Integrated voice access to a variety of personal information services
First Claim
1. In a computing system that has access to personal information of a plurality of personal information types corresponding to a plurality of callers, the computing system capable of receiving telephone calls from a plurality of callers and responding to voice commands received via the telephone calls, a computerized method for allowing a caller to automatically act on an item of personal information via a voice command even though the act requires access to another item of personal information that is of a different personal information type, the method comprising the following:
- an act of receiving a first caller-issued voice command to hear a first item of personal information corresponding to a first personal information type;
an act of automatically accessing the first item of personal information without human intervention;
an act of audibly rendering the first item of personal information to the caller;
an act of receiving a second caller-issued voice command that represents an action to perform in response to hearing the first item of personal information; and
an act of automatically accessing a second item of personal information corresponding to a second personal information type without human intervention to further the action.
2 Assignments
0 Petitions
Accused Products
Abstract
Facilitating voice access to personal information in a manner that the caller may voice command an action to be performed in response to hearing a particular personal information item. The voice commanded action is then automatically performed even if the action requires access to another personal information item of a different type. A voice access server receives a caller-issued voice command to hear a first item of personal information (such as a calendar item) corresponding to a first personal information type. Then, the voice access server automatically accesses the requested information, and audibly speaks the item to the caller. The caller may then submit a voice request to act on the first item of personal information. The voice access server then automatically accesses any other personal information needed to perform the requested action, even if access to a different personal information type is needed.
-
Citations
25 Claims
-
1. In a computing system that has access to personal information of a plurality of personal information types corresponding to a plurality of callers, the computing system capable of receiving telephone calls from a plurality of callers and responding to voice commands received via the telephone calls, a computerized method for allowing a caller to automatically act on an item of personal information via a voice command even though the act requires access to another item of personal information that is of a different personal information type, the method comprising the following:
-
an act of receiving a first caller-issued voice command to hear a first item of personal information corresponding to a first personal information type;
an act of automatically accessing the first item of personal information without human intervention;
an act of audibly rendering the first item of personal information to the caller;
an act of receiving a second caller-issued voice command that represents an action to perform in response to hearing the first item of personal information; and
an act of automatically accessing a second item of personal information corresponding to a second personal information type without human intervention to further the action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product for use in a computing system that has access to personal information of a plurality of personal information types corresponding to a plurality of callers, the computing system capable of receiving telephone calls from a plurality of callers and responding to voice commands received via the telephone calls, the computer program product for implementing a method for allowing a caller to automatically act on an item of personal information via a voice command even though the act requires access to another item of personal information that is of a different personal information type, the computer program product comprising one or more computer-readable media having stored thereon the following:
-
computer-executable instructions for detecting the receipt of a first caller-issued voice command to hear a first item of personal information corresponding to a first personal information type;
computer-executable instructions for accessing the first item of personal information;
computer-executable instructions for audibly rendering the first item of personal information to the caller;
computer-executable instructions for detecting the receipt of a second caller-issued voice command that represents an action to perform in response to hearing the first item of personal information; and
computer-executable instructions for accessing a second item of personal information corresponding to a second personal information type to further the action. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. In a computing system that has access to personal information of a plurality of personal information types corresponding to a plurality of callers, the computing system capable of receiving telephone calls from a plurality of callers and responding to voice commands received via the telephone calls, a method for allowing a caller to automatically act on an item of personal information via a voice command even though the act requires access to another item of personal information that is of a different personal information type, the method comprising the following:
-
an act of receiving a first caller-issued voice command to hear a first item of personal information corresponding to a first personal information type;
an act of automatically accessing the first item of personal information without human intervention;
an act of audibly rendering the first item of personal information to the caller; and
a step for accessing items of personal information of different personal information types in order to allow the caller to flexibly act on the first item of personal information. - View Dependent Claims (25)
-
Specification