 2001-10-04 Dialsurf, Inc. Voice-interactive marketplace providing time and money saving benefits and real-time promotion publishing and feedback
WO2002043362A1 (en) * 2000-11-22 2002-05-30 Elisa Communications Oyj Resource management in a call center

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BOSCO P G ET AL: "An intelligent network test-bed for service design, validation and execution", DIGITAL COMMUNICATIONS, 1992. 'INTELLIGENT NETWORKS AND THEIR APPLICATIONS.' PROCEEDINGS., 1992 INTERNATIONAL ZURICH SEMINAR ON ZURICH, SWITZERLAND 16-19 MARCH 1992, NEW YORK, NY, USA,IEEE, US, 16 March 1992 (1992-03-16), pages B2 - 1-B216, XP010063503, ISBN: 0-7803-0625-2 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1777929A1 (en) * 2005-06-01 2007-04-25 Huawei Technologies Co., Ltd. A method and system for realizing ring back tone basing on group mobile telephone exchange service
EP1777929A4 (en) * 2005-06-01 2007-07-18 Huawei Tech Co Ltd A method and system for realizing ring back tone basing on group mobile telephone exchange service
US7957523B2 (en) 2005-06-01 2011-06-07 Huawei Technologies Co., Ltd. Method and system for implementing a ring back tone based on group mobile switchboard service

Also Published As

Publication number Publication date
GB2407737A (en) 2005-05-04
GB2407737B (en) 2006-05-17
CA2500100A1 (en) 2004-03-11
US7606713B2 (en) 2009-10-20
GB0504016D0 (en) 2005-04-06
AU2002331103A1 (en) 2004-03-19
US20060100884A1 (en) 2006-05-11

Similar Documents

Publication Publication Date Title
US8565390B2 (en) Dynamically reconfigurable distributed interactive voice response system
US7715547B2 (en) Voice XML network gateway
US7065185B1 (en) Systems and methods for providing real-time conversation using disparate communication devices
US8116437B2 (en) Voice communications menu
US7400712B2 (en) Network provided information using text-to-speech and speech recognition and text or speech activated network control sequences for complimentary feature access
JP3987127B2 (en) Intelligent telephone service accessible via network
US6870915B2 (en) Personal address updates using directory assistance data
US8761153B2 (en) Remote configuration of a voice over internet protocol telephone for smart dial tone
US7263177B1 (en) Method and system for operating interactive voice response systems tandem
US20070189267A1 (en) Voice Assisted Click-to-Talk
JP2002141955A (en) SYSTEM AND METHOD FOR UTILIZING LOCALIZED VoIP
KR20070047363A (en) Method, system and software for implementing an automated call routing application in a speech enabled call center environment
US20110002449A1 (en) Voice browser with integrated tcap and isup interfaces
EP1218877A1 (en) Voice verification system
JP2003204394A (en) Method for changing dialog system
US7606713B2 (en) Intelligent peripheral for speech recognition in networks
US8654959B2 (en) Automated telephone attendant
AU746289B2 (en) An intelligent network with translation capabilities
US8396193B2 (en) System and method for voice activated signaling
CA2631223A1 (en) Method and system for placing a voice call between different geographical areas
US6931118B2 (en) Application-specific subnet for enhanced call processing
US20090279535A1 (en) Providing Dynamic Services During a VOIP Call
US20050117716A1 (en) Communication system with a connectable resource channel
WO2003105452A1 (en) Method of requesting phone numbers from a directory service by voice, which are transferred to the terminal to establish therefrom a voice connection
CA2631228A1 (en) Providing dynamic services during a voice call

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 0504016

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20020830

WWE Wipo information: entry into national phase

Ref document number: 2500100

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 2006100884

Country of ref document: US

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 10525586

Country of ref document: US

122 Ep: pct application non-entry in european phase
WWP Wipo information: published in national office

Ref document number: 10525586

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP