Browse Prior Art Database

General-Usage Remote-Access Storage and Forward Message Handling

IP.com Disclosure Number: IPCOM000047510D
Original Publication Date: 1983-Nov-01
Included in the Prior Art Database: 2005-Feb-07
Document File: 1 page(s) / 12K

Publishing Venue

IBM

Related People

Rosenbaum, WS: AUTHOR

Abstract

The technique discussed herein enhances the ability of a telephone desk set to offer automatic call answering and store and forward capability. The logic processing discussed can be applied to any telephone or private branch exchange (PBX) system. The General-Usage Remote-Access Storage and Forward Message Handling allows a caller to leave information at either a busy or unattended telephone. The telephony system being discussed allows for acquisition of message information without recourse to voice digitalization/storage. The telephony management system uses speech synthesis to advise a caller that the phone is either unattended or busy. A canned, synthesized message is used for these purposes. The caller is advised that by using his push-button key pad he can leave his telephone number by simply rekeying it in.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 65% of the total text.

Page 1 of 1

General-Usage Remote-Access Storage and Forward Message Handling

The technique discussed herein enhances the ability of a telephone desk set to offer automatic call answering and store and forward capability. The logic processing discussed can be applied to any telephone or private branch exchange (PBX) system. The General-Usage Remote-Access Storage and Forward Message Handling allows a caller to leave information at either a busy or unattended telephone. The telephony system being discussed allows for acquisition of message information without recourse to voice digitalization/storage. The telephony management system uses speech synthesis to advise a caller that the phone is either unattended or busy. A canned, synthesized message is used for these purposes. The caller is advised that by using his push-button key pad he can leave his telephone number by simply rekeying it in. The caller is then prompted to leave his name by the following push-button sequence for each character in the caller's name: 1. The push-button key containing a respective character of the caller's name is touched. 2. Immediately afterwards, the number 1, 2, or 3 is touched to indicate which character on

the previous stroked key was the

intended entry. In this manner, a

person's name can be spelled. Q and Z are entered

as if they were inscribed on the "1" push button. A priority can also be entered by striking the appropriate push buttons as prompted by the speech synthesized instructions....