System and method for voicemail privacy
First Claim
1. A method for processing voice messages, the method comprising:
- receiving a voice message from a call;
receiving a request from the caller to make the voice message private;
converting the voice message to an e-mail message;
protecting the e-mail message in a protection scheme recognized by a particular e-mail system; and
sending the e-mail through the e-mail system.
23 Assignments
0 Petitions
Accused Products
Abstract
An integrated messaging system for performing various types of messaging across different types of networks, including integrated user interfaces and administrator interfaces. Embodiments include a communication server that couples among networks of different types, and an interface module that couples to the communication server. The interface module may be hosted on a messaging server of a network. The interface module pulls various user information from the messaging server, including information relevant to at least the network that includes the messaging server. A cache couples to the communication server and to the interface module to hold information from the communication server and/or the user information pulled from messaging server. The interface module directs a message from the messaging server and/or the cache to at least one device on the networks using the user information.
-
Citations
25 Claims
-
1. A method for processing voice messages, the method comprising:
-
receiving a voice message from a call;
receiving a request from the caller to make the voice message private;
converting the voice message to an e-mail message;
protecting the e-mail message in a protection scheme recognized by a particular e-mail system; and
sending the e-mail through the e-mail system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18)
-
-
11. A method for processing voice messages, the method comprising:
-
receiving a voice message from a call;
receiving a request from the caller to make the voice message private;
converting the voice message to an e-mail message;
protecting and encrypting the e-mail message in a rights management scheme recognized by a particular e-mail system; and
sending the e-mail through the e-mail system. - View Dependent Claims (12, 13)
-
-
14. A voice mail system comprising:
-
logic that processes a voice message from a call;
logic to processes a request from the caller to make the voice message private;
logic that converts the voice message to an e-mail message;
logic that protects the e-mail message in a protection scheme recognized by a particular e-mail system; and
logic that sends the e-mail through the e-mail system.
-
-
15. A system comprising:
-
a voice mail system; and
an email system;
wherein the voice mail system includes, logic that processes a voice message from a call;
logic to processes a request from the caller to make the voice message private;
logic that converts the voice message to an e-mail message;
logic that protects the e-mail message in a protection scheme recognized by a particular e-mail system; and
logic that sends the e-mail through the e-mail system. - View Dependent Claims (16, 17)
-
-
19. A system comprising:
-
a network;
a set of devices coupled to the network, the set of devices including personal computers;
a voice mail system; and
an email system coupled to the network;
wherein the voice mail system is coupled to the email system and includes, logic that processes a voice message from a call;
logic to processes a request from the caller to make the voice message private;
logic that converts the voice message to an e-mail message;
logic that protects the e-mail message in a protection scheme recognized by a particular e-mail system; and
logic that sends the e-mail through the e-mail system.
-
-
20. A message comprising:
-
message headers including a header with an identification of the recipient of the message;
audio information including a voice message to the recipient; and
information corresponding to rights that the recipient will have to act upon the message;
wherein the message headers, audio information and information corresponding to the rights are packaged within structures defined by a protection scheme; and
wherein at least the audio information is encrypted. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification