US20090187854A1 - Methods and systems for generating an enumeration of window types that lack contact data relevant to a user - Google Patents
Methods and systems for generating an enumeration of window types that lack contact data relevant to a user Download PDFInfo
- Publication number
- US20090187854A1 US20090187854A1 US12/341,779 US34177908A US2009187854A1 US 20090187854 A1 US20090187854 A1 US 20090187854A1 US 34177908 A US34177908 A US 34177908A US 2009187854 A1 US2009187854 A1 US 2009187854A1
- Authority
- US
- United States
- Prior art keywords
- window
- windows
- user
- displayed
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
Definitions
- This application relates generally to processing window data.
- this application relates to systems and methods for generating an enumeration of window types that lack contact data relevant to a user.
- a method for identifying a window lacking communications data relevant to a user of a computing device includes receiving an identification of each of a plurality of windows displayed to a user of a computing device.
- the method includes receiving an indication of whether each of the plurality of windows contains contact information displayed to the user.
- the method includes receiving an indication of whether the user interacted with the information displayed by each of the plurality of windows.
- the method includes analyzing, for each of the plurality of windows, the received indication of whether the user interacted with the displayed information, the received indication of whether each of the plurality of windows contains contact information displayed to the user, and the received identification of each of the plurality of windows.
- the method includes generating an enumeration of window identification information for at least one filtered window.
- the method includes providing, to a window handler filter process the generated enumeration of window identification information for at least one filtered window.
- a system for identifying a window lacking communications data relevant to a user of a computing device includes a client agent and an analysis component.
- the client agent includes a window handler filter routine and a window analysis component.
- the window handler filter routine generates an identification of each of a plurality of windows displayed to a user of a computing device.
- the window handler routine generates an indication of whether each of the plurality of windows displays contact information to the user.
- the client agent generates an indication of whether the user interacted with the information displayed by each of the plurality of windows.
- the analysis component analyzes, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information.
- the analysis component generates an enumeration of window identification information for at least one filtered window.
- the analysis component is in communication with the window handler filter routine and with the client agent. In one of these embodiments, the analysis component transmits the enumeration to the window handler filter routine.
- FIG. 1 is a block diagram depicting one embodiment of an environment for providing communications
- FIGS. 2A and 2B are block diagrams of embodiments of a computing device
- FIG. 3 is a block diagram of an embodiment of a client application for enabling a communications session
- FIG. 4A is a block diagram depicting one embodiment of a plurality of window handler routines
- FIG. 4B is a block diagram depicting one embodiment of a system for efficient processing of data displayed by a window
- FIG. 5A is a flow diagram depicting one embodiment of a method for efficient processing of data displayed by a window
- FIG. 5B is a flow diagram depicting one embodiment of a method for analyzing window information
- FIG. 6 is a block diagram depicting one embodiment of a system for identifying a window lacking communications data relevant to a user of a computing device
- FIG. 7 is a flow diagram depicting one embodiment of a method for identifying a window lacking communications data relevant to a user of a computing device
- FIG. 8 is a block diagram depicting one embodiment of a system for identifying a process for analyzing data displayed by a window to a user of a computing device;
- FIG. 9 is a flow diagram depicting one embodiment of a method for identifying a process for analyzing data displayed by a window to a user of a computing device
- FIG. 10A is a block diagram depicting one embodiment of a system for providing, to a first application executed by a first operating system on a first computing device, an interface for communicating with at least one application executed by a second operating system on a second computing device;
- FIG. 10B is a block diagram depicting one embodiment of a plurality of interface objects providing communication mechanisms between an application executed by one operating system and at least one application executed by a second operating system;
- FIG. 10C is a block diagram depicting one embodiment of a system for providing, to a first application executed by a first operating system on a computing device, an interface for communicating with at least one application executed by a second operating system on the computing device;
- FIG. 11 is a flow diagram depicting one embodiment of a method for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system.
- FIG. 1 a block diagram depicts one embodiment of an environment 100 for providing voice communication (e.g., a voice call).
- the environment 100 includes a plurality of end-users 106 A, 106 B, 106 C, 106 D (generally referred to end-user 106 ) that communicate using one or more of: a mobile network 108 , a packet-switched network 110 , and a circuit-switched network 112 .
- One of the end-users 106 is in communication with a communication gateway 116 via at least one network 114 .
- the communications gateway 116 is in communication with a private branch exchange (PBX) 120 .
- PBX private branch exchange
- the PBX 120 is in communications with one or more of the mobile network 108 , the packet-switched network 110 , and the circuit-switched network 112 .
- the communications gateway 116 and the PBX 120 may communicate with each other via a second network 114 ′.
- the first network 114 and the second network 114 ′ are the same network.
- the second network 114 ′ can include one or more of each of a QSIG trunk, an H.323 trunk, and a SIP trunk.
- QSIG refers to the ISDN based signaling protocol for signaling between nodes of a Private Integrated Services Network (PISN).
- PISN Private Integrated Services Network
- the QSIG protocol carries user and feature information between private branch exchanges.
- H.323 refers to the ITU standard that defines a framework of protocols for inter-working voice, video and data across an IP network.
- SIP refers to the Session Initiation Protocol, which is used for setting up communications sessions on the Internet, such as telephony, presence, events notification and instant messaging.
- the SIP protocol initiates call setup, routing, authentication and other feature messages to endpoints within an IP domain.
- Each end-user 106 can have a computing device 105 executing software that provides at least some of the below-described functionality.
- the end-user 106 interacts with the computing device 105 to cause the computing device 105 to, for example, issue commands to the communications gateway 116 , which in turn issues commands to the PBX 120 , to establish a voice communication session with at least one other end-user 106 .
- the first network 114 and the second network 114 ′ can be a local-area network (LAN), a metropolitan-area network (MAN), or a wide area network (WAN) such as the Internet or the World Wide Web.
- a network 114 may be a private network and a network 114 ′ may be a public network.
- a network 114 ′ may be a private network and a network 114 a public network.
- networks 114 and 114 ′ may both be private networks.
- networks 114 and 114 ′ may both be public networks.
- the network 114 may be any type and/or form of network and may include any of the following: a point to point network, a broadcast network, a wide area network, a local area network, a telecommunications network, a data communication network, a computer network, an ATM (Asynchronous Transfer Mode) network, a SONET (Synchronous Optical Network) network, a SDH (Synchronous Digital Hierarchy) network, a wireless network and a wireline network.
- the network 114 may comprise a wireless link, such as an infrared channel or satellite band.
- the topology of the network 114 may be a bus, star, or ring network topology.
- the network 114 and network topology may be of any such network or network topology as known to those ordinarily skilled in the art capable of supporting the operations described herein.
- the network may comprise mobile telephone networks utilizing any protocol or protocols used to communicate among mobile devices, including AMPS, TDMA, CDMA, GSM, GPRS or UMTS.
- AMPS AMPS
- TDMA Time Division Multiple Access
- CDMA Code Division Multiple Access
- GSM Global System for Mobile communications
- GPRS Global System for Mobile communications
- UMTS Universal Mobile communications
- the system may include multiple, logically-grouped servers.
- the communications gateway 116 , the PBX 120 , and machines in the mobile network 108 , the packet-switched network 110 , or the circuit-switched network 112 may be provided as one or more servers.
- a logical group of servers may be referred to as a server farm.
- the servers may be geographically dispersed.
- a farm may be administered as a single entity.
- the server farm comprises a plurality of server farms.
- the server farm executes one or more applications on behalf of one or more end-users 106 .
- a server may be a file server, application server, web server, proxy server, appliance, network appliance, gateway, application gateway, gateway server, virtualization server, deployment server, SSL VPN server, or firewall.
- a server provides a remote authentication dial-in user service, and is referred to as a RADIUS server.
- a server may have the capacity to function as either an application server or as a master application server.
- a server is a blade server.
- a server executes a virtual machine providing, to a user or computing device 105 , access to a computing environment.
- a server may include an Active Directory.
- the server may be an application acceleration appliance.
- the server may provide functionality including firewall functionality, application firewall functionality, or load balancing functionality.
- the server comprises an appliance such as one of the line of appliances manufactured by the Citrix Application Networking Group, of San Jose, Calif., or Silver Peak Systems, Inc., of Mountain View, Calif., or of Riverbed Technology, Inc., of San Francisco, Calif., or of F5 Networks, Inc., of Seattle, Wash., or of Juniper Networks, Inc., of Sunnyvale, Calif.
- the computing device 105 connects to the network 114 via communications link using any one of a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., T1, T3, 56 kb, X.25), broadband connections (ISDN, Frame Relay, ATM), and wireless connections.
- the computing device 105 of the end-user 106 connects to the communications gateway 116 through an additional network (not shown) using another communication link that connects the network 114 to the additional network.
- the protocols used to communicate through the communications link can include any variety of protocols used for long haul or short transmission.
- TCP/IP, IPX, SPX, NetBIOS, NetBEUI, SONET and SDH protocols or any type and form of transport control protocol may also be used, such as a modified transport control protocol, for example a Transaction TCP (T/TCP), TCP with selection acknowledgements (TCPSACK), TCP with large windows (TCP-LW), a congestion prediction protocol such as the TCP-Vegas protocol, and a TCP spoofing protocol.
- T/TCP Transaction TCP
- TCPSACK TCP with selection acknowledgements
- TCP-LW TCP with large windows
- congestion prediction protocol such as the TCP-Vegas protocol
- TCP spoofing protocol a congestion prediction protocol
- UDP user datagram protocol
- the combination of the networks 114 can be conceptually thought of as the Internet.
- Internet refers to the electronic communications network that connects computer networks and organizational computer facilities around the world.
- the packet switched network 110 communicates, directly or indirectly, with the PBX 120 .
- a packet switched network refers to a data communications network where information (e.g., voice and data) is divided into packets and delivered to their destination separately and possibly via different paths. Some packet switched networks provide voice-IP (VoIP) functionality.
- VoIP voice-IP
- the PBX 120 can provide telephone services to end-users 106 having telephone devices terminated on the packet switched network 110 .
- telephone devices refers telephones, fax machines, computers, IP phones, soft phones, video phones, mobile phones, wlan phones, or other devices capable of transmitting and receiving audible information.
- the circuit switched network 112 also communicates, directly or indirectly, with the PBX 120 .
- circuit switched refers to routing traffic between an originator and a destination through switching centers, from local users or from other switching centers, whereby a continuous electrical circuit is established and maintained between the calling and called stations until it is released by one of those stations.
- the switched circuit network 112 can be the public switched telephone network (PSTN).
- PSTN public switched telephone network
- the PBX 120 can provide telephone services to end-users 106 having telephone devices terminated on the circuit switched network 112 .
- the mobile network 108 communicates, directly or indirectly, with the PBX 120 .
- mobile network refers to facilities operated by a telephony carrier for the purposes of providing public mobile telecommunications services.
- the PBX 120 can provide telephone services to enterprise subscribers having telephone devices terminated on the mobile switched network 108 .
- the PBX 120 interfaces to one or more of the mobile network 108 , the packet switched network 110 , and the circuit switched network 112 and to the communications gateway 116 .
- An end-user 106 initiates a request for a communications session with another end-user 106 .
- the computing device 105 of the end-user 106 issues a signal (e.g., a command) to the communications gateway 116 .
- the communications gateway 106 establishes communications with the PBX 120 and issues a signal (e.g., a command) to the PBX to establish a communications session between the end-users 106 .
- the communications session is established and “hosted” by the PBX 120 .
- each computing device 200 includes a central processing unit 201 and a main memory unit 222 .
- a computing device 200 may include a visual display device 224 , a keyboard 226 and/or a pointing device 227 , which can control a cursor, such as a mouse.
- Each computing device 200 may also include additional optional elements, such as one or more input/output devices 230 a - 230 b (generally referred to using reference numeral 230 ), and a cache memory 240 in communication with the central processing unit 201 .
- the central processing unit 201 is any logic circuitry that responds to and processes instructions fetched from the main memory unit 222 .
- the central processing unit is provided by a microprocessor unit, such as: those manufactured by Intel Corporation of Mountain View, Calif.; those manufactured by Motorola Corporation of Schaumburg, Ill.; those manufactured by Transmeta Corporation of Santa Clara, Calif.; the RS/6000 processor, those manufactured by International Business Machines of White Plains, N.Y.; or those manufactured by Advanced Micro Devices of Sunnyvale, Calif.
- the computing device 200 may be based on any of these processors, or any other processor capable of operating as described herein.
- Main memory unit 222 may be one or more memory chips capable of storing data and allowing any storage location to be directly accessed by the microprocessor 201 , such as Static random access memory (SRAM), Burst SRAM or SynchBurst SRAM (BSRAM), Dynamic random access memory (DRAM), Fast Page Mode DRAM (FPM DRAM), Enhanced DRAM (EDRAM), Extended Data Output RAM (EDO RAM), Extended Data Output DRAM (EDO DRAM), Burst Extended Data Output DRAM (BEDO DRAM), Enhanced DRAM (EDRAM), synchronous DRAM (SDRAM), JEDEC SRAM, PC100 SDRAM, Double Data Rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), SyncLink DRAM (SLDRAM), Direct Rambus DRAM (DRDRAM), or Ferroelectric RAM (FRAM).
- SRAM Static random access memory
- BSRAM SynchBurst SRAM
- DRAM Dynamic random access memory
- FPM DRAM Fast Page Mode DRAM
- EDRAM Extended Data
- the main memory 222 may be based on any of the above described memory chips, or any other available memory chips capable of operating as described herein.
- the processor 201 communicates with main memory 222 via a system bus 250 (described in more detail below).
- FIG. 2A depicts an embodiment of a computing device 200 in which the processor communicates directly with main memory 222 via a memory port 203 .
- the main memory 222 may be DRDRAM.
- FIG. 2B depicts an embodiment in which the main processor 201 communicates directly with cache memory 240 via a secondary bus, sometimes referred to as a backside bus.
- the main processor 201 communicates with cache memory 240 using the system bus 250 .
- Cache memory 240 typically has a faster response time than main memory 222 and is typically provided by SRAM, BSRAM, or EDRAM.
- the processor 201 communicates with various I/O devices 230 via a local system bus 250 .
- FIG. 2B depicts an embodiment of a computer 200 in which the main processor 201 communicates directly with I/O device 230 via HyperTransport, Rapid I/O, or InfiniBand.
- FIG. 2B also depicts an embodiment in which local busses and direct communication are mixed: the processor 201 communicates with I/O device 230 using a local interconnect bus while communicating with I/O device 230 directly.
- the computing device 200 may support any suitable installation device 216 , such as a floppy disk drive for receiving floppy disks such as 3.5-inch, 5.25-inch disks or ZIP disks, a CD-ROM drive, a CD-R/RW drive, a DVD-ROM drive, tape drives of various formats, USB device, hard-drive or any other device suitable for installing software and programs such as any client software, or portion thereof.
- the computing device 200 may further comprise a storage device 228 , such as one or more hard disk drives or redundant arrays of independent disks, for storing an operating system and other related software, and for storing application software programs such as any program related to a client software package 220 .
- any of the installation devices 216 could also be used as the storage device 228 .
- the operating system and the software can be run from a bootable medium, for example, a bootable CD, such as KNOPPIX, a bootable CD for GNU/Linux that is available as a GNU/Linux distribution from knoppix.net.
- a bootable CD such as KNOPPIX
- KNOPPIX a bootable CD for GNU/Linux that is available as a GNU/Linux distribution from knoppix.net.
- the computing device 200 may include a network interface 218 to interface to a Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., 802.11, T1, T3, 56 kb, X.25, SNA, DECNET), broadband connections (e.g., ISDN, Frame Relay, ATM, Gigabit Ethernet, Ethernet-over-SONET, ADSL, SDSL), wireless connections, or some combination of any or all of the above.
- LAN Local Area Network
- WAN Wide Area Network
- the Internet may include a network interface 218 to interface to a Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., 802.11, T1, T3, 56 kb, X.25, SNA, DECNET), broadband connections (e.g., ISDN, Frame Relay, ATM, Giga
- Connections can be established using a variety of communication protocols (e.g., TCP/IP, IPX, SPX, NetBIOS, Ethernet, ARCNET, SONET, SDH, Fiber Distributed Data Interface (FDDI), RS232, IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, CDMA, GSM, WiMax and direct asynchronous connections).
- the computing device 200 communicates with other computing devices 200 ′ via any type and/or form of gateway or tunneling protocol such as Secure Socket Layer (SSL) or Transport Layer Security (TLS), or the Citrix Gateway Protocol manufactured by Citrix Systems, Inc. of Ft. Lauderdale, Fla.
- the network interface 218 may comprise a built-in network adapter, network interface card, PCMCIA network card, card bus network adapter, wireless network adapter, USB network adapter, modem or any other device suitable for interfacing the computing device 200 to any type of network capable of communication and performing the operations described herein.
- I/O devices 230 a - 230 n may be present in the computing device 200 , some of which may function as pointing devices.
- Input devices include keyboards, mice, trackpads, trackballs, microphones, and drawing tablets.
- Output devices include video displays, speakers, inkjet printers, laser printers, and dye-sublimation printers.
- the I/O devices 230 may be controlled by an I/O controller 223 as shown in FIG. 2A .
- the I/O controller may control one or more I/O devices such as a keyboard 226 and a pointing device 227 , e.g., a mouse or optical pen.
- an I/O device may also provide storage 228 and/or an installation medium 216 for the computing device 200 .
- the computing device 200 may provide USB connections to receive handheld USB storage devices such as the USB Flash Drive line of devices manufactured by Twintech Industry, Inc. of Los Alamitos, Calif.
- the computing device 200 may comprise or be connected to multiple display devices 224 a - 224 n , which each may be of the same or different type and/or form.
- any of the I/O devices 130 a - 130 n and/or the I/O controller 223 may comprise any type and/or form of suitable hardware, software, or combination of hardware and software to support, enable or provide for the connection and use of multiple display devices 224 a - 224 n by the computing device 200 .
- the computing device 200 may include any type and/or form of video adapter, video card, driver, and/or library to interface, communicate, connect or otherwise use the display devices 224 a - 224 n .
- a video adapter may comprise multiple connectors to interface to multiple display devices 224 a - 224 n .
- the computing device 200 may include multiple video adapters, with each video adapter connected to one or more of the display devices 224 a - 224 n .
- any portion of the operating system of the computing device 200 may be configured for using multiple displays 224 a - 224 n .
- one or more of the display devices 224 a - 224 n may be provided by one or more other computing devices, such as computing devices 200 a and 200 b connected to the computing device 200 , for example, via a network.
- These embodiments may include any type of software designed and constructed to use another computer's display device as a second display device 224 a for the computing device 200 .
- a computing device 200 may be configured to have multiple display devices 224 a - 224 n.
- an I/O device 230 may be a bridge 270 between the system bus 250 and an external communication bus, such as a USB bus, an Apple Desktop Bus, an RS-232 serial connection, a SCSI bus, a FireWire bus, a FireWire 800 bus, an Ethernet bus, an AppleTalk bus, a Gigabit Ethernet bus, an Asynchronous Transfer Mode bus, a HIPPI bus, a Super HIPPI bus, a SerialPlus bus, a SCI/LAMP bus, a FibreChannel bus, or a Serial Attached small computer system interface bus.
- an external communication bus such as a USB bus, an Apple Desktop Bus, an RS-232 serial connection, a SCSI bus, a FireWire bus, a FireWire 800 bus, an Ethernet bus, an AppleTalk bus, a Gigabit Ethernet bus, an Asynchronous Transfer Mode bus, a HIPPI bus, a Super HIPPI bus, a SerialPlus bus, a SCI/LAMP bus, a FibreChannel bus,
- a computing device 200 of the sort depicted in FIGS. 2A and 2B typically operate under the control of operating systems, which control scheduling of tasks and access to system resources.
- the computing device 200 can be running any operating system such as any of the versions of the MICROSOFT Windows operating systems, the different releases of the Unix and Linux operating systems, any version of the MAC OS for Macintosh computers, any embedded operating system, any real-time operating system, any open source operating system, any proprietary operating system, any operating systems for mobile computing devices, or any other operating system capable of running on the computing device and performing the operations described herein.
- Typical operating systems include: WINDOWS 3.x, WINDOWS 95, WINDOWS 98, WINDOWS 2000, WINDOWS NT 3.51, WINDOWS NT 4.0, WINDOWS CE, WINDOWS XP, and WINDOWS VISTA all of which are manufactured by Microsoft Corporation of Redmond, Wash.; MAC OS, manufactured by Apple Computer of Cupertino, Calif.; OS/2, manufactured by International Business Machines of Armonk, N.Y.; and Linux, a freely-available operating system distributed by Caldera Corp. of Salt Lake City, Utah, or any type and/or form of a Unix operating system, among others.
- the computer system 200 can be any workstation, desktop computer, laptop or notebook computer, server, handheld computer, mobile telephone or other portable telecommunication device, media playing device, a gaming system, mobile computing device, or any other type and/or form of computing, telecommunications or media device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein.
- the computer system 200 may comprise a device of the IPOD family of devices manufactured by Apple Computer of Cupertino, Calif., a PLAYSTATION 2, PLAYSTATION 3, or PERSONAL PLAYSTATION PORTABLE (PSP) device manufactured by the Sony Corporation of Tokyo, Japan, a NINTENDO DS, NINTENDO GAMEBOY, NINTENDO GAMEBOY ADVANCED or NINTENDO REVOLUTION device manufactured by Nintendo Co., Ltd., of Kyoto, Japan, or an XBOX or XBOX 360 device manufactured by the Microsoft Corporation of Redmond, Wash.
- PSP PERSONAL PLAYSTATION PORTABLE
- the computing device 200 may have different processors, operating systems, and input devices consistent with the device.
- the computer 100 is a TREO 180, 270, 1060, 600, 650, 680, 700p, 700w/wx, 750, 755p, 800w, Centro, Pro smart phone manufactured by Palm, Inc.
- the TREO smart phone is operated under the control of the PALM OS operating system and includes a stylus input device as well as a five-way navigator device.
- the computing device 200 is a mobile device, such as a JAVA-enabled cellular telephone or personal digital assistant (PDA), such as the i55sr, i58sr, i85s, i88s, i90c, i95c1, i335, i365, i570, 1576, i580, i615, i760, i836, i850, i870, i880, i920, i930, ic502, ic602, ic902, i776 or the im1100, all of which are manufactured by Motorola Corp.
- PDA personal digital assistant
- the computer system 200 is a mobile device manufactured by Nokia of Finland, or by Sony Ericsson Mobile Communications AB of Lund, Sweden.
- the computing device 200 is a Blackberry handheld or smart phone, such as the devices manufactured by Research In Motion Limited, including the Blackberry 7100 series, 8700 series, 7700 series, 7200 series, the Blackberry 7520, the Blackberry PEARL 8100, the 8700 series, the 8800 series, the Blackberry Storm, Blackberry Bold, Blackberry Curve 8900, Blackberry Pearl Flip.
- the computing device 200 is a smart phone, Pocket PC, Pocket PC Phone, or other handheld mobile device supporting Microsoft Windows Mobile Software.
- the computing device 100 can be any workstation, desktop computer, laptop or notebook computer, server, handheld computer, mobile telephone, any other computer, or other form of computing or telecommunications device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein.
- the computing devices 105 may also be referred to as client nodes, client machines, endpoint nodes, or endpoints.
- a computing device 105 has the capacity to function as both a client node seeking access to resources provided by a server and as a server providing access to hosted resources for other computing devices 105 .
- a computing device 105 may execute, operate or otherwise provide an application, which can be any type and/or form of software, program, or executable instructions such as any type and/or form of web browser, web-based client, client-server application, a thin-client computing client, an ActiveX control, or a Java applet, or any other type and/or form of executable instructions capable of executing on the computing device 105 .
- the application may be a server-based or a remote-based application executed on behalf of the computing device 105 on a server.
- the server may display output data to the computing device 105 using any thin-client or remote-display protocol, such as the Independent Computing Architecture (ICA) protocol manufactured by Citrix Systems, Inc. of Ft.
- ICA Independent Computing Architecture
- RDP Remote Desktop Protocol
- X11 the Virtual Network Computing (VNC) protocol, manufactured by AT&T Bell Labs
- SPICE manufactured by Qumranet, Inc., of Sunnyvale, Calif., USA, and of Raanana, Israel
- Net2Display protocol manufactured by VESA, of Milpitas, Calif.
- PC-over-IP manufactured by Teradici Corporation, of Burnaby, B.C.
- TCX manufactured by Wyse Technology, Inc., of San Jose, Calif.
- THINC manufactured by Columbia University in the City of New York, of New York, N.Y.
- the application can use any type of protocol and it can be, for example, an HTTP client, an FTP client, an Oscar client, or a Telnet client.
- the application comprises any type of software related to voice over internet protocol (VoIP) communications, such as a soft IP telephone.
- VoIP voice over internet protocol
- the application comprises any application related to real-time data communications, such as applications for streaming video and/or audio.
- the client software 220 provides functionality related to establishing a communication session, such as a telephone call, a voice-over IP call, a chat session, an e-mail session, or other communications session.
- the client software 220 can provide the end-user 106 of the client 105 with functionality that allows the end-user to “click” a telephone number or other recognized pattern within output of a software application and “call” that telephone number.
- the client computer 105 Upon selection of the telephone number, the client computer 105 signals the communications gateway 116 to issue commands to the PBX 120 , which in turn establishes the communication session.
- the end-user 106 can edit the telephone number prior to establishing the call and also designate a phone number that the end-user wants to be called at, if the end-user 106 is away from their telephone that is associated with the PBX 120 .
- the client software 220 may perform directory traversal to locate numbers that are not located in the application output displayed by a window, but instead are stored in one or more heterogeneous or homogenous directory services (e.g., MICROSOFT OUTLOOK contacts and other directory sources). Additional details of the client software 220 are described below.
- the client software 220 includes a cursor detection hooking mechanism 304 , a plurality of window handlers 308 a , 308 b , 308 c (referred to generally as processes handler 308 ), a parser module 312 , a call routine 316 , and one or more directory handlers.
- a cursor detection hooking mechanism 304 is optional.
- the directory handlers are optional.
- one or more of each or any of the components may be provided on one or more software applications 220 .
- the cursor detection mechanism 304 comprises any logic, function and/or operations to detect a status, movement or activity of a cursor, or pointing device, on the screen of the client computing device 105 .
- the cursor detection mechanism 304 may comprise software, hardware, or any combination of software and hardware.
- the cursor detection mechanism 304 comprises an application, a program, a library, a process, a service, a task, or a thread.
- the cursor detection mechanism 304 may include an application programming interface (API) hook into the operating system to obtain or gain access to events and information related to a cursor, and its movement on the screen.
- API application programming interface
- the client software 220 and/or cursor detection mechanism 304 monitors and intercepts operating system API calls related to the cursor and/or used by applications.
- the cursor detection mechanism 304 API intercepts existing system or application's functions dynamically at runtime.
- the cursor detection mechanism 304 may include any type of hook, filter or source code for receiving cursor events or run-time information of the cursor's position on the screen, or any events generated by button clicks or other functions of the cursor.
- the cursor detection mechanism 304 may comprise any type and form of pointing device driver, cursor driver, filter, or any other API or set of executable instructions capable of receiving, intercepting or otherwise accessing events and information related to a cursor on the screen.
- the cursor detection mechanism 304 detects the position of the cursor or pointing device on the screen, such as the cursor's x-coordinate and coordinate on the screen.
- the cursor detection mechanism 304 detects, tracks or compares the movement of the cursor's X-coordinate and Y-coordinate relative to a previous reported or received X and Y-coordinate position.
- the cursor detection mechanism 304 comprises logic, functionality and/or operations to detect if the cursor or pointing device is idle or has been idle for a predetermined or predefined length of time. In another embodiment, the cursor detection mechanism 304 detects that the cursor has been idle for a predetermined length of time between 100 ms and Isec, such as 100 ms, 200 ms, 300 ms, 400 ms, 500 ms, 600 ms, 700 ms, 800 ms or 900 ms.
- the cursor detection mechanism 304 detects that the cursor has been idle for a predetermined length of time of approximately 500 ms, such as 490 ms, 495 ms, 500 ms, 505 ms or 510 ms.
- the predetermined length of time to detect and consider the cursor is idle is set by the cursor detection mechanism 304 .
- the predetermined length of time is configurable by a user or an application via an API, graphical user interface or command line interface.
- a sensitivity of the cursor detection mechanism 304 may be set such that movements in either the X or Y coordinate position of the cursor may be received and the cursor still detected and/or considered idle.
- the sensitivity may indicate the range of changes to either or both of the X and Y coordinates of the cursor which are allowed for the cursor to be considered idle by the cursor detection mechanism 304 . For example, if the cursor has been idle for 200 ms and the user moves the cursor a couple or a few pixels/coordinates in the X and/or Y direction, and then the cursor is idle for another 300 ms, the cursor detection mechanism 205 may indicate the cursor has been idle for approximately 500 ms.
- the window handler 308 analyzes the contents of application output 320 displayed in a window on a display device of a computing device.
- a resource executing on the computing device 105 generates application output data and directs the display, to a user of the computing device, of the generated application output data.
- the application output data is displayed within a window associated with an application executing on the computing device 105 .
- each window handler 308 interacts with a single type of application.
- a separate window handler 308 may be provided for each of a type of application such as, for example, an internet browsing application (such as, for example, MICROSOFT INTERNET EXPLORER), a word processing application (such as, for example, MICROSOFT WORD), or a spreadsheet application (such as, for example, MICROSOFT EXCEL).
- a separate window handler 308 may be provided for each of a type of field, such as, for example, an Edit field (this includes applications providing notepad functionality) or a Static text field.
- window handlers are included for other applications (e.g., portable document format reader applications such as ADOBE reader, presentation generation and viewing applications such as MICROSOFT POWERPOINT, and the like).
- a window handler 308 that processes a specific type of application may be referred to as an application-specific window handler 308 .
- a single window handler can interact with multiple applications that have similar characteristics. In one of these embodiments, there may be fewer application specific handlers than there are resources generating application output data for display.
- the client software 220 when the pointer 328 is idle, the client software 220 initiates each of the window handlers 308 . In other embodiments, only a subset of the window handlers 308 is initiated. In one of these embodiments, the client software 220 determines which window is active and thus which application is producing output displayed in the active window. In another of these embodiments, the client software 220 transmits to a window handler 308 a at least one of a window identifier, window identification information and application type. In still another of these embodiments, the window handler 308 a determines whether or not it includes functionality for processing application output data 320 in the identified window.
- a first window handler 308 a responds with an indication that it cannot process the application output data 320 , at which point a second window handler 308 is called.
- the window handler 308 determines whether a specific pattern of characters exists within a specific area determined relative to the location of the cursor 328 (such as within a window near the cursor), which is described in more detail below with reference to FIG. 3B .
- a window handler 308 retrieves text from within the application using a WM_GETTEXT message; the window handler 308 analyzes the returned contents for patterns. In another embodiment, the parser 312 analyzes the returned contents for patterns. If, in one example, a telephone number is found, the software 220 displays the identified telephone number to the end-user. In still another embodiment, and as another example, if an edit window is the active window, the window handler 308 uses EM_* messages that are a part of the operating system API; text that is in the vicinity of the pointer location is returned using the WM_GETTEXT and EM_CHARFROMPOS messages.
- the window handler 308 extracts the underlying HTMLDocument2 object from the window using the WM_HTML_GETOBJECT message. The window handler 308 then traverses the HTML to get the IHTMLBodyElement object, from which an IHTMLTxtRange object can be extracted containing the text under the location of the pointer.
- the active window is a word processing window, such as a MICROSOFT WORD window
- an application specific window handler 308 extracts the underlying IID_Window object from the window using the AccessibleObjectFromWindow API method. From that object, the RangeFromPoint method returns an IID_Range object containing the text at the location of the pointer.
- none of the window handlers 308 include functionality for analyzing application output data 320 of an identified window.
- a default window handler is called.
- the default window handler performs screen captures (or screen scraping), object character recognition, and pattern matching.
- a block diagram depicts one embodiment of a system 401 , including a plurality of routines 410 for processing window information to obtain communication information for establishing and facilitating a communication session.
- each routine within the plurality of routines 410 is assigned a priority.
- each of the routines is executed sequentially and a routine with a higher priority executes before a routine with a lower priority.
- the routine with the highest priority is the window handler filter routine 405 .
- the system 401 includes a plurality of routines 410 .
- an execution of the software 220 generates the system 401 .
- a system 401 is provided within a virtual machine executing on the computing device 200 .
- a system 401 is provided by an execution of a software routine or software application executing on a network and in communication with other software routines, software applications, computing devices, and virtual machines also resident on the network.
- the system 401 includes a single window handler routine 308 able to execute at least one sub-routines dedicated to executing window handler routines 308 configured to analyze and interpret window information.
- a system 401 includes a single routine able to execute multiple sub-routines, where each sub-routine is encapsulated in a plug-in software application.
- the plug-in software application(s) may reside in any of the following locations: within the software 220 ; within the computing device 200 ; on a network, such as network 114 ; on a device located on the network; on a virtual machine on the network; in a storage repository accessible via the network; or any other local or remote location able to be accessed by an application or routine executing within the system 401 .
- a plurality of routines 410 is included within the system 401 .
- the system 401 includes a plurality of routines 410 where each routine can be any of the following: a software application, a software program, a set of commands, or any other collection of instructions able to receive and process input to generate a responsive output.
- the routines included within the plurality of routines 410 may be any of the above mentioned application specific window handlers 308 a , 308 b , and 308 c.
- the plurality of routines 410 includes any of the above mentioned application specific window handlers 308 as well as a window handler filter routine 405 . In another embodiment, the plurality of routines 410 includes both the above-mentioned application specific window handlers 308 , a window handler routine, and other window handler routines able to utilize window information to obtain communication information and/or to determine an optimal method for obtaining communication information.
- the system 401 includes a plurality of routines 410 where each routine is assigned a priority.
- Assignment of the priority can, in one of these embodiments, be a result of user input designating a priority scheme and further assigning a priority to each routine.
- a priority scheme is used in which a priority assigned to each window handler routine 410 is a result of at least one determination indicative of the necessity that a particular routine execute prior or subsequent to another routine included within the plurality of routines 410 .
- the system may de-prioritize a window handler routine 308 that captures data displayed in a region of a screen, applies a process for optical character recognition, and analyzes the OCR data for contact information, and the system may assign a higher priority level to a window handler routine implementing a more efficient process for identifying contact information.
- the at least one determination can be generated by any of the following: an arbiter application utilizing both system and routine information to determine a priority and further assign the determined priority to a routine; an application compiling system statistics to determine a priority and further assign the determined priority to a window handler routine 410 ; an application able to receive user input indicative of a particular priority level and further assign that priority level to a user-specified window handler routine 410 ; a lookup table including identification information for each window handler routine 410 and a table of priorities where identification information for each window handler routine 410 is linked to a particular priority; a listing of each window handler routine 410 where the list further dictates the priority level for each window handler routine 410 ; or any other system, application, or data specific method of determining the priority level of a window handler routine 410 .
- a plurality of window handler routine 410 include a window handler filter routine 405 having the highest priority level of any window handler routine 410 and subsequent window handler routine 410 are arbitrarily assigned priority levels.
- the plurality of window handler routine 410 includes a window handler filter routine 405 having a priority level that is higher than subsequent window handler routines 410 .
- the priority level in one embodiment, can be any of the following values: a numeric value; a percentage value; a value based on prior and subsequent routines in the chain of priorities; or any other value able to indicate a routines priority in relation to other routines included within a plurality of window handler routine 410 .
- a system for efficient processing of data displayed by a window includes a window and a window handler filter routine.
- a window 412 is displayed to a user of a computing device 200 .
- the window handler filter routine 405 obtains window identification information associated with the window 412 .
- the window handler filter routine 405 prevents operation on application output data 320 displayed in the window 412 , by a window handler routine, when the window identification information associated with the window represents a type of window listed within a list of types of window.
- the window handler filter routine 405 in one embodiment, is a routine that preempts the processing of application output data 320 displayed by a window 412 .
- the window handler filter routine 405 accesses a list of types of windows to determine whether the window 412 is a type of window that a window handler routine 410 should analyze to determine whether the application output data 320 displays contact information.
- the list specifies a list of windows for which the system has determined that no analysis by a window handler routine 410 is required; for example, a predefined list created by an administrator may specify which types of windows the administrator knows do not contain contact information.
- the window handler filter routine 405 includes programming code containing the list.
- the window handler filter routine 405 accesses a file containing the list.
- the window handler filter routine 405 includes functionality for obtaining window identification information associated with the displayed window, the window identification information indicative of a type of the window.
- the window handler filter routine 405 uses an application programming interface (API) provided by an operating system on the computing device 200 to request information associated with the window 412 .
- API application programming interface
- the system includes a client agent identifying the window displayed to the user and executing the window handler filter routine responsive to the identification.
- the client agent is the client software 220 .
- the client agent is in communication with the client software 220 .
- the client agent includes a module using an API to query a resource—such as an application or operating system executing on the computing device 200 —to retrieve window identification information.
- a resource such as an application or operating system executing on the computing device 200
- the client agent upon determining that a resource executing on the computing device 200 has generated a window and application output data 320 , the client agent executes at least one of the window handler routines 400 and the window handler filter routine 405 .
- the client agent transmits, to the window handler filter routine 405 , the window identification information and receives, from the window handler filter routine, an indication that the window handler filter routine has analyzed the application output data to determine whether the application output data contains contact information.
- a window handler filter routine 405 is implemented via an embodiment of the method illustrated in FIG. 5 .
- the method includes identifying a window displayed to a user of a computing device ( 502 ).
- the method includes executing a window handler filter routine, responsive to the identification ( 504 ).
- the method includes obtaining, by the window handler filter routine, window identification information associated with the displayed window ( 506 ).
- the method includes preventing, by the window handler filter routine, operation, by a window handler routine, on application output data displayed in the window when the window identification information associated with the window represents a type of window listed within a list of types of windows ( 508 ).
- a window displayed to a user of a computing device is identified ( 502 ).
- the window handler filter routine 405 identifies the window 412 .
- the client software 220 identifies the window and transmits an identification of the window to the window handler filter routine 405 .
- the client software 220 identifies the window as described above in connection with FIGS. 3 and 4A .
- the client software 220 determines that a pointing device connected to the computing device is substantially idle and that a representation of the pointing device is displayed within the window 412 .
- the client software 220 identifies a window 412 displaying application output data 320 and displaying a graphical representation of a pointing device, such as cursor 328 , which the client software 220 has determined is substantially idle. In other embodiments, the client software 220 determines that an input/output device connected to the computing device is has focused on a window 412 . In still other embodiments, the determination that a pointing device or other input/output device is substantially idle is optional. In yet other embodiments, no determination is made and the window is identified via alternative mechanisms. In one of these embodiments, an operating system is queried to identify a window having window focus.
- a window handler filter routine is executed, responsive to the identification ( 504 ).
- the client software 220 executes the window handler filter routine 405 .
- the client software 220 executes the window handler filter routine 405 as described above in connection with FIGS. 3 and 4A .
- the window handler filter routine obtains window identification information associated with the displayed window ( 506 ).
- the window handler filter routine 405 obtains the window identification information from the client software 220 .
- the window handler filter routine 405 obtains the window identification information from a resource executing on the computing device 200 , such as an operating system or an application; in such an embodiment, the window handler filter routine 405 may implement an API to query the resource and retrieve the identification.
- the window handler filter routine 405 obtains window identification information and determines a type of window associated with the window 412 responsive to an analysis of the window identification information. Additional embodiments of the obtained window identification information are described below in connection with FIG. 5B .
- the window handler filter routine prevents operation, by at least one window handler routine, on application output data displayed in the window when the window identification information associated with the window represents a type of window listed within a list of types of windows ( 508 ).
- the window handler filter routine 405 includes the list of types of windows.
- the window handler filter routine 405 accesses a file containing the list.
- the window handler filter routine 405 retrieves, from a second computing device 200 b , a file containing the list.
- the window handler filter routine 405 determines that the obtained window identification information identifies a type of window associated with the window 412 . In another embodiment, the window handler filter routine 405 accesses the list of types of windows and determines whether the list enumerates the type of window identified by the window identification information. In still another embodiment, the window handler filter routine 405 determines that because the list enumerates the type of window associated with the window 412 , no window handler routines 410 should analyze the application output data 320 . In yet another embodiment, the list enumerates types of windows that do not contain contact information.
- the window handler filter routine 405 transmits, to the client software 220 , an indication that the window handler filter routing 405 has analyzed the application output data 320 displayed by the window and determined that the data contains no contact information. In one of these embodiments, the window handler filter routine 405 transmits the indication although it has determined that no analysis should occur. In other embodiments, the window handler filter routine 405 identifies the type of window as a type not enumerated by the list. In one of these embodiments, the window handler filter routine 405 transmits, to a client agent, such as the client software 220 , an indication that the window handler filter routine 405 has not, or cannot, analyze the application output data 320 .
- a client agent such as the client software 220
- window identification information is retrieved from an identified window (step 505 ).
- the retrieved window identification information is passed to the window handler filter routine (step 510 ).
- the window identification information is analyzed by the window handler filter routine (step 515 ), and a determination is made as to whether or not the window identification information should be processed by subsequent routines (step 515 ).
- the window identification information is sent to subsequent window handler routines (step 525 ).
- the window identification information is prevented from being processed by any subsequent window handler routines (step 530 ).
- window identification information is retrieved from an identified window (step 505 ).
- the window identification information is retrieved by the window handler filter routine; in other embodiments, the window identification information is retrieved by another routine included within either of the system 401 or one of the plurality of routines 410 .
- An identified window can be a graphical representation of an executing application displayed on the visual display device 224 , where a cursor 328 also present on the visual display device 224 has a coordinate position on the display device 224 that positions the cursor 328 in a substantially similar position to that of the window.
- the identified window is a window, displayed on the display device 224 , over which the cursor 328 is positioned.
- Some embodiments determine the identified window via a mouse-over function that utilizes the position of a cursor 328 on a display device to determine a “selected object.”
- windows displaying application output data 320 are considered a “selected object” when the cursor 328 is positioned over the graphical display of the application window.
- Window identification information includes a window handle or other encapsulated data item able to relay information about a particular window.
- window identification information includes any one or combination of the following data: window class information; window family information; window size information; window position information; window identification information; information regarding the application output data displayed within the window; window text information; window style information; parent window information; child window information; sibling window information; window identification number; window caption information; or other information pertinent to determining attributes of the window, attributes of the window indicative of the application executing and displaying data within the window, and/or attributes of related windows. Further embodiments may utilize the window identification information to determine a type of window; where the type of window may be determined based on the data included within the window identification information or the type of window may be identified by a value included within the window identification information.
- the type of window may be a value included within the window identification information
- the type of window may be an attribute of the window defined by the operating system, an attributed defined by the application generating the application output data displayed within the window, or an attribute assigned by a routine associated with the window handler filter routine 405 .
- the window identification information is passed to the window handler filter routine (step 510 ). In another embodiment, the window identification information is passed to the window handler filter routine 405 . In still another embodiment, the window handler filter routine 405 retrieves the window identification information (step 505 ), and so there is no need for another component to pass the window identification information to the window handler filter routine 405 (step 510 ). Transmission of the window identification information to the window handler filter routine 405 (step 510 ) can, in some embodiments, be carried out by a separate routine or software application executing within or in conjunction with the system 401 .
- the window identification information is, in some embodiments, analyzed by the window handler filter routine (step 515 ) to determine whether or not the window identification information should be sent to subsequent window handler routines for processing (step 520 ).
- Analyzing the window identification information can include analyzing any of the following information: a window caption; information regarding the application output data displayed within the window; a window identification number; a window handle; information regarding related windows; a window class name; or any of the above-mentioned information. Determination as to whether or not the application output data 320 displayed within the window should be processed, can, in some embodiments, be made by comparing any of the above-mentioned window identification information data types to an empirically determined listing of corresponding types of windows.
- the empirically determined information can be hard coded into the window handler filter routine 405 , the information could be stored in a database or lookup table, or the information could be listed as an aspect of a policy table.
- the determination not to process the application output data 320 displayed within the window is made because the window identification information indicates that there is a low likelihood that the application output data will include communication information, such as contact information 324 .
- a low likelihood can be characterized as a likelihood calculation and further determination that the calculated value is below a predetermined threshold, or the likelihood could be an absolute determination that the window identification information indicates that the application output data 320 will not contain communication information, such as contact information 324 .
- the determination not to process the application output data 320 displayed within the window is made by comparing the retrieved window identification information with a listing of allowed window types and/or allowed window attributes.
- this listing can be dynamically generated by the system.
- the window identification information is sent to subsequent window handler routines (step 525 ).
- Each window handler routine will determine whether or not, based on the window identification information, that window handler routine may process the application output data 320 displayed within the window.
- the window identification information will continue to be passed to subsequent window handler routines 410 until a routine 410 is identified that include functionality for processing the application output data 320 .
- a default routine will be called to process the application output data 320 .
- window identification information When, in some embodiments, it is determined that the window identification information should not be processed, further processing will be prevented (step 530 ). In such embodiments, the window identification information will not be passed to subsequent window handler routines 410 when it is determined that there is a low likelihood that the identified window displays application output data 320 that contains communication data.
- One example of this includes an attempt to retrieve window identification information from a window displaying a MICROSOFT OUTLOOK calendar.
- window identification information indicates that the application output data displayed is application output data related to a MICROSOFT OUTLOOK calendar object.
- the window handler filter routine 405 analyzes this information to determine whether or not a window displaying calendar application data should be searched for communication data.
- the window handler filter routine 405 determines that, in this example, the window displaying application output data generated by the MICROSOFT OUTLOOK calendar object should not be searched and the window identification information related to that window is not passed to subsequent window handler routines. In other words, the window handler filter routine 405 responds to the determination that the window displaying the calendar application data does not include communication data by preventing further processing of the application output data within the MICROSOFT OUTLOOK calendar window.
- the client software 220 may access each of a plurality of window handler routines 410 according to a priority level assigned to each of the plurality of window handler routines 410 and requests of each window handler routines 410 an indication as to whether the window handler routines 410 can analyze application output data 320 to determine whether the application output data 320 contains contact information 324 .
- the priority level assigned to the window handler filter routine 405 is the highest priority level and the client software 220 requests the indication from the window handler filter routine 405 before making the request of any other window handler routines 410 .
- the client software 220 proceeds to make the request of each of the remaining window handler routines 410 until one of the window handler routines 410 responds with an indication that it can analyze the application output data 320 and determined whether the contact information 324 .
- the client software 220 does not proceed to make the request of any of the other window handler routines 410 .
- the user may add an identification of the type of window to the list accessed by the window handler filter routine 405 , which can then identify whether a particular window has that type and indicate to the client software 22 that no contact information 324 is displayed, preventing analysis by any of the other window handler routines 410 of a window known not to include contact information.
- the methods and systems described herein provide an improved process for determining whether a window contains contact information and avoid unnecessary analysis of windows known not to contain contact information.
- the window handler filter routine 405 accesses a list to determine whether or not to prevent operation on data displayed by a window.
- the list is predetermined in that a programmer, administrator or other user of the systems and methods described herein identifies a type of window that does not contain, or is not likely to contain, contact information.
- a type of window such as a window displaying a preview of a calendar month generated and displayed by a calendar application
- a human user of the systems and methods described herein may identify the displayed information not as a phone number but as a numerical representation of a date and, therefore, not interact with the user interface element.
- the list is predetermined in that a system is provided for automatically generating the list of filtered windows for use by the window handler filter routine 405 .
- a block diagram depicts one embodiment of a system for identifying a window lacking communications data relevant to a user of a computing device.
- a system for identifying a window lacking communications data relevant to a user of a computing device includes a client agent 220 and an analysis component 602 .
- the client agent 220 which may be provided as part of client software 220 described above in connection with FIGS. 2 - 5 —includes a window handler filter routine 405 and a window handler routine 410 .
- the window handler filter routine 405 generates an identification of each of a plurality of windows displayed to a user of a computing device.
- the window handler routine 410 generates an indication of whether each of the plurality of windows displays contact information to the user.
- the client agent 220 generates an indication of whether the user interacted with the information displayed by each of the plurality of windows.
- the analysis component 602 analyzes, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information.
- the analysis component 602 generates an enumeration of window identification information for at least one filtered window.
- a window handler filter routine 405 within the client agent 220 generates an identification of each of a plurality of windows displayed to a user of a computing device 106 .
- the window handler filter routine 405 determines whether a window 412 should be analyzed by determining whether the window 412 is a type of window included in an enumeration of filtered windows, as described above in connection with FIGS. 4-5 .
- the window handler filter routine 405 determines that the window 412 is not of a type included in the enumeration of filtered windows and indicates, to the client agent 220 that data displayed by the window 412 should be analyzed by a window handler 410 .
- the window handler filter 405 by responding to the client agent 220 request for analysis of the data 320 displayed by the window with a message indicating that the analysis component 602 cannot process the data 320 , the window handler filter 405 has indicated that a window handler 410 should be called to process the data 320 .
- the window handler filter routine 405 when the window handler filter routine 405 indicates to the client agent 220 that application output data 320 a in a window 412 a should be analyzed, the window handler filter routine 405 also transmits, to the analysis component 602 , window identification information for the window 412 a .
- the client agent 220 transmits, to the analysis component 602 , window identification information for the window 412 a.
- the window handler routine 410 receives a request to analyze application output data 320 and determines whether a window 412 displays contact information 324 .
- the window handler routine 410 is in communication with the analysis component 502 and transmits, to the analysis component 602 , an identification of whether it has identified information that may constitute contact information 324 .
- the client agent 220 may generate a user interface element allowing a user to initiate a telecommunications session with an entity associated with the contact information 324 .
- the client agent 220 may include a component for monitoring whether the user interacts with the user interface element to initiate the telecommunications session.
- the client agent 220 transmits, to the analysis component 602 , an indication of whether or not the user initiated the telecommunications session.
- the analysis component 602 analyzes, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information. In one embodiment, based upon the analysis, the analysis component 602 determines whether or not users initiated telecommunications sessions with data identified as contact information. In another embodiment, therefore, the analysis component 602 evaluates the accuracy of the determinations made by the window handler filter routine 405 and the window handler routine 410 . In still another embodiment, the analysis component 602 generates an enumeration of window identification information for at least one filtered window.
- the analysis component 602 determines that the window handler filter routine 405 identified data as appropriate for analysis by a window handler 410 and the window handler 410 identified the data as containing contact information 324 but, when presented to a user, the user chose not to contact an entity associated with the contact information 324 . In one of these embodiments, the analysis component 602 applies at least one heuristic to at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information in determining whether to filter at least one of the plurality of windows.
- the analysis component 602 by collecting the indications of determinations by the window handler filter routine 405 , the window handler 410 and the client agent 220 and applying heuristics, algorithms or other artificial intelligence to the collected data, the analysis component 602 identifies types of windows that do not typically display contact information used by users to initiate telecommunications systems and to prevent analysis on these types of windows for subsequently-displayed windows having these types. In still another of these embodiments, the analysis component 602 transmits the enumeration to the window handler filter routine 405 for use in subsequent evaluations of windows.
- a flow diagram depicts one embodiment of a method for identifying a window lacking communications data relevant to a user of a computing device.
- the method includes receiving an identification of each of a plurality of windows displayed to a user of a computing device ( 702 ).
- the method includes receiving an indication of whether each of the plurality of windows contains contact information displayed to the user ( 704 ).
- the method includes receiving an indication of whether the user interacted with the information displayed by each of the plurality of windows ( 706 ).
- the method includes analyzing, for each of the plurality of windows, the received indication of whether the user interacted with the displayed information, the received indication of whether each of the plurality of windows contains contact information displayed to the user, and the received identification of each of the plurality of windows ( 708 ).
- the method includes generating an enumeration of window identification information for at least one filtered window ( 710 ).
- the analysis component 602 receives an identification of each of a plurality of windows displayed to a user of a computing device ( 702 ).
- the analysis component 602 receives the identification from the window handler filter routine 405 .
- the analysis component 602 receives the identification after the window handler filter routine 405 has determined that the data 320 displayed by the window should by analyzed by a window handler routine 410 .
- the analysis component 602 receives the identification from the client agent 220 .
- the analysis component 602 receives information associated with each of the plurality of windows. In another embodiment, the analysis component 602 receives an identification of a window type associated with at least one window in the plurality of windows. In still another embodiment, the analysis component 602 receives an identification of an ancestor window of at least one window in the plurality of windows. In still even another embodiment, the analysis component 602 receives an identification of a descendant window of at least one window in the plurality of windows. In still another embodiment, the analysis component 602 receives an identification of a sibling window of at least one window in the plurality of windows. In another embodiment, the analysis component 602 receives an identification of a type of class of at least one window in the plurality of windows. In yet another embodiment, the analysis component 602 receives caption data associated with at least one window in the plurality of windows. In some embodiments, the analysis component 602 receives window identification information as described above in FIGS. 3-6 .
- the analysis component 602 receives an indication of whether each of the plurality of windows contains contact information displayed to the user ( 704 ). In one embodiment, the analysis component 602 receives the indication from the window handler routine 410 . In another embodiment, the analysis component 602 receives the indication from the client agent 220 . In still another embodiment, the analysis component 602 receives the indication from a parser 312 executing in the client agent 220 .
- the analysis component 602 receives an identification of a telephone number displayed to the user. In another embodiment, the analysis component 602 receives an identification of a number associated with a facsimile machine is displayed to the user. In still another embodiment, the analysis component 602 receives an identification of an electronic mail address displayed to the user. In yet another embodiment, the analysis component 602 receives an identification that no contact information is displayed to the user.
- the analysis component 602 receives an indication that the window handler 410 has identified information within the application output data 320 that may or may not constitute contact information 324 .
- a parser 312 analyzes the information to determine whether or not the data is contact information.
- the parser 312 transmits a determination to the analysis component 602 as to whether or not the data 320 is or contains contact information 324 .
- the parser 312 is unable to determine whether the data 320 is or contains contact information 324 .
- the analysis component 602 receives an indication of whether the user interacted with the information displayed by each of the plurality of windows ( 706 ).
- the client agent 220 generates a user interface element displaying information retrieved from one of the plurality of windows and allowing a user to initiate a telecommunications session.
- the user interface includes an element such as a hyperlink, which the user may select to initiate the telecommunications session.
- the client agent 220 monitors the user interface element to determine whether or not the user interacts with the user interface element (for example, by using an input/output device to select the hyperlink). In some embodiments, the client agent 220 terminates display of the user interface element.
- the client agent 220 determines, responsive to the monitoring of the user interface element, that the user has not interacted with the user interface element within a period of time; for example, the client agent 220 may have received or include an identification of a predetermined threshold of time, determine that a user has not interacted with the user interface element within the period of time, and remove the user interface element from display. In another of these embodiments, the client agent 220 determines that the user is interacting with a different user interface element—for example, a different window 412 —and remove the user interface element from display. In embodiments in which the client agent 220 determines that the user has not interacted with the user interface element, the client agent 220 may transmit an identification of that lack of interaction to the analysis component 602 .
- the analysis component 602 analyzes, for each of the plurality of windows, the received indication of whether the user interacted with the displayed information, the received indication of whether each of the plurality of windows contains contact information displayed to the user, and the received identification of each of the plurality of windows ( 708 ). In one embodiment, the analysis component 602 applies at least one heuristic to the received indication of whether the user interacted with the displayed information. In another embodiment, the analysis component 602 applies at least one heuristic to the received indication of whether each of the plurality of windows contains contact information displayed to the user. In still another embodiment, the analysis component 602 applies at least one heuristic to the received indication of each of the plurality of windows. In some embodiments, the analysis component 602 determines, responsive to the analysis, that a type of window does not display contact information relevant to a user.
- the analysis component 602 generates an enumeration of window identification information for at least one filtered window ( 710 ). In one embodiment, the analysis component 602 generates statistical data during the implementation of the methods and systems described above. In another embodiment, the analysis component 602 processes the statistical data to generate data representative of window attributes characteristic of a window that does not contain communication data in the displayed application output data 320 . In still another embodiment, the analysis component 602 processes the statistical data to generate data representative of window attributes characteristic of a window that does not contain communication data that should be displayed to the user; for example, because the number is not relevant to the user or because the user is unlikely to use the number to initiate a telecommunications session.
- the statistical data can, in some embodiments, include data generated when a success or failure condition occurs.
- a failure condition occurs when the methods and systems are implemented to retrieve communication data from an identified window and the application output data displayed in the window does not include communication data.
- a failure condition occurs when data identified as communication data is displayed to a user in a user interface element allowing the user to initiate a telecommunications session (such as a telephone call, facsimile transmission, voice over Internet Protocol call, web conference, or other session) but the user chooses not to initiate such a sessions; for example, the user may determine that the displayed data is not contact information.
- a telecommunications session such as a telephone call, facsimile transmission, voice over Internet Protocol call, web conference, or other session
- a success condition occurs when the methods and systems described above are implemented to retrieve communication data from an identified window and the application output data displayed in the window does include communication data and the user interacts with the user interface element displaying the communication data to initiate a telecommunications session.
- the user initiates a telecommunications session, but only after modifying the displayed data; such a situation may be categorized as a failure or a success or as an intermediate condition. Any combination of statistical data can be combined or separated to provide indicators as to which windows will contain communication data.
- the analysis component 602 may determine whether or not a particular window should be searched by employing methods such as those that: implement learning algorithms able to use gathered information and make future decisions based on previously generated statistical data; autonomous algorithms that react based in part on gathered information, where the autonomous algorithms vary in their interaction with presently generated information based on past information; and algorithms that compile prior statistical information regarding the searching of application output data and further make decisions about future information input based on patterns, information, or other informational indicators within the gathered statistical information.
- the analysis component 602 provides, to the window handler filter routine 405 , the generated enumeration of window identification information for at least one filtered window.
- the analysis component 602 can prevent unnecessary analysis of windows for which no user interaction is likely to occur. In another embodiment, the analysis component 602 improves the performance of the system and allows the window handler filter routine to more effectively prevent operation on windows of a type not likely to contain contact data or other data prompting a user to initiate a telecommunications session.
- the system includes a window handler filter routine 405 and a window handler 410 .
- the window handler filter routine 405 receives window identification information associated with a window 812 a displayed to a user of a computing device, the window 812 a associated with a first type of window.
- the window handler filter routine 405 determines whether a window handler routine 410 executing on the computing device includes functionality for analyzing data displayed by the window 812 a associated with the first type of window.
- the window handler routine 410 receives the window identification information and applies, to the window 812 a associated with the first type of window, a process for determining whether a window 812 b associated with a second type of window displays contact information.
- the window handler filter routine 405 receives window identification information associated with a window 812 a displayed to a user of a computing device 200 , the window 812 a associated with a first type of window.
- the type of the window 812 may refer to a type of resource—such as an application executing on the computing device 200 —that generates the window.
- the window handler filter routine 405 receives the window identification information from a client agent 220 .
- the window handler filter routine 405 implements an applications programming interface to query an operating system executing on the computing device 200 to retrieve window identification window associated with a window 812 ; for example, the client agent 220 may indicate to the window handler filter routine 405 that a resource executing on the computing device 200 has displayed a new window 812 a and the window handler filter routine 405 may query the operating system to retrieve additional information associated with the window 812 .
- the window handler filter routine 405 provides the functionality described above in connection with FIGS. 4-7 .
- the system includes a client agent 220 transmitting, to the window handler filter routine 405 , the window identification information; the client agent 220 may be a client agent 220 or client software 220 as described above in connection with FIGS. 3-7 .
- the window handler filter routine 405 determines whether a window handler routine 410 executing on the computing device 200 includes functionality for analyzing application output data 320 a displayed by the window 812 a associated with the first type of window. In one embodiment, the window handler filter routine 405 identifies a type for the window 812 a . In another embodiment, the window handler filter routine 405 identifies the type of window by analyzing the received window identification information. In still another embodiment, the window handler filter routine 405 includes functionality for identifying the type of the window as described above in connection with FIGS. 4-5 .
- the window handler filter routine 405 accesses a mapping between a plurality of types of window and of window handler routines 405 providing functionality for analyzing each of the plurality of types of window.
- the window handler filter routine 405 accesses a mapping indicating that a window handler routine 410 A provides functionality for determining whether application output data displayed in a window 812 a generated by a word processing application contains contact information, while a window handler routine 410 B provides functionality for determining whether application output data displayed in a window 812 b generated by a spreadsheet application contains contact information.
- the window handler filter routine 405 accesses a mapping indicating that no window handler routine 410 provides functionality for determining whether application output data displayed in a window 812 a contains contact information.
- the window handler filter routine 405 may prevent operation on the window 812 a , as described above in connection with FIGS. 5-6 .
- the window handler filter routine 405 may identify an alternate window handler routine 410 for determining whether application output data displayed in a window 812 a contains contact information.
- a mapping may include a file, table, database, or other data structure indicating whether a window handler routine 410 provides functionality for analyzing application output data 320 for a window of a particular type.
- the mapping may include information such as the following:
- Process ID Browser Window N/A OUTLOOK.EXE window Handler 410A
- Window Class ID Window None Window handler RichEdit20WPT field 410B for processing RichEdit20A fields
- Top-level ID Parent None None - prevent RCTRL_RENWND32 Window operation on window
- the window handler filter routine 405 accesses a first mapping to identify substitute window handlers 410 and accesses a second mapping to identify windows for which the window handler filter routine 405 should prevent operation.
- a first window handler filter routine 405 determines whether to prevent operation on a window while a second window handler filter routine 405 determines whether to direct a window handler routine 410 to analyze a window 812 a associated with a first type of window, the window handler routine 410 providing functionality for determining whether a window 812 b associated with a second type of window displays contact information.
- the window handler routine 410 receives the window identification information.
- the window handler routine 410 is in communication with the client agent 220 and the window handler filter routine 405 .
- the window handler routine 410 includes a receiver receiving, from the window handler filter routine 405 , a direction to apply, to the window associated with the first type of window, the process for determining whether a window associated with a second type of window displays contact information.
- the window handler routine 410 applies, to the window 812 a associated with the first type of window, a process for determining whether a window 812 b associated with a second type of window displays contact information.
- the client agent 220 generates at least one user interface displaying an interface element for initiating a telecommunications session based on identified contact information displayed by the window 812 a associated with the first type of window.
- a block diagram depicts one embodiment of a method for identifying a process for analyzing data displayed by a window to a user of a computing device.
- the method includes receiving window identification information associated with a window displayed to a user of a computing device, the window associated with a first type of window ( 902 ).
- the method includes determining whether a window handler routine executing on the computing device includes functionality for analyzing data displayed by the window associated with the first type of window ( 904 ).
- the method includes directing the window handler routine to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information ( 906 ).
- the method includes receiving window identification information associated with a window displayed to a user of a computing device, the window associated with a first type of window ( 902 ).
- the window handler filter routine 405 receives the window identification information.
- the window handler filter routine 405 receives an identification of a window type of a window 812 a .
- the window handler filter routine 405 receives an identification of an ancestor window of the window 812 a .
- the window handler filter routine 405 receives an identification of a descendant window of the window 812 a .
- the window handler filter routine 405 receives an identification of a sibling window of the window 812 a .
- the window handler filter routing 405 receives an identification of a type of class of the window. In yet another embodiment, the window handler filter routine 405 receives an identification of caption data displayed by the window. In some embodiments, the window handler filter routine 405 receives the window identification information from the client agent 220 . In other embodiments, the window handler filter routine 405 uses an application programming interface to query an operating system executing on the computing device 200 for the window identification information.
- the method includes determining whether a window handler routine executing on the computing device includes functionality for analyzing data displayed by the window associated with the first type of window ( 904 ).
- the window handler filter routine 405 determines that the window handler routine 410 does provide functionality for analyzing data displayed by the window associated with the first type of window.
- the window handler filter routine 405 may execute the window handler routine 410 to analyze displayed application output data 320 .
- the window handler filter routine 405 may direct the client agent 220 to execute the window handler routine 410 .
- the window handler filter routine 405 determines that the window handler routine 410 does not include provide functionality for analyzing data displayed by the window associated with the first type of window.
- the window handler filter routine 405 determines that none of a plurality of window handler routine 410 provide functionality for analyzing data displayed by the window associated with the first type of window; in such an embodiment, the window handler filter routine 405 may prevent operation on the window as described above in connection with FIGS. 4-7 .
- the window handler filter routine 405 determines that although none of a plurality of window handler routine 410 provide functionality for analyzing data displayed by the window associated with the first type of window, at least one window handler routine 410 provides functionality for analyzing data displayed by a window 812 b of a second type and that the process for analyzing data of displayed by a window 812 b of a second type may be applied to analyze data displayed by a window 812 a of a first time.
- the method includes directing the window handler routine to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information ( 906 ).
- the window handler routine 410 receives an instruction, from the client agent 220 , to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information.
- the window handler routine 410 receives an instruction, from the window handler filter routine 405 , to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information.
- the window handler routine 410 determines, responsive to the applied process, that the window displays contact information to the user. In another embodiment, the window handler routine 410 determines, responsive to the applied process, that the window displays a telephone number to the user. In still another embodiment, the window handler routine 410 determines, responsive to the applied process, that the window displays a facsimile number to the user. In still even another embodiment, the window handler routine 410 determines, responsive to the applied process, that the window displays an email address to the user. In yet another embodiment, the window handler routine 410 determines, responsive to the applied process, that the window does not display contact information to the user.
- the window handler routine 410 provides, to the client agent 220 , an indication of whether the window 812 a displays contact information 324 to the user. In other embodiments, and as described above in connection with FIGS. 3-7 , if the client agent 220 receives an indication that the window 812 displays contact information 324 to the user, the client agent 220 generates and displays to a user at least one user interface displaying an interface element for initiating a telecommunications session based on identified contact information displayed by the window associated with the first type of window.
- the methods and systems described herein provide functionality for analyzing data displayed to a user of a computing device. In one of these embodiments, the methods and systems described herein provide this functionality even in situations in which the window handler routines 410 provided by the system do not include functionality for analyzing data displayed by a window of the type displaying the data for analysis. In another of these embodiments, by identifying an alternate window handler routine 410 for analyzing window data displayed in a window having a previously—unsupported type, the systems and methods described herein provide additional functionality and flexibility, supporting a wider range of types of windows displaying different types of data or data in differing formats without requiring the generation of customized software to analyze each of the different types of windows.
- the methods and systems described above provide functionality for analyzing data generated by a resource executing in a first operating system and displayed by the first operating system. In some embodiments, however, the methods and systems described herein also provide functionality for analyzing data generated by a resource executing in a first operating system and displayed by a second operating system. In one of these embodiments, the methods and systems described herein include at least one interface providing mechanisms for communication between a first resource executing in the first operating system and a second resource executing in the second operating system.
- FIG. 10A a block diagram depicts one embodiment of a system for providing, to a first application executed by a first operating system on a first computing device, an interface for communicating with at least one application executed by a second operating system on a second computing device.
- the system includes a computing device 200 a , a computing device 200 b , a first interface 1002 between a client agent 220 and at least one remote machine window handler routine 1010 , an interface 1030 between the at least one remote machine window handler 1010 and the client agent 220 , a remote application 1032 , and a window 1012 displaying, on the computing device 200 a , remotely-generated application output data 1020 .
- the first interface object 1002 executed by a first operating system, provides a mechanism for external communication with a first application 220 executed by the first operating system, and receiving an identification of a window 1012 displayed by the first operating system and generated by a second application 1032 executed by a second operating system.
- the at least one remote machine window handler 1010 executed by the second operating system includes a receiver receiving a request from the first interface object 1002 via a second interface object 1030 executed by the second operating system and providing a mechanism for external communication with the at least one window handler routine 1010 .
- the at least one remote machine window handler 1010 includes an analysis engine analyzing data displayed in the window 1012 .
- the at least one remote machine window handler 1010 includes a transmitter sending to the first interface object 1002 via the second interface object 1030 an identification of contact information 1024 displayed by the window 1012 .
- the first interface object 1002 executed by a first operating system on a computing device 200 a , provides a mechanism for external communication with a first application 220 executed by the first operating system, and receives an identification of a window 1012 displayed by the first operating system and generated by a second application 1032 executed by a second operating system on a second computing device 200 b .
- the first interface object 1002 is a proxy for a window handler routine 1010 executing on the computing device 200 b .
- the first interface object 1002 is a plug-in to the first application 220 .
- the first application 220 is a client agent 220 or client software 220 as described above in connection with FIGS. 2-9 .
- the first application 220 interacts with the first interface object 1002 as if the first interface object 1002 were a window handler routine 410 .
- the first interface object 1002 provides an interface between a client agent 220 executing on the computing device 200 a and a window handler routine 1010 executing on the computing device 200 b.
- the client agent 220 includes an analysis component, such as the parser 312 described above.
- the analysis component confirms that data identified by the window handler routine 1010 is contact information.
- the analysis component executes on the first operating system of the computing device 200 a and is in communication with the first interface object 1002 .
- the analysis component receives the contact information identified by the window handler routine 1010 and transmits, to the first application 220 confirmation that the data displayed by the identified window includes contact information.
- the analysis component transmits to the first application 220 an indication that the data displayed by the identified window does not include contact information.
- the first application 220 generates a user interface displaying the identified contact information 1024 .
- the at least one window handler routine 1010 includes a receiver receiving a request from the first interface object via a second interface object.
- the receiver receives an identification of a window 1012 displayed on the computing device 200 a and generated by a remote application 1032 executing on the computing device 200 b .
- the receiver receives a request to analyze application output data 1024 to determine whether or not the window 1012 displays any contact information 1024 .
- the at least one window handler routine 1010 includes an analysis engine analyzing application output data 1020 to determine whether the window 1012 displays any contact information 1024 . The analysis engine may analyze the data to make the determination as described above in connection with FIGS. 4-9 .
- the at least one window handler routine 1010 sends, to the first interface object 1002 , via the second interface object 1030 , an identification of contact information 1024 displayed by the window 1012 . In other embodiments, the at least one window handler routine 1010 sends, to the first interface object 1002 , via the second interface object 1030 , an indication that the window 1012 does not display contact information 1024 .
- the at least one window handler routine 1010 executing on the computing device 200 b provides functionality such as that provided by the window handler filter routine 405 described above in connection with FIGS. 3-9 .
- the at least one window handler routine 1010 is in communication with an analysis component executing on the computing device 200 b and providing functionality such as that provided by the analysis component 602 described above.
- the at least one window handler routine 1010 executing on the computing device 200 b is a plug-in module interacting with the second interface object 1030 as if the second interface object 1030 were a client agent 220 .
- the second interface object 1030 provides the at least one window handler routine 1010 with a mechanism for communicating with the client agent 220 .
- FIG. 10B a block diagram depicts one embodiment of a system in which two interface objects provide mechanisms for external communication between a plurality applications.
- the first interface object 1002 provides other objects, such as the second interface object 1030 and a second (“program B”) executing on the second operating system B, with a mechanism for communicating with a first program (“program A”) on the first operating system A.
- the first interface object 1002 provides proxying functionality on behalf of the first program.
- the first interface object 1002 receives a request from program A—for example, for analysis of application output data 1024 —and transmits the request to the second interface object 1030 .
- the second interface object 1030 transmits the request to one or more resources executing in the second operating system for processing.
- the resources are window handler filters 1010 and the second interface object 1030 provides the functionality of a client agent 220 , identifying at least one of a plurality of window handler filter 1010 to analyze data in an identified window, as described above in connection with FIGS. 4-9 .
- program B generates data for transmission to program A, transmits the data to the second interface object 1030 , which transmits the data to the first interface object 1002 , which transmits the data to program A.
- program B is unaware that the second interface object 1030 is not program A.
- program A is unaware that the first interface object 1002 has not generated the data received by program A.
- the first interface object 1002 remains unaware of the resource (such as program B) or resources (such as a plurality of window handler routines 1010 ) that provide the processing of the request and interacts only with the second interface object 1030 .
- program A remains unaware that the first interface object 1002 did not process the request to generate the response or that resources executed by other operating systems (such as program B, or a plurality of window handler routines 1010 ).
- the program B remains unaware that the second interface object 1030 is not a client agent 220 or the originator of the request for processing.
- a first resource is unaware that a second resource with which the first resource interacts is a proxy for a third resource because the second resource provides access to the same resources or functionality as the third resource.
- the first interface object 1002 and the second interface object 1030 establish a communications channel between the operating systems. In one of these embodiments, the first interface object 1002 and the second interface object 1030 communicate over a virtual channel. In another of these embodiments, the first interface object 1002 and the second interface object 1030 communicate over a channel according to a presentation layer protocol. In still another of these embodiments, a separate component establishes a presentation layer protocol channel such as a virtual channel and the first interface object 1002 and the second interface object 1030 communicate over the presentation layer protocol channel.
- the first interface object 1002 and the second interface object 1030 communicate over any of the networks 114 , 114 ′, 108 , 110 , or 112 using any of the protocols described above in connection with FIGS. 1 , 2 A, and 2 B.
- FIG. 10C a block diagram depicts one embodiment of a system for providing, to a first application executed by a first operating system on a computing device, an interface for communicating with at least one application executed by a second operating system on the computing device.
- the first interface object 1002 and the second interface object 1030 each execute in different operating systems and communicate across the operating systems to provide interfaces for two programs, such as a client agent 220 and a window handler routine 1010 .
- FIG. 10A depicted in FIG. 10A as executing on two different computing devices, in some embodiments, and as depicted in FIG.
- the first interface object 1002 and the second interface object 1030 may execute on different operating systems provided by a single computing device.
- the computing device 200 may execute both a first operating system 1040 and a second operating system 1050 .
- the first operating system 1040 is a different operating system than the second operating system 1050 .
- the first operating system 1040 is a different instance of the same operating system instantiated by the second operating system 1050 .
- each of the operating systems 1040 , 1050 execute within at least one virtual machine.
- a virtual machine 1060 may execute the first operating system 1040 and a second virtual machine 1070 may execute the second operating system 1050 .
- a hypervisor is provided to manage the virtual machines.
- each of the operating systems 1040 , 1050 is isolated from operating systems executing within a separate virtual machine.
- a user of the computing device 200 views a display of data generated by the first operating system 1040 separately from a display of data generated by the second operating system 1050 .
- only one display device 224 is provided and the display device 224 displays only the output data generated by one of the operating systems executed by the computing device 100 .
- multiple display devices 224 a - n are provided, each of which displays, separately, data generated by one of a plurality of operating systems.
- a user of the computing device 200 views a display of data generated by the first operating system 1040 concurrently with a display of data generated by the second operating system 1050 .
- the user views a plurality of desktop environments on one or more display devices 224 a - n providing a concurrent view of the plurality of desktop environments although the user interface elements and displayed data generated or maintained by each of the operating systems are displayed separately.
- the user views a plurality of desktop environments on one or more display devices 224 a - n providing a concurrent view of the plurality of desktop environments and the user interface elements and displayed data generated or maintained by each of the operating systems are displayed in an integrated desktop environment.
- operating systems 1040 and 1050 executing on a single computing device 200 may share physical resources provided by the computing device 200 including, but not limited to, processing capabilities, physical disk space, and display devices.
- a resource executed in one operating system may generate output data for display within a second operating system.
- an application 1032 executing in an operating system 1050 and remote to an operating system 1040 may generate application output data for display in a window maintained by the operating system 1040 .
- the resource 1032 may transmit an agent executing on the output data to the operating system 1040 , such as a presentation layer protocol client agent, and the agent directs the display of the output data by the operating system 1040 .
- a flow diagram depicts one embodiment of a method for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system.
- the method includes providing, by a first interface object executed by a first operating system, a mechanism for external communication with a first application executed by the first operating system ( 1102 ).
- the method includes providing, by a second interface object executed by a second operating system, a mechanism for external communication with at least one window handler routine executed by the second operating system ( 1104 ).
- the method includes receiving, by the first interface object, an identification of a window displayed by the first operating system and generated by a second application executed by the second operating system ( 1106 ).
- the method includes requesting, by the first interface object, from the second interface object, analysis of the identified window ( 1108 ).
- the method includes directing, by second interface object, analysis of data displayed in the window by the at least one window handler routine executed by the second operating system ( 1110 ).
- the method includes receiving, by the first interface object, from the second interface object, an identification of contact information displayed by the window resulting from the analysis by the at least one window handler routine executed by the second operating system ( 1112 ).
- the method includes providing, by a first interface object executed by a first operating system, a mechanism for external communication with a first application executed by the first operating system ( 1102 ).
- the first interface object 1002 receives requests from the first application, such as the client agent 220 , and forwards them to a second interface object 1030 for processing.
- the first interface object 1002 receives information, including responses to request for analysis of output data, from the second interface object 1030 and provides the information to the client agent 220 .
- the method includes providing, by a second interface object executed by a second operating system, a mechanism for external communication with at least one window handler routine executed by the second operating system ( 1104 ).
- the second interface object 1030 provides the functionality of a client agent 220 and a window handler routine 1010 on the second operating system interacts with the second interface object 1030 as described above in connection with FIGS. 3-9 .
- the window handler routine 1010 is a plug-in module that analyzes output data generated by applications executing on the second operating system 1050 and forwards a determination of whether or not the output data includes contact information to the second interface object 1030 .
- the interface objects may establish a connection between operating systems over which the interface objects communicate, exchanging proxied requests and responses.
- the method includes receiving, by the first interface object, an identification of a window displayed by the first operating system and generated by a second application executed by the second operating system ( 1106 ).
- the client agent 220 identifies a window 1012 as described above in connection with FIGS. 3-9 .
- the client agent 220 interacts with the first interface object 1002 as if the first interface object 1002 were a window handler routine 410 in a plurality of window handlers 410 .
- the client agent 220 transmits to the first interface object 1002 requests to indicate whether or not output data displayed by a window 1012 includes contact information.
- the first interface object 1002 receives window identification information associated with a window 1012 and determines that the window 1012 displays output data generated by a resource executing on the second operating system 1050 , which may execute on the second computing device 200 .
- the method includes requesting, by the first interface object, from the second interface object, analysis of the identified window ( 1108 ).
- the first interface object 1002 analyzes the window identification information to identify an associated resource generating the output data 1020 as described above in connection with FIGS. 3-9 .
- the first interface object 1002 transmits the window identification information with a request for analysis of output data displayed by the window 1012 to the second interface object 1030 for processing.
- the method includes directing, by second interface object, analysis of data displayed in the window by the at least one window handler routine executed by the second operating system ( 1110 ).
- the second interface object 1030 receives a request from the first interface object 1002 and identifies at least one window handler routine 1010 providing functionality for processing the received request.
- the second interface object 1030 implementing functionality such as that described above in connection with the client agent 220 and FIGS. 3-9 , accesses a plurality of window handler routines 1010 , each of which may have an associated level of priority, and requests that at least one of the window handler routines 1010 analyze output data 1020 .
- the second interface object 1030 transmits the received request to a non-window handler application.
- the method includes receiving, by the first interface object, from the second interface object, an identification of contact information displayed by the window resulting from the analysis by the at least one window handler routine executed by the second operating system ( 1112 ).
- the client agent 220 displays a user interface for interacting with the identified contact information, responsive to receiving the identification of the contact information from the first interface object.
- the first interface object 1002 transmits the identification of contact information 1024 to the client agent 220 .
- the first interface object 1002 receives, from the second interface object 1030 , an indication that the window does not display contact information, responsive to the analysis by the at least one window handler routine.
- the first interface object 1002 transmits the identification of contact information 1024 to an analysis component, such as parser 312 , for confirmation that the identified data is contact information.
- the analysis component determines that the identified information does not include a telephone number.
- the analysis component determines that the identified information does not include a facsimile number.
- the analysis component determines that the identified information does not include contact information.
- the analysis component transmits an identification to the client agent 220 that the identified information is not contact information.
- the analysis component transmits an instruction to the client agent 220 not to display a user interface for interacting with the identified contact information.
- the methods and systems described herein provide functionality for allowing a client software 220 executed by one operating system to interact with a window handler routine 1010 , or other application, executed by a second operating system either on the same or a different computing device, to determine whether remotely-generated output data includes contact information.
- a client software 220 executed by one operating system to interact with a window handler routine 1010 , or other application, executed by a second operating system either on the same or a different computing device, to determine whether remotely-generated output data includes contact information.
- the methods and systems described herein improve the functionality of the client software 220 to include the ability to analyze data from output data regardless of the environment in which the resource generating the output data executes, without requiring the execution of additional client software in the local environment.
- the systems and methods described above may be provided as one or more computer-readable programs embodied on or in one or more articles of manufacture.
- the article of manufacture may be a floppy disk, a hard disk, a CD-ROM, a flash memory card, a PROM, a RAM, a ROM, or a magnetic tape.
- the computer-readable programs may be implemented in any programming language, such as LISP, PERL, C, C++, C#, PROLOG, or in any byte code language such as JAVA.
- the software programs may be stored on or in one or more articles of manufacture as object code.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
A system for identifying a window lacking communications data relevant to a user of a computing device includes a client agent and an analysis component. A window handler filter routine generates an identification of each of a plurality of windows displayed to a user and generates an indication of whether each of the plurality of windows displays contact information. The client agent generates an indication of whether the user interacted with the information displayed by each of the plurality of windows. The analysis component analyzes, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information. The analysis component generates an enumeration of window identification information for at least one filtered window.
Description
- The present application claims priority to U.S. Provisional Patent Application Ser. No. 61/016,025, entitled “Systems and Methods for Obtaining Communications Data,” filed Dec. 21, 2007, which is incorporated herein by reference.
- This application relates generally to processing window data. In particular, this application relates to systems and methods for generating an enumeration of window types that lack contact data relevant to a user.
- Prior efforts have been made to provide a system and method that allows end-users to establish communication sessions from a computing device. These systems and methods include those that establish and facilitate communication via a communication application dedicated to the task of managing the communication, and those that establish communications using a website with phone numbers, a web server, and a dialing application. Still other systems and methods include those that retrieve phone numbers from application output data within a window and further use the retrieved phone numbers to establish communications via a communication agent. In such systems and methods, each window displayed on a particular display device is searched for text string sequences similar to those of a phone number, regardless of whether or not the window is likely to contain contact information.
- In one aspect, a method for identifying a window lacking communications data relevant to a user of a computing device includes receiving an identification of each of a plurality of windows displayed to a user of a computing device. The method includes receiving an indication of whether each of the plurality of windows contains contact information displayed to the user. The method includes receiving an indication of whether the user interacted with the information displayed by each of the plurality of windows. The method includes analyzing, for each of the plurality of windows, the received indication of whether the user interacted with the displayed information, the received indication of whether each of the plurality of windows contains contact information displayed to the user, and the received identification of each of the plurality of windows. The method includes generating an enumeration of window identification information for at least one filtered window. In one embodiment, the method includes providing, to a window handler filter process the generated enumeration of window identification information for at least one filtered window.
- In one aspect, a system for identifying a window lacking communications data relevant to a user of a computing device includes a client agent and an analysis component. The client agent includes a window handler filter routine and a window analysis component. The window handler filter routine generates an identification of each of a plurality of windows displayed to a user of a computing device. The window handler routine generates an indication of whether each of the plurality of windows displays contact information to the user. The client agent generates an indication of whether the user interacted with the information displayed by each of the plurality of windows. The analysis component analyzes, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information. The analysis component generates an enumeration of window identification information for at least one filtered window. In some embodiments, the analysis component is in communication with the window handler filter routine and with the client agent. In one of these embodiments, the analysis component transmits the enumeration to the window handler filter routine.
- The foregoing and other objects, aspects, features, and advantages of the disclosure will become more apparent and better understood by referring to the following description taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a block diagram depicting one embodiment of an environment for providing communications; -
FIGS. 2A and 2B are block diagrams of embodiments of a computing device; -
FIG. 3 is a block diagram of an embodiment of a client application for enabling a communications session; -
FIG. 4A is a block diagram depicting one embodiment of a plurality of window handler routines; -
FIG. 4B is a block diagram depicting one embodiment of a system for efficient processing of data displayed by a window; -
FIG. 5A is a flow diagram depicting one embodiment of a method for efficient processing of data displayed by a window; -
FIG. 5B is a flow diagram depicting one embodiment of a method for analyzing window information; -
FIG. 6 is a block diagram depicting one embodiment of a system for identifying a window lacking communications data relevant to a user of a computing device; -
FIG. 7 is a flow diagram depicting one embodiment of a method for identifying a window lacking communications data relevant to a user of a computing device; -
FIG. 8 is a block diagram depicting one embodiment of a system for identifying a process for analyzing data displayed by a window to a user of a computing device; -
FIG. 9 is a flow diagram depicting one embodiment of a method for identifying a process for analyzing data displayed by a window to a user of a computing device; -
FIG. 10A is a block diagram depicting one embodiment of a system for providing, to a first application executed by a first operating system on a first computing device, an interface for communicating with at least one application executed by a second operating system on a second computing device; -
FIG. 10B is a block diagram depicting one embodiment of a plurality of interface objects providing communication mechanisms between an application executed by one operating system and at least one application executed by a second operating system; -
FIG. 10C is a block diagram depicting one embodiment of a system for providing, to a first application executed by a first operating system on a computing device, an interface for communicating with at least one application executed by a second operating system on the computing device; and -
FIG. 11 is a flow diagram depicting one embodiment of a method for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system. - Referring now to
FIG. 1 , a block diagram depicts one embodiment of anenvironment 100 for providing voice communication (e.g., a voice call). Theenvironment 100 includes a plurality of end-users mobile network 108, a packet-switchednetwork 110, and a circuit-switchednetwork 112. One of the end-users 106 is in communication with acommunication gateway 116 via at least onenetwork 114. Thecommunications gateway 116 is in communication with a private branch exchange (PBX) 120. The PBX 120 is in communications with one or more of themobile network 108, the packet-switchednetwork 110, and the circuit-switchednetwork 112. Thecommunications gateway 116 and the PBX 120 may communicate with each other via asecond network 114′. In one embodiment, thefirst network 114 and thesecond network 114′ are the same network. Thesecond network 114′ can include one or more of each of a QSIG trunk, an H.323 trunk, and a SIP trunk. QSIG refers to the ISDN based signaling protocol for signaling between nodes of a Private Integrated Services Network (PISN). The QSIG protocol carries user and feature information between private branch exchanges. H.323 refers to the ITU standard that defines a framework of protocols for inter-working voice, video and data across an IP network. SIP refers to the Session Initiation Protocol, which is used for setting up communications sessions on the Internet, such as telephony, presence, events notification and instant messaging. The SIP protocol initiates call setup, routing, authentication and other feature messages to endpoints within an IP domain. - Each end-user 106 can have a
computing device 105 executing software that provides at least some of the below-described functionality. The end-user 106 interacts with thecomputing device 105 to cause thecomputing device 105 to, for example, issue commands to thecommunications gateway 116, which in turn issues commands to thePBX 120, to establish a voice communication session with at least one other end-user 106. - The
first network 114 and thesecond network 114′ can be a local-area network (LAN), a metropolitan-area network (MAN), or a wide area network (WAN) such as the Internet or the World Wide Web. In one embodiment, anetwork 114 may be a private network and anetwork 114′ may be a public network. In another of these embodiments, anetwork 114′ may be a private network and a network 114 a public network. In still another embodiment,networks networks - The
network 114 may be any type and/or form of network and may include any of the following: a point to point network, a broadcast network, a wide area network, a local area network, a telecommunications network, a data communication network, a computer network, an ATM (Asynchronous Transfer Mode) network, a SONET (Synchronous Optical Network) network, a SDH (Synchronous Digital Hierarchy) network, a wireless network and a wireline network. In some embodiments, thenetwork 114 may comprise a wireless link, such as an infrared channel or satellite band. The topology of thenetwork 114 may be a bus, star, or ring network topology. Thenetwork 114 and network topology may be of any such network or network topology as known to those ordinarily skilled in the art capable of supporting the operations described herein. The network may comprise mobile telephone networks utilizing any protocol or protocols used to communicate among mobile devices, including AMPS, TDMA, CDMA, GSM, GPRS or UMTS. In some embodiments, different types of data may be transmitted via different protocols. In other embodiments, the same types of data may be transmitted via different protocols. - In one embodiment, the system may include multiple, logically-grouped servers. For example, the
communications gateway 116, thePBX 120, and machines in themobile network 108, the packet-switchednetwork 110, or the circuit-switchednetwork 112 may be provided as one or more servers. In some embodiments, a logical group of servers may be referred to as a server farm. In some of these embodiments, the servers may be geographically dispersed. In others of these embodiments, a farm may be administered as a single entity. In still others of these embodiments, the server farm comprises a plurality of server farms. In further embodiments, the server farm executes one or more applications on behalf of one or more end-users 106. A server may be a file server, application server, web server, proxy server, appliance, network appliance, gateway, application gateway, gateway server, virtualization server, deployment server, SSL VPN server, or firewall. In some embodiments, a server provides a remote authentication dial-in user service, and is referred to as a RADIUS server. In other embodiments, a server may have the capacity to function as either an application server or as a master application server. In still other embodiments, a server is a blade server. In yet other embodiments, a server executes a virtual machine providing, to a user orcomputing device 105, access to a computing environment. - In one embodiment, a server may include an Active Directory. The server may be an application acceleration appliance. For embodiments in which the server is an application acceleration appliance, the server may provide functionality including firewall functionality, application firewall functionality, or load balancing functionality. In some embodiments, the server comprises an appliance such as one of the line of appliances manufactured by the Citrix Application Networking Group, of San Jose, Calif., or Silver Peak Systems, Inc., of Mountain View, Calif., or of Riverbed Technology, Inc., of San Francisco, Calif., or of F5 Networks, Inc., of Seattle, Wash., or of Juniper Networks, Inc., of Sunnyvale, Calif.
- The
computing device 105 connects to thenetwork 114 via communications link using any one of a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., T1, T3, 56 kb, X.25), broadband connections (ISDN, Frame Relay, ATM), and wireless connections. In some embodiments, thecomputing device 105 of the end-user 106 connects to thecommunications gateway 116 through an additional network (not shown) using another communication link that connects thenetwork 114 to the additional network. The protocols used to communicate through the communications link can include any variety of protocols used for long haul or short transmission. For example, TCP/IP, IPX, SPX, NetBIOS, NetBEUI, SONET and SDH protocols or any type and form of transport control protocol may also be used, such as a modified transport control protocol, for example a Transaction TCP (T/TCP), TCP with selection acknowledgements (TCPSACK), TCP with large windows (TCP-LW), a congestion prediction protocol such as the TCP-Vegas protocol, and a TCP spoofing protocol. In other embodiments, any type and form of user datagram protocol (UDP), such as UDP over IP, may be used. The combination of thenetworks 114 can be conceptually thought of as the Internet. As used herein, Internet refers to the electronic communications network that connects computer networks and organizational computer facilities around the world. - The packet switched
network 110 communicates, directly or indirectly, with thePBX 120. As used herein, a packet switched network refers to a data communications network where information (e.g., voice and data) is divided into packets and delivered to their destination separately and possibly via different paths. Some packet switched networks provide voice-IP (VoIP) functionality. ThePBX 120 can provide telephone services to end-users 106 having telephone devices terminated on the packet switchednetwork 110. As used herein, telephone devices refers telephones, fax machines, computers, IP phones, soft phones, video phones, mobile phones, wlan phones, or other devices capable of transmitting and receiving audible information. - The circuit switched
network 112 also communicates, directly or indirectly, with thePBX 120. As used herein circuit switched refers to routing traffic between an originator and a destination through switching centers, from local users or from other switching centers, whereby a continuous electrical circuit is established and maintained between the calling and called stations until it is released by one of those stations. For example, the switchedcircuit network 112 can be the public switched telephone network (PSTN). ThePBX 120 can provide telephone services to end-users 106 having telephone devices terminated on the circuit switchednetwork 112. - The
mobile network 108 communicates, directly or indirectly, with thePBX 120. As used herein, mobile network refers to facilities operated by a telephony carrier for the purposes of providing public mobile telecommunications services. ThePBX 120 can provide telephone services to enterprise subscribers having telephone devices terminated on the mobile switchednetwork 108. - As an operational summary, the
PBX 120 interfaces to one or more of themobile network 108, the packet switchednetwork 110, and the circuit switchednetwork 112 and to thecommunications gateway 116. An end-user 106 initiates a request for a communications session with another end-user 106. In response, thecomputing device 105 of the end-user 106 issues a signal (e.g., a command) to thecommunications gateway 116. In response, the communications gateway 106 establishes communications with thePBX 120 and issues a signal (e.g., a command) to the PBX to establish a communications session between the end-users 106. In such an embodiment, the communications session is established and “hosted” by thePBX 120. - The
computing devices 105,communications gateway 116, andPBX 120 may be deployed as and/or executed on any type and form of computing device, such as a computer, network device or appliance capable of communicating on any type and form of network and performing the operations described herein or known in the art. As shown inFIGS. 2A and 2B eachcomputing device 200 includes acentral processing unit 201 and amain memory unit 222. As shown inFIG. 2A , acomputing device 200 may include a visual display device 224, akeyboard 226 and/or apointing device 227, which can control a cursor, such as a mouse. Eachcomputing device 200 may also include additional optional elements, such as one or more input/output devices 230 a-230 b (generally referred to using reference numeral 230), and acache memory 240 in communication with thecentral processing unit 201. - The
central processing unit 201 is any logic circuitry that responds to and processes instructions fetched from themain memory unit 222. In many embodiments, the central processing unit is provided by a microprocessor unit, such as: those manufactured by Intel Corporation of Mountain View, Calif.; those manufactured by Motorola Corporation of Schaumburg, Ill.; those manufactured by Transmeta Corporation of Santa Clara, Calif.; the RS/6000 processor, those manufactured by International Business Machines of White Plains, N.Y.; or those manufactured by Advanced Micro Devices of Sunnyvale, Calif. Thecomputing device 200 may be based on any of these processors, or any other processor capable of operating as described herein. -
Main memory unit 222 may be one or more memory chips capable of storing data and allowing any storage location to be directly accessed by themicroprocessor 201, such as Static random access memory (SRAM), Burst SRAM or SynchBurst SRAM (BSRAM), Dynamic random access memory (DRAM), Fast Page Mode DRAM (FPM DRAM), Enhanced DRAM (EDRAM), Extended Data Output RAM (EDO RAM), Extended Data Output DRAM (EDO DRAM), Burst Extended Data Output DRAM (BEDO DRAM), Enhanced DRAM (EDRAM), synchronous DRAM (SDRAM), JEDEC SRAM, PC100 SDRAM, Double Data Rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), SyncLink DRAM (SLDRAM), Direct Rambus DRAM (DRDRAM), or Ferroelectric RAM (FRAM). Themain memory 222 may be based on any of the above described memory chips, or any other available memory chips capable of operating as described herein. In the embodiment shown inFIG. 2A , theprocessor 201 communicates withmain memory 222 via a system bus 250 (described in more detail below).FIG. 2A depicts an embodiment of acomputing device 200 in which the processor communicates directly withmain memory 222 via amemory port 203. For example, inFIG. 2B themain memory 222 may be DRDRAM. -
FIG. 2B depicts an embodiment in which themain processor 201 communicates directly withcache memory 240 via a secondary bus, sometimes referred to as a backside bus. In other embodiments, themain processor 201 communicates withcache memory 240 using thesystem bus 250.Cache memory 240 typically has a faster response time thanmain memory 222 and is typically provided by SRAM, BSRAM, or EDRAM. In the embodiment shown inFIG. 2A , theprocessor 201 communicates with various I/O devices 230 via alocal system bus 250. Various busses may be used to connect thecentral processing unit 201 to any of the I/O devices 230, including a VESA VL bus, an ISA bus, an EISA bus, a MicroChannel Architecture (MCA) bus, a PCI bus, a PCI-X bus, a PCI-Express bus, or a NuBus. For embodiments in which the I/O device is a video display 224, theprocessor 201 may use an Advanced Graphics Port (AGP) to communicate with the display 224.FIG. 2B depicts an embodiment of acomputer 200 in which themain processor 201 communicates directly with I/O device 230 via HyperTransport, Rapid I/O, or InfiniBand.FIG. 2B also depicts an embodiment in which local busses and direct communication are mixed: theprocessor 201 communicates with I/O device 230 using a local interconnect bus while communicating with I/O device 230 directly. - The
computing device 200 may support anysuitable installation device 216, such as a floppy disk drive for receiving floppy disks such as 3.5-inch, 5.25-inch disks or ZIP disks, a CD-ROM drive, a CD-R/RW drive, a DVD-ROM drive, tape drives of various formats, USB device, hard-drive or any other device suitable for installing software and programs such as any client software, or portion thereof. Thecomputing device 200 may further comprise astorage device 228, such as one or more hard disk drives or redundant arrays of independent disks, for storing an operating system and other related software, and for storing application software programs such as any program related to aclient software package 220. Optionally, any of theinstallation devices 216 could also be used as thestorage device 228. Additionally, the operating system and the software can be run from a bootable medium, for example, a bootable CD, such as KNOPPIX, a bootable CD for GNU/Linux that is available as a GNU/Linux distribution from knoppix.net. - Furthermore, the
computing device 200 may include anetwork interface 218 to interface to a Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., 802.11, T1, T3, 56 kb, X.25, SNA, DECNET), broadband connections (e.g., ISDN, Frame Relay, ATM, Gigabit Ethernet, Ethernet-over-SONET, ADSL, SDSL), wireless connections, or some combination of any or all of the above. Connections can be established using a variety of communication protocols (e.g., TCP/IP, IPX, SPX, NetBIOS, Ethernet, ARCNET, SONET, SDH, Fiber Distributed Data Interface (FDDI), RS232, IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, CDMA, GSM, WiMax and direct asynchronous connections). In one embodiment, thecomputing device 200 communicates withother computing devices 200′ via any type and/or form of gateway or tunneling protocol such as Secure Socket Layer (SSL) or Transport Layer Security (TLS), or the Citrix Gateway Protocol manufactured by Citrix Systems, Inc. of Ft. Lauderdale, Fla. Thenetwork interface 218 may comprise a built-in network adapter, network interface card, PCMCIA network card, card bus network adapter, wireless network adapter, USB network adapter, modem or any other device suitable for interfacing thecomputing device 200 to any type of network capable of communication and performing the operations described herein. - A wide variety of I/O devices 230 a-230 n may be present in the
computing device 200, some of which may function as pointing devices. Input devices include keyboards, mice, trackpads, trackballs, microphones, and drawing tablets. Output devices include video displays, speakers, inkjet printers, laser printers, and dye-sublimation printers. The I/O devices 230 may be controlled by an I/O controller 223 as shown inFIG. 2A . The I/O controller may control one or more I/O devices such as akeyboard 226 and apointing device 227, e.g., a mouse or optical pen. Furthermore, an I/O device may also providestorage 228 and/or aninstallation medium 216 for thecomputing device 200. In still other embodiments, thecomputing device 200 may provide USB connections to receive handheld USB storage devices such as the USB Flash Drive line of devices manufactured by Twintech Industry, Inc. of Los Alamitos, Calif. - In some embodiments, the
computing device 200 may comprise or be connected to multiple display devices 224 a-224 n, which each may be of the same or different type and/or form. As such, any of the I/O devices 130 a-130 n and/or the I/O controller 223 may comprise any type and/or form of suitable hardware, software, or combination of hardware and software to support, enable or provide for the connection and use of multiple display devices 224 a-224 n by thecomputing device 200. For example, thecomputing device 200 may include any type and/or form of video adapter, video card, driver, and/or library to interface, communicate, connect or otherwise use the display devices 224 a-224 n. In one embodiment, a video adapter may comprise multiple connectors to interface to multiple display devices 224 a-224 n. In other embodiments, thecomputing device 200 may include multiple video adapters, with each video adapter connected to one or more of the display devices 224 a-224 n. In some embodiments, any portion of the operating system of thecomputing device 200 may be configured for using multiple displays 224 a-224 n. In other embodiments, one or more of the display devices 224 a-224 n may be provided by one or more other computing devices, such ascomputing devices computing device 200, for example, via a network. These embodiments may include any type of software designed and constructed to use another computer's display device as asecond display device 224 a for thecomputing device 200. One ordinarily skilled in the art will recognize and appreciate the various ways and embodiments that acomputing device 200 may be configured to have multiple display devices 224 a-224 n. - In further embodiments, an I/O device 230 may be a
bridge 270 between thesystem bus 250 and an external communication bus, such as a USB bus, an Apple Desktop Bus, an RS-232 serial connection, a SCSI bus, a FireWire bus, a FireWire 800 bus, an Ethernet bus, an AppleTalk bus, a Gigabit Ethernet bus, an Asynchronous Transfer Mode bus, a HIPPI bus, a Super HIPPI bus, a SerialPlus bus, a SCI/LAMP bus, a FibreChannel bus, or a Serial Attached small computer system interface bus. - A
computing device 200 of the sort depicted inFIGS. 2A and 2B typically operate under the control of operating systems, which control scheduling of tasks and access to system resources. Thecomputing device 200 can be running any operating system such as any of the versions of the MICROSOFT Windows operating systems, the different releases of the Unix and Linux operating systems, any version of the MAC OS for Macintosh computers, any embedded operating system, any real-time operating system, any open source operating system, any proprietary operating system, any operating systems for mobile computing devices, or any other operating system capable of running on the computing device and performing the operations described herein. Typical operating systems include: WINDOWS 3.x, WINDOWS 95, WINDOWS 98, WINDOWS 2000, WINDOWS NT 3.51, WINDOWS NT 4.0, WINDOWS CE, WINDOWS XP, and WINDOWS VISTA all of which are manufactured by Microsoft Corporation of Redmond, Wash.; MAC OS, manufactured by Apple Computer of Cupertino, Calif.; OS/2, manufactured by International Business Machines of Armonk, N.Y.; and Linux, a freely-available operating system distributed by Caldera Corp. of Salt Lake City, Utah, or any type and/or form of a Unix operating system, among others. - The
computer system 200 can be any workstation, desktop computer, laptop or notebook computer, server, handheld computer, mobile telephone or other portable telecommunication device, media playing device, a gaming system, mobile computing device, or any other type and/or form of computing, telecommunications or media device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein. For example, thecomputer system 200 may comprise a device of the IPOD family of devices manufactured by Apple Computer of Cupertino, Calif., a PLAYSTATION 2, PLAYSTATION 3, or PERSONAL PLAYSTATION PORTABLE (PSP) device manufactured by the Sony Corporation of Tokyo, Japan, a NINTENDO DS, NINTENDO GAMEBOY, NINTENDO GAMEBOY ADVANCED or NINTENDO REVOLUTION device manufactured by Nintendo Co., Ltd., of Kyoto, Japan, or an XBOX or XBOX 360 device manufactured by the Microsoft Corporation of Redmond, Wash. - In other embodiments, the
computing device 200 may have different processors, operating systems, and input devices consistent with the device. For example, in one embodiment thecomputer 100 is aTREO 180, 270, 1060, 600, 650, 680, 700p, 700w/wx, 750, 755p, 800w, Centro, Pro smart phone manufactured by Palm, Inc. In this embodiment, the TREO smart phone is operated under the control of the PALM OS operating system and includes a stylus input device as well as a five-way navigator device. - In other embodiments, the
computing device 200 is a mobile device, such as a JAVA-enabled cellular telephone or personal digital assistant (PDA), such as the i55sr, i58sr, i85s, i88s, i90c, i95c1, i335, i365, i570, 1576, i580, i615, i760, i836, i850, i870, i880, i920, i930, ic502, ic602, ic902, i776 or the im1100, all of which are manufactured by Motorola Corp. of Schaumburg, Ill., the 6035 or the 7135, manufactured by Kyocera of Kyoto, Japan, or the i300 or i330, manufactured by Samsung Electronics Co., Ltd., of Seoul, Korea. In some embodiments, thecomputer system 200 is a mobile device manufactured by Nokia of Finland, or by Sony Ericsson Mobile Communications AB of Lund, Sweden. - In still other embodiments, the
computing device 200 is a Blackberry handheld or smart phone, such as the devices manufactured by Research In Motion Limited, including the Blackberry 7100 series, 8700 series, 7700 series, 7200 series, the Blackberry 7520, the Blackberry PEARL 8100, the 8700 series, the 8800 series, the Blackberry Storm, Blackberry Bold, Blackberry Curve 8900, Blackberry Pearl Flip. In yet other embodiments, thecomputing device 200 is a smart phone, Pocket PC, Pocket PC Phone, or other handheld mobile device supporting Microsoft Windows Mobile Software. Moreover, thecomputing device 100 can be any workstation, desktop computer, laptop or notebook computer, server, handheld computer, mobile telephone, any other computer, or other form of computing or telecommunications device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein. - The
computing devices 105 may also be referred to as client nodes, client machines, endpoint nodes, or endpoints. In some embodiments, acomputing device 105 has the capacity to function as both a client node seeking access to resources provided by a server and as a server providing access to hosted resources forother computing devices 105. - A
computing device 105 may execute, operate or otherwise provide an application, which can be any type and/or form of software, program, or executable instructions such as any type and/or form of web browser, web-based client, client-server application, a thin-client computing client, an ActiveX control, or a Java applet, or any other type and/or form of executable instructions capable of executing on thecomputing device 105. In some embodiments, the application may be a server-based or a remote-based application executed on behalf of thecomputing device 105 on a server. In one embodiment, the server may display output data to thecomputing device 105 using any thin-client or remote-display protocol, such as the Independent Computing Architecture (ICA) protocol manufactured by Citrix Systems, Inc. of Ft. Lauderdale, Fla.; the Remote Desktop Protocol (RDP) manufactured by the Microsoft Corporation of Redmond, Wash.; the X11 protocol; the Virtual Network Computing (VNC) protocol, manufactured by AT&T Bell Labs; the SPICE protocol, manufactured by Qumranet, Inc., of Sunnyvale, Calif., USA, and of Raanana, Israel; the Net2Display protocol, manufactured by VESA, of Milpitas, Calif.; the PC-over-IP protocol, manufactured by Teradici Corporation, of Burnaby, B.C.; the TCX protocol, manufactured by Wyse Technology, Inc., of San Jose, Calif.; the THINC protocol developed by Columbia University in the City of New York, of New York, N.Y.; or the Virtual-D protocols manufactured by Desktone, Inc., of Chelmsford, Mass. The application can use any type of protocol and it can be, for example, an HTTP client, an FTP client, an Oscar client, or a Telnet client. In other embodiments, the application comprises any type of software related to voice over internet protocol (VoIP) communications, such as a soft IP telephone. In further embodiments, the application comprises any application related to real-time data communications, such as applications for streaming video and/or audio. - In some embodiments, the
client software 220 provides functionality related to establishing a communication session, such as a telephone call, a voice-over IP call, a chat session, an e-mail session, or other communications session. In one of these embodiments, theclient software 220 can provide the end-user 106 of theclient 105 with functionality that allows the end-user to “click” a telephone number or other recognized pattern within output of a software application and “call” that telephone number. Upon selection of the telephone number, theclient computer 105 signals thecommunications gateway 116 to issue commands to thePBX 120, which in turn establishes the communication session. In addition, the end-user 106 can edit the telephone number prior to establishing the call and also designate a phone number that the end-user wants to be called at, if the end-user 106 is away from their telephone that is associated with thePBX 120. Furthermore, theclient software 220 may perform directory traversal to locate numbers that are not located in the application output displayed by a window, but instead are stored in one or more heterogeneous or homogenous directory services (e.g., MICROSOFT OUTLOOK contacts and other directory sources). Additional details of theclient software 220 are described below. - Referring now to
FIG. 3 , a block diagram depicts one embodiment ofclient software 220. In brief overview, theclient software 220 includes a cursordetection hooking mechanism 304, a plurality of window handlers 308 a, 308 b, 308 c (referred to generally as processes handler 308), aparser module 312, acall routine 316, and one or more directory handlers. Each of these modules can communicate with each other, directly or indirectly, using known programming techniques. In some embodiments, the cursordetection hooking mechanism 304 is optional. In other embodiments, the directory handlers are optional. In further embodiments, one or more of each or any of the components may be provided on one ormore software applications 220. - Referring now to
FIG. 3 , and in greater detail, thecursor detection mechanism 304 comprises any logic, function and/or operations to detect a status, movement or activity of a cursor, or pointing device, on the screen of theclient computing device 105. Thecursor detection mechanism 304 may comprise software, hardware, or any combination of software and hardware. In one embodiment, thecursor detection mechanism 304 comprises an application, a program, a library, a process, a service, a task, or a thread. In another embodiment, thecursor detection mechanism 304 may include an application programming interface (API) hook into the operating system to obtain or gain access to events and information related to a cursor, and its movement on the screen. In still another embodiment, using an API hooking technique, theclient software 220 and/orcursor detection mechanism 304 monitors and intercepts operating system API calls related to the cursor and/or used by applications. In some embodiments, thecursor detection mechanism 304 API intercepts existing system or application's functions dynamically at runtime. - In one embodiment, the
cursor detection mechanism 304 may include any type of hook, filter or source code for receiving cursor events or run-time information of the cursor's position on the screen, or any events generated by button clicks or other functions of the cursor. In another embodiment, thecursor detection mechanism 304 may comprise any type and form of pointing device driver, cursor driver, filter, or any other API or set of executable instructions capable of receiving, intercepting or otherwise accessing events and information related to a cursor on the screen. In still another embodiment, thecursor detection mechanism 304 detects the position of the cursor or pointing device on the screen, such as the cursor's x-coordinate and coordinate on the screen. In yet embodiment, thecursor detection mechanism 304 detects, tracks or compares the movement of the cursor's X-coordinate and Y-coordinate relative to a previous reported or received X and Y-coordinate position. - In one embodiment, the
cursor detection mechanism 304 comprises logic, functionality and/or operations to detect if the cursor or pointing device is idle or has been idle for a predetermined or predefined length of time. In another embodiment, thecursor detection mechanism 304 detects that the cursor has been idle for a predetermined length of time between 100 ms and Isec, such as 100 ms, 200 ms, 300 ms, 400 ms, 500 ms, 600 ms, 700 ms, 800 ms or 900 ms. In still another embodiment, thecursor detection mechanism 304 detects that the cursor has been idle for a predetermined length of time of approximately 500 ms, such as 490 ms, 495 ms, 500 ms, 505 ms or 510 ms. In still even another embodiment, the predetermined length of time to detect and consider the cursor is idle is set by thecursor detection mechanism 304. In yet another embodiment, the predetermined length of time is configurable by a user or an application via an API, graphical user interface or command line interface. - In some embodiments, a sensitivity of the
cursor detection mechanism 304 may be set such that movements in either the X or Y coordinate position of the cursor may be received and the cursor still detected and/or considered idle. In one of these embodiments, the sensitivity may indicate the range of changes to either or both of the X and Y coordinates of the cursor which are allowed for the cursor to be considered idle by thecursor detection mechanism 304. For example, if the cursor has been idle for 200 ms and the user moves the cursor a couple or a few pixels/coordinates in the X and/or Y direction, and then the cursor is idle for another 300 ms, the cursor detection mechanism 205 may indicate the cursor has been idle for approximately 500 ms. - The window handler 308 analyzes the contents of
application output 320 displayed in a window on a display device of a computing device. In one embodiment, a resource executing on thecomputing device 105 generates application output data and directs the display, to a user of the computing device, of the generated application output data. In another embodiment, the application output data is displayed within a window associated with an application executing on thecomputing device 105. - In some embodiments, each window handler 308 interacts with a single type of application. In one of these embodiments, a separate window handler 308 may be provided for each of a type of application such as, for example, an internet browsing application (such as, for example, MICROSOFT INTERNET EXPLORER), a word processing application (such as, for example, MICROSOFT WORD), or a spreadsheet application (such as, for example, MICROSOFT EXCEL). In another of these embodiments, a separate window handler 308 may be provided for each of a type of field, such as, for example, an Edit field (this includes applications providing notepad functionality) or a Static text field. In still another of these embodiments, additional window handlers are included for other applications (e.g., portable document format reader applications such as ADOBE reader, presentation generation and viewing applications such as MICROSOFT POWERPOINT, and the like). In still even another of these embodiments, a window handler 308 that processes a specific type of application may be referred to as an application-specific window handler 308. In other embodiments, a single window handler can interact with multiple applications that have similar characteristics. In one of these embodiments, there may be fewer application specific handlers than there are resources generating application output data for display.
- In some embodiments, when the
pointer 328 is idle, theclient software 220 initiates each of the window handlers 308. In other embodiments, only a subset of the window handlers 308 is initiated. In one of these embodiments, theclient software 220 determines which window is active and thus which application is producing output displayed in the active window. In another of these embodiments, theclient software 220 transmits to a window handler 308 a at least one of a window identifier, window identification information and application type. In still another of these embodiments, the window handler 308 a determines whether or not it includes functionality for processingapplication output data 320 in the identified window. In still even another of these embodiments, a first window handler 308 a responds with an indication that it cannot process theapplication output data 320, at which point a second window handler 308 is called. In further embodiments, when a window handler 308 is initiated, if the window handler 308 includes functionality for processingapplication output data 320 displayed in the window, the window handler 308 determines whether a specific pattern of characters exists within a specific area determined relative to the location of the cursor 328 (such as within a window near the cursor), which is described in more detail below with reference toFIG. 3B . - In one embodiment, and for example, if the active window is a static window, a window handler 308 retrieves text from within the application using a WM_GETTEXT message; the window handler 308 analyzes the returned contents for patterns. In another embodiment, the
parser 312 analyzes the returned contents for patterns. If, in one example, a telephone number is found, thesoftware 220 displays the identified telephone number to the end-user. In still another embodiment, and as another example, if an edit window is the active window, the window handler 308 uses EM_* messages that are a part of the operating system API; text that is in the vicinity of the pointer location is returned using the WM_GETTEXT and EM_CHARFROMPOS messages. - In one embodiment, if the active window is a browser window, such as a MICROSOFT INTERNET EXPLORER window, the window handler 308 extracts the underlying HTMLDocument2 object from the window using the WM_HTML_GETOBJECT message. The window handler 308 then traverses the HTML to get the IHTMLBodyElement object, from which an IHTMLTxtRange object can be extracted containing the text under the location of the pointer. In another embodiment, if the active window is a word processing window, such as a MICROSOFT WORD window, an application specific window handler 308 extracts the underlying IID_Window object from the window using the AccessibleObjectFromWindow API method. From that object, the RangeFromPoint method returns an IID_Range object containing the text at the location of the pointer.
- In some embodiments, none of the window handlers 308 include functionality for analyzing
application output data 320 of an identified window. In one of these embodiments, a default window handler is called. In another of these embodiments, the default window handler performs screen captures (or screen scraping), object character recognition, and pattern matching. - Referring now to
FIG. 4A , a block diagram depicts one embodiment of asystem 401, including a plurality ofroutines 410 for processing window information to obtain communication information for establishing and facilitating a communication session. In one embodiment, each routine within the plurality ofroutines 410 is assigned a priority. In another embodiment, each of the routines is executed sequentially and a routine with a higher priority executes before a routine with a lower priority. In still another embodiment, the routine with the highest priority is the windowhandler filter routine 405. - Referring now to
FIG. 4A , and in more detail, thesystem 401 includes a plurality ofroutines 410. In one embodiment, an execution of thesoftware 220 generates thesystem 401. In another embodiment, asystem 401 is provided within a virtual machine executing on thecomputing device 200. In still another embodiment, asystem 401 is provided by an execution of a software routine or software application executing on a network and in communication with other software routines, software applications, computing devices, and virtual machines also resident on the network. In yet another embodiment, thesystem 401 includes a single window handler routine 308 able to execute at least one sub-routines dedicated to executing window handler routines 308 configured to analyze and interpret window information. In some embodiments, asystem 401 includes a single routine able to execute multiple sub-routines, where each sub-routine is encapsulated in a plug-in software application. In one of these embodiments, the plug-in software application(s) may reside in any of the following locations: within thesoftware 220; within thecomputing device 200; on a network, such asnetwork 114; on a device located on the network; on a virtual machine on the network; in a storage repository accessible via the network; or any other local or remote location able to be accessed by an application or routine executing within thesystem 401. - In one embodiment, a plurality of
routines 410 is included within thesystem 401. In another embodiment, thesystem 401 includes a plurality ofroutines 410 where each routine can be any of the following: a software application, a software program, a set of commands, or any other collection of instructions able to receive and process input to generate a responsive output. In still another embodiment, the routines included within the plurality ofroutines 410 may be any of the above mentioned application specific window handlers 308 a, 308 b, and 308 c. - In one embodiment, the plurality of
routines 410 includes any of the above mentioned application specific window handlers 308 as well as a windowhandler filter routine 405. In another embodiment, the plurality ofroutines 410 includes both the above-mentioned application specific window handlers 308, a window handler routine, and other window handler routines able to utilize window information to obtain communication information and/or to determine an optimal method for obtaining communication information. - In some embodiments, the
system 401 includes a plurality ofroutines 410 where each routine is assigned a priority. Assignment of the priority can, in one of these embodiments, be a result of user input designating a priority scheme and further assigning a priority to each routine. In another of these embodiments, a priority scheme is used in which a priority assigned to eachwindow handler routine 410 is a result of at least one determination indicative of the necessity that a particular routine execute prior or subsequent to another routine included within the plurality ofroutines 410. For example, the system may de-prioritize a window handler routine 308 that captures data displayed in a region of a screen, applies a process for optical character recognition, and analyzes the OCR data for contact information, and the system may assign a higher priority level to a window handler routine implementing a more efficient process for identifying contact information. In such an embodiment, the at least one determination can be generated by any of the following: an arbiter application utilizing both system and routine information to determine a priority and further assign the determined priority to a routine; an application compiling system statistics to determine a priority and further assign the determined priority to awindow handler routine 410; an application able to receive user input indicative of a particular priority level and further assign that priority level to a user-specifiedwindow handler routine 410; a lookup table including identification information for eachwindow handler routine 410 and a table of priorities where identification information for eachwindow handler routine 410 is linked to a particular priority; a listing of eachwindow handler routine 410 where the list further dictates the priority level for eachwindow handler routine 410; or any other system, application, or data specific method of determining the priority level of awindow handler routine 410. In still another of these embodiments, a plurality ofwindow handler routine 410 include a windowhandler filter routine 405 having the highest priority level of anywindow handler routine 410 and subsequentwindow handler routine 410 are arbitrarily assigned priority levels. In still even another embodiment, the plurality ofwindow handler routine 410 includes a windowhandler filter routine 405 having a priority level that is higher than subsequentwindow handler routines 410. The priority level, in one embodiment, can be any of the following values: a numeric value; a percentage value; a value based on prior and subsequent routines in the chain of priorities; or any other value able to indicate a routines priority in relation to other routines included within a plurality ofwindow handler routine 410. - Referring now to
FIG. 4B , a system for efficient processing of data displayed by a window includes a window and a window handler filter routine. In brief overview, awindow 412 is displayed to a user of acomputing device 200. The windowhandler filter routine 405 obtains window identification information associated with thewindow 412. The windowhandler filter routine 405 prevents operation onapplication output data 320 displayed in thewindow 412, by a window handler routine, when the window identification information associated with the window represents a type of window listed within a list of types of window. - Referring now to
FIG. 4B , and in greater detail, the windowhandler filter routine 405, in one embodiment, is a routine that preempts the processing ofapplication output data 320 displayed by awindow 412. In another embodiment, the windowhandler filter routine 405 accesses a list of types of windows to determine whether thewindow 412 is a type of window that awindow handler routine 410 should analyze to determine whether theapplication output data 320 displays contact information. In still another embodiment, the list specifies a list of windows for which the system has determined that no analysis by awindow handler routine 410 is required; for example, a predefined list created by an administrator may specify which types of windows the administrator knows do not contain contact information. In some embodiments, the windowhandler filter routine 405 includes programming code containing the list. In other embodiments, the windowhandler filter routine 405 accesses a file containing the list. - In some embodiments, the window
handler filter routine 405 includes functionality for obtaining window identification information associated with the displayed window, the window identification information indicative of a type of the window. In one of these embodiments, the windowhandler filter routine 405 uses an application programming interface (API) provided by an operating system on thecomputing device 200 to request information associated with thewindow 412. - In one embodiment, the system includes a client agent identifying the window displayed to the user and executing the window handler filter routine responsive to the identification. In another embodiment, the client agent is the
client software 220. In still another embodiment, the client agent is in communication with theclient software 220. In yet another embodiment, the client agent includes a module using an API to query a resource—such as an application or operating system executing on thecomputing device 200—to retrieve window identification information. In some embodiments, upon determining that a resource executing on thecomputing device 200 has generated a window andapplication output data 320, the client agent executes at least one of the window handler routines 400 and the windowhandler filter routine 405. In other embodiments, the client agent transmits, to the windowhandler filter routine 405, the window identification information and receives, from the window handler filter routine, an indication that the window handler filter routine has analyzed the application output data to determine whether the application output data contains contact information. In further embodiments, a windowhandler filter routine 405 is implemented via an embodiment of the method illustrated inFIG. 5 . - Referring now to
FIG. 5A , a flow diagram depicts one embodiment of a method for efficient processing of data displayed by a window. In brief overview, the method includes identifying a window displayed to a user of a computing device (502). The method includes executing a window handler filter routine, responsive to the identification (504). The method includes obtaining, by the window handler filter routine, window identification information associated with the displayed window (506). The method includes preventing, by the window handler filter routine, operation, by a window handler routine, on application output data displayed in the window when the window identification information associated with the window represents a type of window listed within a list of types of windows (508). - Referring now to
FIG. 5A , and in greater detail, a window displayed to a user of a computing device is identified (502). In one embodiment, the windowhandler filter routine 405 identifies thewindow 412. In another embodiment, theclient software 220 identifies the window and transmits an identification of the window to the windowhandler filter routine 405. In still another embodiment, theclient software 220 identifies the window as described above in connection withFIGS. 3 and 4A . In some embodiments, and as described above, theclient software 220 determines that a pointing device connected to the computing device is substantially idle and that a representation of the pointing device is displayed within thewindow 412. In one of these embodiments, theclient software 220 identifies awindow 412 displayingapplication output data 320 and displaying a graphical representation of a pointing device, such ascursor 328, which theclient software 220 has determined is substantially idle. In other embodiments, theclient software 220 determines that an input/output device connected to the computing device is has focused on awindow 412. In still other embodiments, the determination that a pointing device or other input/output device is substantially idle is optional. In yet other embodiments, no determination is made and the window is identified via alternative mechanisms. In one of these embodiments, an operating system is queried to identify a window having window focus. - A window handler filter routine is executed, responsive to the identification (504). In one embodiment, the
client software 220 executes the windowhandler filter routine 405. In another embodiment, theclient software 220 executes the windowhandler filter routine 405 as described above in connection withFIGS. 3 and 4A . - The window handler filter routine obtains window identification information associated with the displayed window (506). In one embodiment, the window
handler filter routine 405 obtains the window identification information from theclient software 220. In another embodiment, the windowhandler filter routine 405 obtains the window identification information from a resource executing on thecomputing device 200, such as an operating system or an application; in such an embodiment, the windowhandler filter routine 405 may implement an API to query the resource and retrieve the identification. In still another embodiment, the windowhandler filter routine 405 obtains window identification information and determines a type of window associated with thewindow 412 responsive to an analysis of the window identification information. Additional embodiments of the obtained window identification information are described below in connection withFIG. 5B . - The window handler filter routine prevents operation, by at least one window handler routine, on application output data displayed in the window when the window identification information associated with the window represents a type of window listed within a list of types of windows (508). In one embodiment, the window
handler filter routine 405 includes the list of types of windows. In another of these embodiments, the windowhandler filter routine 405 accesses a file containing the list. In still another of these embodiments, the windowhandler filter routine 405 retrieves, from asecond computing device 200 b, a file containing the list. - In one embodiment, the window
handler filter routine 405 determines that the obtained window identification information identifies a type of window associated with thewindow 412. In another embodiment, the windowhandler filter routine 405 accesses the list of types of windows and determines whether the list enumerates the type of window identified by the window identification information. In still another embodiment, the windowhandler filter routine 405 determines that because the list enumerates the type of window associated with thewindow 412, nowindow handler routines 410 should analyze theapplication output data 320. In yet another embodiment, the list enumerates types of windows that do not contain contact information. - In some embodiments, the window
handler filter routine 405 transmits, to theclient software 220, an indication that the windowhandler filter routing 405 has analyzed theapplication output data 320 displayed by the window and determined that the data contains no contact information. In one of these embodiments, the windowhandler filter routine 405 transmits the indication although it has determined that no analysis should occur. In other embodiments, the windowhandler filter routine 405 identifies the type of window as a type not enumerated by the list. In one of these embodiments, the windowhandler filter routine 405 transmits, to a client agent, such as theclient software 220, an indication that the windowhandler filter routine 405 has not, or cannot, analyze theapplication output data 320. - Referring now to
FIG. 5B , a flow diagram depicts one embodiment of amethod 501 for implementing a window handler filter routine. In brief overview, window identification information is retrieved from an identified window (step 505). The retrieved window identification information is passed to the window handler filter routine (step 510). The window identification information is analyzed by the window handler filter routine (step 515), and a determination is made as to whether or not the window identification information should be processed by subsequent routines (step 515). When a determination is made that the window identification information should be further processed, the window identification information is sent to subsequent window handler routines (step 525). When a determination is made that the window identification information should not be processed any further, the window identification information is prevented from being processed by any subsequent window handler routines (step 530). - Referring now to
FIG. 5B , and in greater detail, window identification information is retrieved from an identified window (step 505). In some embodiments, the window identification information is retrieved by the window handler filter routine; in other embodiments, the window identification information is retrieved by another routine included within either of thesystem 401 or one of the plurality ofroutines 410. An identified window can be a graphical representation of an executing application displayed on the visual display device 224, where acursor 328 also present on the visual display device 224 has a coordinate position on the display device 224 that positions thecursor 328 in a substantially similar position to that of the window. In other words, the identified window is a window, displayed on the display device 224, over which thecursor 328 is positioned. Some embodiments determine the identified window via a mouse-over function that utilizes the position of acursor 328 on a display device to determine a “selected object.” In these embodiments, windows displayingapplication output data 320 are considered a “selected object” when thecursor 328 is positioned over the graphical display of the application window. Window identification information, in some embodiments, includes a window handle or other encapsulated data item able to relay information about a particular window. In other embodiments, window identification information includes any one or combination of the following data: window class information; window family information; window size information; window position information; window identification information; information regarding the application output data displayed within the window; window text information; window style information; parent window information; child window information; sibling window information; window identification number; window caption information; or other information pertinent to determining attributes of the window, attributes of the window indicative of the application executing and displaying data within the window, and/or attributes of related windows. Further embodiments may utilize the window identification information to determine a type of window; where the type of window may be determined based on the data included within the window identification information or the type of window may be identified by a value included within the window identification information. In embodiments where the type of window may be a value included within the window identification information, the type of window may be an attribute of the window defined by the operating system, an attributed defined by the application generating the application output data displayed within the window, or an attribute assigned by a routine associated with the windowhandler filter routine 405. - In one embodiment, the window identification information is passed to the window handler filter routine (step 510). In another embodiment, the window identification information is passed to the window
handler filter routine 405. In still another embodiment, the windowhandler filter routine 405 retrieves the window identification information (step 505), and so there is no need for another component to pass the window identification information to the window handler filter routine 405 (step 510). Transmission of the window identification information to the window handler filter routine 405 (step 510) can, in some embodiments, be carried out by a separate routine or software application executing within or in conjunction with thesystem 401. - The window identification information is, in some embodiments, analyzed by the window handler filter routine (step 515) to determine whether or not the window identification information should be sent to subsequent window handler routines for processing (step 520). Analyzing the window identification information can include analyzing any of the following information: a window caption; information regarding the application output data displayed within the window; a window identification number; a window handle; information regarding related windows; a window class name; or any of the above-mentioned information. Determination as to whether or not the
application output data 320 displayed within the window should be processed, can, in some embodiments, be made by comparing any of the above-mentioned window identification information data types to an empirically determined listing of corresponding types of windows. In such an embodiment, the empirically determined information can be hard coded into the windowhandler filter routine 405, the information could be stored in a database or lookup table, or the information could be listed as an aspect of a policy table. In these embodiments, the determination not to process theapplication output data 320 displayed within the window is made because the window identification information indicates that there is a low likelihood that the application output data will include communication information, such ascontact information 324. A low likelihood can be characterized as a likelihood calculation and further determination that the calculated value is below a predetermined threshold, or the likelihood could be an absolute determination that the window identification information indicates that theapplication output data 320 will not contain communication information, such ascontact information 324. In some embodiments, the determination not to process theapplication output data 320 displayed within the window is made by comparing the retrieved window identification information with a listing of allowed window types and/or allowed window attributes. In one of these embodiments, and as described in greater detail below in connection withFIGS. 6 and 7 , this listing can be dynamically generated by the system. - When, in some embodiments, it is determined that the window identification information should be processed, the window identification information is sent to subsequent window handler routines (step 525). Each window handler routine will determine whether or not, based on the window identification information, that window handler routine may process the
application output data 320 displayed within the window. The window identification information will continue to be passed to subsequentwindow handler routines 410 until a routine 410 is identified that include functionality for processing theapplication output data 320. In the event that nowindow handler routine 410 is found, a default routine will be called to process theapplication output data 320. - When, in some embodiments, it is determined that the window identification information should not be processed, further processing will be prevented (step 530). In such embodiments, the window identification information will not be passed to subsequent
window handler routines 410 when it is determined that there is a low likelihood that the identified window displaysapplication output data 320 that contains communication data. One example of this includes an attempt to retrieve window identification information from a window displaying a MICROSOFT OUTLOOK calendar. In this example, window identification information indicates that the application output data displayed is application output data related to a MICROSOFT OUTLOOK calendar object. The windowhandler filter routine 405 analyzes this information to determine whether or not a window displaying calendar application data should be searched for communication data. Based on comparison information, the windowhandler filter routine 405 determines that, in this example, the window displaying application output data generated by the MICROSOFT OUTLOOK calendar object should not be searched and the window identification information related to that window is not passed to subsequent window handler routines. In other words, the windowhandler filter routine 405 responds to the determination that the window displaying the calendar application data does not include communication data by preventing further processing of the application output data within the MICROSOFT OUTLOOK calendar window. - As described above in connection with
FIGS. 3-5 , theclient software 220 may access each of a plurality ofwindow handler routines 410 according to a priority level assigned to each of the plurality ofwindow handler routines 410 and requests of eachwindow handler routines 410 an indication as to whether thewindow handler routines 410 can analyzeapplication output data 320 to determine whether theapplication output data 320 containscontact information 324. In one embodiment, the priority level assigned to the windowhandler filter routine 405 is the highest priority level and theclient software 220 requests the indication from the windowhandler filter routine 405 before making the request of any otherwindow handler routines 410. In another embodiment, if the windowhandler filter routine 405 responds with an indication that the windowhandler filter routine 405 cannot perform the analysis of theapplication output data 320, theclient software 220 proceeds to make the request of each of the remainingwindow handler routines 410 until one of thewindow handler routines 410 responds with an indication that it can analyze theapplication output data 320 and determined whether thecontact information 324. In still another embodiment, if the windowhandler filter routine 405 responds with an indication that the windowhandler filter routine 405 can perform the analysis and that nocontact information 324 is displayed in thewindow 412, theclient software 220 does not proceed to make the request of any of the otherwindow handler routines 410. In yet another embodiment, therefore, if user is aware that a particular type ofwindow 412 does not typically containcontact information 324, the user may add an identification of the type of window to the list accessed by the windowhandler filter routine 405, which can then identify whether a particular window has that type and indicate to the client software 22 that nocontact information 324 is displayed, preventing analysis by any of the otherwindow handler routines 410 of a window known not to include contact information. In some embodiments, therefore, the methods and systems described herein provide an improved process for determining whether a window contains contact information and avoid unnecessary analysis of windows known not to contain contact information. - In some embodiments, the window
handler filter routine 405 accesses a list to determine whether or not to prevent operation on data displayed by a window. In one of these embodiments, the list is predetermined in that a programmer, administrator or other user of the systems and methods described herein identifies a type of window that does not contain, or is not likely to contain, contact information. In another of these embodiments, and by way of example, although a type of window, such as a window displaying a preview of a calendar month generated and displayed by a calendar application, may contain numbers and other data that awindow handler routine 410 may identify as contact information and thatclient software 220 may display in a user interface element for establishing a telecommunications session (for example a window from which a user can initiate a telephone call to the number displayed), a human user of the systems and methods described herein may identify the displayed information not as a phone number but as a numerical representation of a date and, therefore, not interact with the user interface element. By manually directing the placement of an identification of the type of window on a list of types of windows filtered by the windowhandler filter routine 405, users of the methods and systems described herein may prevent unnecessary analysis of the data displayed by the window. In other embodiments, however, the list is predetermined in that a system is provided for automatically generating the list of filtered windows for use by the windowhandler filter routine 405. - Referring now to
FIG. 6 , a block diagram depicts one embodiment of a system for identifying a window lacking communications data relevant to a user of a computing device. In brief overview, a system for identifying a window lacking communications data relevant to a user of a computing device includes aclient agent 220 and ananalysis component 602. Theclient agent 220—which may be provided as part ofclient software 220 described above in connection with FIGS. 2-5—includes a windowhandler filter routine 405 and awindow handler routine 410. The windowhandler filter routine 405 generates an identification of each of a plurality of windows displayed to a user of a computing device. Thewindow handler routine 410 generates an indication of whether each of the plurality of windows displays contact information to the user. Theclient agent 220 generates an indication of whether the user interacted with the information displayed by each of the plurality of windows. Theanalysis component 602 analyzes, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information. Theanalysis component 602 generates an enumeration of window identification information for at least one filtered window. - Referring now to
FIG. 6 , and in greater detail, a windowhandler filter routine 405 within theclient agent 220 generates an identification of each of a plurality of windows displayed to a user of a computing device 106. In one embodiment, the windowhandler filter routine 405 determines whether awindow 412 should be analyzed by determining whether thewindow 412 is a type of window included in an enumeration of filtered windows, as described above in connection withFIGS. 4-5 . In another embodiment, the windowhandler filter routine 405 determines that thewindow 412 is not of a type included in the enumeration of filtered windows and indicates, to theclient agent 220 that data displayed by thewindow 412 should be analyzed by awindow handler 410. For example, in still another embodiment, by responding to theclient agent 220 request for analysis of thedata 320 displayed by the window with a message indicating that theanalysis component 602 cannot process thedata 320, thewindow handler filter 405 has indicated that awindow handler 410 should be called to process thedata 320. In some embodiments, when the windowhandler filter routine 405 indicates to theclient agent 220 thatapplication output data 320 a in awindow 412 a should be analyzed, the windowhandler filter routine 405 also transmits, to theanalysis component 602, window identification information for thewindow 412 a. In other embodiments, when the windowhandler filter routine 405 indicates to theclient agent 220 thatapplication output data 320 a in awindow 412 a should be analyzed, theclient agent 220 transmits, to theanalysis component 602, window identification information for thewindow 412 a. - As described above, the
window handler routine 410 receives a request to analyzeapplication output data 320 and determines whether awindow 412displays contact information 324. In one embodiment, thewindow handler routine 410 is in communication with theanalysis component 502 and transmits, to theanalysis component 602, an identification of whether it has identified information that may constitutecontact information 324. - As described above, in embodiments in which the
client agent 220 has identified a window displayed to a user of a computing device 106 and in which the windowhandler filter routine 405 has determined that the data displayed by thewindow 412 should be analyzed by awindow handler routine 410, and in which thewindow handler routine 410 has determined that theapplication output data 320 may containcontact information 324, theclient agent 220 may generate a user interface element allowing a user to initiate a telecommunications session with an entity associated with thecontact information 324. In one of these embodiments, theclient agent 220 may include a component for monitoring whether the user interacts with the user interface element to initiate the telecommunications session. In another of these embodiments, theclient agent 220 transmits, to theanalysis component 602, an indication of whether or not the user initiated the telecommunications session. - The
analysis component 602 analyzes, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information. In one embodiment, based upon the analysis, theanalysis component 602 determines whether or not users initiated telecommunications sessions with data identified as contact information. In another embodiment, therefore, theanalysis component 602 evaluates the accuracy of the determinations made by the windowhandler filter routine 405 and thewindow handler routine 410. In still another embodiment, theanalysis component 602 generates an enumeration of window identification information for at least one filtered window. In some embodiments, theanalysis component 602 determines that the windowhandler filter routine 405 identified data as appropriate for analysis by awindow handler 410 and thewindow handler 410 identified the data as containingcontact information 324 but, when presented to a user, the user chose not to contact an entity associated with thecontact information 324. In one of these embodiments, theanalysis component 602 applies at least one heuristic to at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information in determining whether to filter at least one of the plurality of windows. In another of these embodiments, by collecting the indications of determinations by the windowhandler filter routine 405, thewindow handler 410 and theclient agent 220 and applying heuristics, algorithms or other artificial intelligence to the collected data, theanalysis component 602 identifies types of windows that do not typically display contact information used by users to initiate telecommunications systems and to prevent analysis on these types of windows for subsequently-displayed windows having these types. In still another of these embodiments, theanalysis component 602 transmits the enumeration to the windowhandler filter routine 405 for use in subsequent evaluations of windows. - Referring now to
FIG. 7 , a flow diagram depicts one embodiment of a method for identifying a window lacking communications data relevant to a user of a computing device. The method includes receiving an identification of each of a plurality of windows displayed to a user of a computing device (702). The method includes receiving an indication of whether each of the plurality of windows contains contact information displayed to the user (704). The method includes receiving an indication of whether the user interacted with the information displayed by each of the plurality of windows (706). The method includes analyzing, for each of the plurality of windows, the received indication of whether the user interacted with the displayed information, the received indication of whether each of the plurality of windows contains contact information displayed to the user, and the received identification of each of the plurality of windows (708). The method includes generating an enumeration of window identification information for at least one filtered window (710). - Referring now to
FIG. 7 , and in greater detail, theanalysis component 602 receives an identification of each of a plurality of windows displayed to a user of a computing device (702). In one embodiment, theanalysis component 602 receives the identification from the windowhandler filter routine 405. In another embodiment, theanalysis component 602 receives the identification after the windowhandler filter routine 405 has determined that thedata 320 displayed by the window should by analyzed by awindow handler routine 410. In still another embodiment, theanalysis component 602 receives the identification from theclient agent 220. - In one embodiment, the
analysis component 602 receives information associated with each of the plurality of windows. In another embodiment, theanalysis component 602 receives an identification of a window type associated with at least one window in the plurality of windows. In still another embodiment, theanalysis component 602 receives an identification of an ancestor window of at least one window in the plurality of windows. In still even another embodiment, theanalysis component 602 receives an identification of a descendant window of at least one window in the plurality of windows. In still another embodiment, theanalysis component 602 receives an identification of a sibling window of at least one window in the plurality of windows. In another embodiment, theanalysis component 602 receives an identification of a type of class of at least one window in the plurality of windows. In yet another embodiment, theanalysis component 602 receives caption data associated with at least one window in the plurality of windows. In some embodiments, theanalysis component 602 receives window identification information as described above inFIGS. 3-6 . - The
analysis component 602 receives an indication of whether each of the plurality of windows contains contact information displayed to the user (704). In one embodiment, theanalysis component 602 receives the indication from thewindow handler routine 410. In another embodiment, theanalysis component 602 receives the indication from theclient agent 220. In still another embodiment, theanalysis component 602 receives the indication from aparser 312 executing in theclient agent 220. - In one embodiment, the
analysis component 602 receives an identification of a telephone number displayed to the user. In another embodiment, theanalysis component 602 receives an identification of a number associated with a facsimile machine is displayed to the user. In still another embodiment, theanalysis component 602 receives an identification of an electronic mail address displayed to the user. In yet another embodiment, theanalysis component 602 receives an identification that no contact information is displayed to the user. - In some embodiments, the
analysis component 602 receives an indication that thewindow handler 410 has identified information within theapplication output data 320 that may or may not constitutecontact information 324. In one of these embodiments, aparser 312 analyzes the information to determine whether or not the data is contact information. In another of these embodiments, theparser 312 transmits a determination to theanalysis component 602 as to whether or not thedata 320 is or containscontact information 324. In still another of these embodiments, theparser 312 is unable to determine whether thedata 320 is or containscontact information 324. - The
analysis component 602 receives an indication of whether the user interacted with the information displayed by each of the plurality of windows (706). In one embodiment, theclient agent 220 generates a user interface element displaying information retrieved from one of the plurality of windows and allowing a user to initiate a telecommunications session. In another embodiment, the user interface includes an element such as a hyperlink, which the user may select to initiate the telecommunications session. In still another embodiment, theclient agent 220 monitors the user interface element to determine whether or not the user interacts with the user interface element (for example, by using an input/output device to select the hyperlink). In some embodiments, theclient agent 220 terminates display of the user interface element. In one of these embodiments, theclient agent 220 determines, responsive to the monitoring of the user interface element, that the user has not interacted with the user interface element within a period of time; for example, theclient agent 220 may have received or include an identification of a predetermined threshold of time, determine that a user has not interacted with the user interface element within the period of time, and remove the user interface element from display. In another of these embodiments, theclient agent 220 determines that the user is interacting with a different user interface element—for example, adifferent window 412—and remove the user interface element from display. In embodiments in which theclient agent 220 determines that the user has not interacted with the user interface element, theclient agent 220 may transmit an identification of that lack of interaction to theanalysis component 602. - The
analysis component 602 analyzes, for each of the plurality of windows, the received indication of whether the user interacted with the displayed information, the received indication of whether each of the plurality of windows contains contact information displayed to the user, and the received identification of each of the plurality of windows (708). In one embodiment, theanalysis component 602 applies at least one heuristic to the received indication of whether the user interacted with the displayed information. In another embodiment, theanalysis component 602 applies at least one heuristic to the received indication of whether each of the plurality of windows contains contact information displayed to the user. In still another embodiment, theanalysis component 602 applies at least one heuristic to the received indication of each of the plurality of windows. In some embodiments, theanalysis component 602 determines, responsive to the analysis, that a type of window does not display contact information relevant to a user. - The
analysis component 602 generates an enumeration of window identification information for at least one filtered window (710). In one embodiment, theanalysis component 602 generates statistical data during the implementation of the methods and systems described above. In another embodiment, theanalysis component 602 processes the statistical data to generate data representative of window attributes characteristic of a window that does not contain communication data in the displayedapplication output data 320. In still another embodiment, theanalysis component 602 processes the statistical data to generate data representative of window attributes characteristic of a window that does not contain communication data that should be displayed to the user; for example, because the number is not relevant to the user or because the user is unlikely to use the number to initiate a telecommunications session. - The statistical data can, in some embodiments, include data generated when a success or failure condition occurs. In one of these embodiments, a failure condition occurs when the methods and systems are implemented to retrieve communication data from an identified window and the application output data displayed in the window does not include communication data. In another of these embodiments, a failure condition occurs when data identified as communication data is displayed to a user in a user interface element allowing the user to initiate a telecommunications session (such as a telephone call, facsimile transmission, voice over Internet Protocol call, web conference, or other session) but the user chooses not to initiate such a sessions; for example, the user may determine that the displayed data is not contact information. In still another of these embodiments, a success condition occurs when the methods and systems described above are implemented to retrieve communication data from an identified window and the application output data displayed in the window does include communication data and the user interacts with the user interface element displaying the communication data to initiate a telecommunications session. In yet another of these embodiments, the user initiates a telecommunications session, but only after modifying the displayed data; such a situation may be categorized as a failure or a success or as an intermediate condition. Any combination of statistical data can be combined or separated to provide indicators as to which windows will contain communication data.
- In some embodiments, the
analysis component 602 may determine whether or not a particular window should be searched by employing methods such as those that: implement learning algorithms able to use gathered information and make future decisions based on previously generated statistical data; autonomous algorithms that react based in part on gathered information, where the autonomous algorithms vary in their interaction with presently generated information based on past information; and algorithms that compile prior statistical information regarding the searching of application output data and further make decisions about future information input based on patterns, information, or other informational indicators within the gathered statistical information. In further embodiments, theanalysis component 602 provides, to the windowhandler filter routine 405, the generated enumeration of window identification information for at least one filtered window. - In one embodiment, by determining whether or not a user is likely to use the information displayed in a particular type of window, the
analysis component 602 can prevent unnecessary analysis of windows for which no user interaction is likely to occur. In another embodiment, theanalysis component 602 improves the performance of the system and allows the window handler filter routine to more effectively prevent operation on windows of a type not likely to contain contact data or other data prompting a user to initiate a telecommunications session. - Referring now to
FIG. 8 , a block diagram depicts one embodiment of a system for identifying a process for analyzing data displayed by a window to a user of a computing device. In brief overview, the system includes a windowhandler filter routine 405 and awindow handler 410. The windowhandler filter routine 405 receives window identification information associated with awindow 812 a displayed to a user of a computing device, thewindow 812 a associated with a first type of window. The windowhandler filter routine 405 determines whether awindow handler routine 410 executing on the computing device includes functionality for analyzing data displayed by thewindow 812 a associated with the first type of window. Thewindow handler routine 410 receives the window identification information and applies, to thewindow 812 a associated with the first type of window, a process for determining whether awindow 812 b associated with a second type of window displays contact information. - Referring now to
FIG. 8 , and in greater detail, the windowhandler filter routine 405 receives window identification information associated with awindow 812 a displayed to a user of acomputing device 200, thewindow 812 a associated with a first type of window. In one embodiment, the type of the window 812 may refer to a type of resource—such as an application executing on thecomputing device 200—that generates the window. In another embodiment, the windowhandler filter routine 405 receives the window identification information from aclient agent 220. In another embodiment, the windowhandler filter routine 405 implements an applications programming interface to query an operating system executing on thecomputing device 200 to retrieve window identification window associated with a window 812; for example, theclient agent 220 may indicate to the windowhandler filter routine 405 that a resource executing on thecomputing device 200 has displayed anew window 812 a and the windowhandler filter routine 405 may query the operating system to retrieve additional information associated with the window 812. In still another embodiment, the windowhandler filter routine 405 provides the functionality described above in connection withFIGS. 4-7 . In some embodiments, the system includes aclient agent 220 transmitting, to the windowhandler filter routine 405, the window identification information; theclient agent 220 may be aclient agent 220 orclient software 220 as described above in connection withFIGS. 3-7 . - The window
handler filter routine 405 determines whether awindow handler routine 410 executing on thecomputing device 200 includes functionality for analyzingapplication output data 320 a displayed by thewindow 812 a associated with the first type of window. In one embodiment, the windowhandler filter routine 405 identifies a type for thewindow 812 a. In another embodiment, the windowhandler filter routine 405 identifies the type of window by analyzing the received window identification information. In still another embodiment, the windowhandler filter routine 405 includes functionality for identifying the type of the window as described above in connection withFIGS. 4-5 . In some embodiments, to determine whether the system includes awindow handler routine 410 capable of processingapplication output data 320 a displayed by awindow 812 a associated with a first type of window, the windowhandler filter routine 405 accesses a mapping between a plurality of types of window and ofwindow handler routines 405 providing functionality for analyzing each of the plurality of types of window. In one of these embodiments, and by way of example, the windowhandler filter routine 405 accesses a mapping indicating that a window handler routine 410A provides functionality for determining whether application output data displayed in awindow 812 a generated by a word processing application contains contact information, while a window handler routine 410B provides functionality for determining whether application output data displayed in awindow 812 b generated by a spreadsheet application contains contact information. In other embodiments, the windowhandler filter routine 405 accesses a mapping indicating that nowindow handler routine 410 provides functionality for determining whether application output data displayed in awindow 812 a contains contact information. In one of these embodiments, the windowhandler filter routine 405 may prevent operation on thewindow 812 a, as described above in connection withFIGS. 5-6 . In another of these embodiments, and as described in greater detail below, the windowhandler filter routine 405 may identify an alternatewindow handler routine 410 for determining whether application output data displayed in awindow 812 a contains contact information. In further embodiments, and by way of example, a mapping may include a file, table, database, or other data structure indicating whether awindow handler routine 410 provides functionality for analyzingapplication output data 320 for a window of a particular type. In one of these embodiments, by way of example, and without limitation, the mapping may include information such as the following: -
Window Identification Type of Window Substitute Window Information Window Handler Handler? Process ID = Browser Window N/A OUTLOOK.EXE window Handler 410A Window Class ID = Window None Window handler RichEdit20WPT field 410B for processing RichEdit20A fields Top-level ID = Parent None None - prevent RCTRL_RENWND32 Window operation on window - In some embodiments, the window
handler filter routine 405 accesses a first mapping to identifysubstitute window handlers 410 and accesses a second mapping to identify windows for which the windowhandler filter routine 405 should prevent operation. In other embodiments, a first windowhandler filter routine 405 determines whether to prevent operation on a window while a second windowhandler filter routine 405 determines whether to direct awindow handler routine 410 to analyze awindow 812 a associated with a first type of window, thewindow handler routine 410 providing functionality for determining whether awindow 812 b associated with a second type of window displays contact information. - The
window handler routine 410 receives the window identification information. In one embodiment, thewindow handler routine 410 is in communication with theclient agent 220 and the windowhandler filter routine 405. In one embodiment, thewindow handler routine 410 includes a receiver receiving, from the windowhandler filter routine 405, a direction to apply, to the window associated with the first type of window, the process for determining whether a window associated with a second type of window displays contact information. Thewindow handler routine 410 applies, to thewindow 812 a associated with the first type of window, a process for determining whether awindow 812 b associated with a second type of window displays contact information. In still another embodiment, theclient agent 220 generates at least one user interface displaying an interface element for initiating a telecommunications session based on identified contact information displayed by thewindow 812 a associated with the first type of window. - Referring now to
FIG. 9 , a block diagram depicts one embodiment of a method for identifying a process for analyzing data displayed by a window to a user of a computing device. In brief overview, the method includes receiving window identification information associated with a window displayed to a user of a computing device, the window associated with a first type of window (902). The method includes determining whether a window handler routine executing on the computing device includes functionality for analyzing data displayed by the window associated with the first type of window (904). The method includes directing the window handler routine to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information (906). - The method includes receiving window identification information associated with a window displayed to a user of a computing device, the window associated with a first type of window (902). In one embodiment, the window
handler filter routine 405 receives the window identification information. In another embodiment, the windowhandler filter routine 405 receives an identification of a window type of awindow 812 a. In still another embodiment, the windowhandler filter routine 405 receives an identification of an ancestor window of thewindow 812 a. In still even another embodiment, the windowhandler filter routine 405 receives an identification of a descendant window of thewindow 812 a. In still another embodiment, the windowhandler filter routine 405 receives an identification of a sibling window of thewindow 812 a. In another embodiment, the windowhandler filter routing 405 receives an identification of a type of class of the window. In yet another embodiment, the windowhandler filter routine 405 receives an identification of caption data displayed by the window. In some embodiments, the windowhandler filter routine 405 receives the window identification information from theclient agent 220. In other embodiments, the windowhandler filter routine 405 uses an application programming interface to query an operating system executing on thecomputing device 200 for the window identification information. - The method includes determining whether a window handler routine executing on the computing device includes functionality for analyzing data displayed by the window associated with the first type of window (904). In one embodiment, the window
handler filter routine 405 determines that thewindow handler routine 410 does provide functionality for analyzing data displayed by the window associated with the first type of window. In this embodiment, the windowhandler filter routine 405 may execute thewindow handler routine 410 to analyze displayedapplication output data 320. Alternatively, the windowhandler filter routine 405 may direct theclient agent 220 to execute thewindow handler routine 410. In some embodiments, the windowhandler filter routine 405 determines that thewindow handler routine 410 does not include provide functionality for analyzing data displayed by the window associated with the first type of window. In one of these embodiments, the windowhandler filter routine 405 determines that none of a plurality ofwindow handler routine 410 provide functionality for analyzing data displayed by the window associated with the first type of window; in such an embodiment, the windowhandler filter routine 405 may prevent operation on the window as described above in connection withFIGS. 4-7 . In another of these embodiments, the windowhandler filter routine 405 determines that although none of a plurality ofwindow handler routine 410 provide functionality for analyzing data displayed by the window associated with the first type of window, at least onewindow handler routine 410 provides functionality for analyzing data displayed by awindow 812 b of a second type and that the process for analyzing data of displayed by awindow 812 b of a second type may be applied to analyze data displayed by awindow 812 a of a first time. - The method includes directing the window handler routine to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information (906). In one embodiment, the
window handler routine 410 receives an instruction, from theclient agent 220, to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information. In another embodiment, thewindow handler routine 410 receives an instruction, from the windowhandler filter routine 405, to apply to the window associated with the first type of window a process for determining whether a window associated with a second type of window displays contact information. - In one embodiment, the
window handler routine 410 determines, responsive to the applied process, that the window displays contact information to the user. In another embodiment, thewindow handler routine 410 determines, responsive to the applied process, that the window displays a telephone number to the user. In still another embodiment, thewindow handler routine 410 determines, responsive to the applied process, that the window displays a facsimile number to the user. In still even another embodiment, thewindow handler routine 410 determines, responsive to the applied process, that the window displays an email address to the user. In yet another embodiment, thewindow handler routine 410 determines, responsive to the applied process, that the window does not display contact information to the user. In some embodiments, thewindow handler routine 410 provides, to theclient agent 220, an indication of whether thewindow 812 adisplays contact information 324 to the user. In other embodiments, and as described above in connection withFIGS. 3-7 , if theclient agent 220 receives an indication that the window 812displays contact information 324 to the user, theclient agent 220 generates and displays to a user at least one user interface displaying an interface element for initiating a telecommunications session based on identified contact information displayed by the window associated with the first type of window. - In some embodiments, the methods and systems described herein provide functionality for analyzing data displayed to a user of a computing device. In one of these embodiments, the methods and systems described herein provide this functionality even in situations in which the
window handler routines 410 provided by the system do not include functionality for analyzing data displayed by a window of the type displaying the data for analysis. In another of these embodiments, by identifying an alternatewindow handler routine 410 for analyzing window data displayed in a window having a previously—unsupported type, the systems and methods described herein provide additional functionality and flexibility, supporting a wider range of types of windows displaying different types of data or data in differing formats without requiring the generation of customized software to analyze each of the different types of windows. - The methods and systems described above provide functionality for analyzing data generated by a resource executing in a first operating system and displayed by the first operating system. In some embodiments, however, the methods and systems described herein also provide functionality for analyzing data generated by a resource executing in a first operating system and displayed by a second operating system. In one of these embodiments, the methods and systems described herein include at least one interface providing mechanisms for communication between a first resource executing in the first operating system and a second resource executing in the second operating system.
- Referring now to
FIG. 10A , a block diagram depicts one embodiment of a system for providing, to a first application executed by a first operating system on a first computing device, an interface for communicating with at least one application executed by a second operating system on a second computing device. In brief overview, the system includes acomputing device 200 a, acomputing device 200 b, afirst interface 1002 between aclient agent 220 and at least one remote machinewindow handler routine 1010, aninterface 1030 between the at least one remotemachine window handler 1010 and theclient agent 220, aremote application 1032, and awindow 1012 displaying, on thecomputing device 200 a, remotely-generated application output data 1020. Thefirst interface object 1002, executed by a first operating system, provides a mechanism for external communication with afirst application 220 executed by the first operating system, and receiving an identification of awindow 1012 displayed by the first operating system and generated by asecond application 1032 executed by a second operating system. The at least one remotemachine window handler 1010 executed by the second operating system includes a receiver receiving a request from thefirst interface object 1002 via asecond interface object 1030 executed by the second operating system and providing a mechanism for external communication with the at least onewindow handler routine 1010. The at least one remotemachine window handler 1010 includes an analysis engine analyzing data displayed in thewindow 1012. The at least one remotemachine window handler 1010 includes a transmitter sending to thefirst interface object 1002 via thesecond interface object 1030 an identification ofcontact information 1024 displayed by thewindow 1012. - Referring now to
FIG. 10A , and in greater detail, thefirst interface object 1002 executed by a first operating system on acomputing device 200 a, provides a mechanism for external communication with afirst application 220 executed by the first operating system, and receives an identification of awindow 1012 displayed by the first operating system and generated by asecond application 1032 executed by a second operating system on asecond computing device 200 b. In one embodiment, thefirst interface object 1002 is a proxy for awindow handler routine 1010 executing on thecomputing device 200 b. In another embodiment, thefirst interface object 1002 is a plug-in to thefirst application 220. - In one embodiment, the
first application 220 is aclient agent 220 orclient software 220 as described above in connection withFIGS. 2-9 . In another embodiment, thefirst application 220 interacts with thefirst interface object 1002 as if thefirst interface object 1002 were awindow handler routine 410. In still another embodiment, thefirst interface object 1002 provides an interface between aclient agent 220 executing on thecomputing device 200 a and awindow handler routine 1010 executing on thecomputing device 200 b. - In some embodiments, the
client agent 220 includes an analysis component, such as theparser 312 described above. In one of these embodiments, the analysis component confirms that data identified by thewindow handler routine 1010 is contact information. In another of these embodiments, the analysis component executes on the first operating system of thecomputing device 200 a and is in communication with thefirst interface object 1002. In still another of these embodiments, the analysis component receives the contact information identified by thewindow handler routine 1010 and transmits, to thefirst application 220 confirmation that the data displayed by the identified window includes contact information. In yet another of these embodiments, the analysis component transmits to thefirst application 220 an indication that the data displayed by the identified window does not include contact information. In other embodiments, thefirst application 220 generates a user interface displaying the identifiedcontact information 1024. - In one embodiment, the at least one
window handler routine 1010 includes a receiver receiving a request from the first interface object via a second interface object. In another embodiment, the receiver receives an identification of awindow 1012 displayed on thecomputing device 200 a and generated by aremote application 1032 executing on thecomputing device 200 b. In still another embodiment, the receiver receives a request to analyzeapplication output data 1024 to determine whether or not thewindow 1012 displays anycontact information 1024. In still even another embodiment, the at least onewindow handler routine 1010 includes an analysis engine analyzing application output data 1020 to determine whether thewindow 1012 displays anycontact information 1024. The analysis engine may analyze the data to make the determination as described above in connection withFIGS. 4-9 . In yet another embodiment, the at least onewindow handler routine 1010 sends, to thefirst interface object 1002, via thesecond interface object 1030, an identification ofcontact information 1024 displayed by thewindow 1012. In other embodiments, the at least onewindow handler routine 1010 sends, to thefirst interface object 1002, via thesecond interface object 1030, an indication that thewindow 1012 does not displaycontact information 1024. - In one embodiment, the at least one
window handler routine 1010 executing on thecomputing device 200 b provides functionality such as that provided by the windowhandler filter routine 405 described above in connection withFIGS. 3-9 . In another embodiment, the at least onewindow handler routine 1010 is in communication with an analysis component executing on thecomputing device 200 b and providing functionality such as that provided by theanalysis component 602 described above. In still another embodiment, the at least onewindow handler routine 1010 executing on thecomputing device 200 b is a plug-in module interacting with thesecond interface object 1030 as if thesecond interface object 1030 were aclient agent 220. In still even another embodiment, thesecond interface object 1030 provides the at least onewindow handler routine 1010 with a mechanism for communicating with theclient agent 220. - Referring now to
FIG. 10B , a block diagram depicts one embodiment of a system in which two interface objects provide mechanisms for external communication between a plurality applications. In one embodiment, thefirst interface object 1002 provides other objects, such as thesecond interface object 1030 and a second (“program B”) executing on the second operating system B, with a mechanism for communicating with a first program (“program A”) on the first operating system A. In another embodiment, thefirst interface object 1002 provides proxying functionality on behalf of the first program. - In some embodiments, the
first interface object 1002 receives a request from program A—for example, for analysis ofapplication output data 1024—and transmits the request to thesecond interface object 1030. In one of these embodiments, thesecond interface object 1030 transmits the request to one or more resources executing in the second operating system for processing. In another of these embodiments, the resources arewindow handler filters 1010 and thesecond interface object 1030 provides the functionality of aclient agent 220, identifying at least one of a plurality ofwindow handler filter 1010 to analyze data in an identified window, as described above in connection withFIGS. 4-9 . - In one embodiment, program B generates data for transmission to program A, transmits the data to the
second interface object 1030, which transmits the data to thefirst interface object 1002, which transmits the data to program A. In some embodiments, program B is unaware that thesecond interface object 1030 is not program A. In other embodiments, program A is unaware that thefirst interface object 1002 has not generated the data received by program A. - In some embodiments, the
first interface object 1002 remains unaware of the resource (such as program B) or resources (such as a plurality of window handler routines 1010) that provide the processing of the request and interacts only with thesecond interface object 1030. In other embodiments, program A remains unaware that thefirst interface object 1002 did not process the request to generate the response or that resources executed by other operating systems (such as program B, or a plurality of window handler routines 1010). In still other embodiments, the program B remains unaware that thesecond interface object 1030 is not aclient agent 220 or the originator of the request for processing. In further embodiments, a first resource is unaware that a second resource with which the first resource interacts is a proxy for a third resource because the second resource provides access to the same resources or functionality as the third resource. - In some embodiments, the
first interface object 1002 and thesecond interface object 1030 establish a communications channel between the operating systems. In one of these embodiments, thefirst interface object 1002 and thesecond interface object 1030 communicate over a virtual channel. In another of these embodiments, thefirst interface object 1002 and thesecond interface object 1030 communicate over a channel according to a presentation layer protocol. In still another of these embodiments, a separate component establishes a presentation layer protocol channel such as a virtual channel and thefirst interface object 1002 and thesecond interface object 1030 communicate over the presentation layer protocol channel. In other embodiments, thefirst interface object 1002 and thesecond interface object 1030 communicate over any of thenetworks FIGS. 1 , 2A, and 2B. - Referring now to
FIG. 10C , a block diagram depicts one embodiment of a system for providing, to a first application executed by a first operating system on a computing device, an interface for communicating with at least one application executed by a second operating system on the computing device. As described in connection withFIGS. 10A and 10B , thefirst interface object 1002 and thesecond interface object 1030 each execute in different operating systems and communicate across the operating systems to provide interfaces for two programs, such as aclient agent 220 and awindow handler routine 1010. Although depicted inFIG. 10A as executing on two different computing devices, in some embodiments, and as depicted inFIG. 10C , thefirst interface object 1002 and thesecond interface object 1030 may execute on different operating systems provided by a single computing device. Thecomputing device 200 may execute both afirst operating system 1040 and asecond operating system 1050. In one embodiment, thefirst operating system 1040 is a different operating system than thesecond operating system 1050. In another embodiment, thefirst operating system 1040 is a different instance of the same operating system instantiated by thesecond operating system 1050. In still another embodiment, each of theoperating systems first operating system 1040 and a second virtual machine 1070 may execute thesecond operating system 1050. In some embodiments, a hypervisor is provided to manage the virtual machines. In other embodiments, each of theoperating systems - In some embodiments, a user of the
computing device 200 views a display of data generated by thefirst operating system 1040 separately from a display of data generated by thesecond operating system 1050. In one of these embodiments, for example, only one display device 224 is provided and the display device 224 displays only the output data generated by one of the operating systems executed by thecomputing device 100. In another of these embodiments, multiple display devices 224 a-n are provided, each of which displays, separately, data generated by one of a plurality of operating systems. In other embodiments, a user of thecomputing device 200 views a display of data generated by thefirst operating system 1040 concurrently with a display of data generated by thesecond operating system 1050. In one of these embodiments, the user views a plurality of desktop environments on one or more display devices 224 a-n providing a concurrent view of the plurality of desktop environments although the user interface elements and displayed data generated or maintained by each of the operating systems are displayed separately. In another of these embodiments, the user views a plurality of desktop environments on one or more display devices 224 a-n providing a concurrent view of the plurality of desktop environments and the user interface elements and displayed data generated or maintained by each of the operating systems are displayed in an integrated desktop environment. In further embodiments,operating systems single computing device 200 may share physical resources provided by thecomputing device 200 including, but not limited to, processing capabilities, physical disk space, and display devices. - In some embodiments, a resource executed in one operating system may generate output data for display within a second operating system. In one of these embodiments, and by way of example, an
application 1032 executing in anoperating system 1050 and remote to anoperating system 1040—either physically or logically—may generate application output data for display in a window maintained by theoperating system 1040. In another of these embodiments, theresource 1032 may transmit an agent executing on the output data to theoperating system 1040, such as a presentation layer protocol client agent, and the agent directs the display of the output data by theoperating system 1040. - Referring now to
FIG. 11 , a flow diagram depicts one embodiment of a method for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system. In brief overview, the method includes providing, by a first interface object executed by a first operating system, a mechanism for external communication with a first application executed by the first operating system (1102). The method includes providing, by a second interface object executed by a second operating system, a mechanism for external communication with at least one window handler routine executed by the second operating system (1104). The method includes receiving, by the first interface object, an identification of a window displayed by the first operating system and generated by a second application executed by the second operating system (1106). The method includes requesting, by the first interface object, from the second interface object, analysis of the identified window (1108). The method includes directing, by second interface object, analysis of data displayed in the window by the at least one window handler routine executed by the second operating system (1110). The method includes receiving, by the first interface object, from the second interface object, an identification of contact information displayed by the window resulting from the analysis by the at least one window handler routine executed by the second operating system (1112). - Referring now to
FIG. 11 , and in greater detail, the method includes providing, by a first interface object executed by a first operating system, a mechanism for external communication with a first application executed by the first operating system (1102). In one embodiment, thefirst interface object 1002 receives requests from the first application, such as theclient agent 220, and forwards them to asecond interface object 1030 for processing. In another embodiment, thefirst interface object 1002 receives information, including responses to request for analysis of output data, from thesecond interface object 1030 and provides the information to theclient agent 220. - The method includes providing, by a second interface object executed by a second operating system, a mechanism for external communication with at least one window handler routine executed by the second operating system (1104). In one embodiment, the
second interface object 1030 provides the functionality of aclient agent 220 and awindow handler routine 1010 on the second operating system interacts with thesecond interface object 1030 as described above in connection withFIGS. 3-9 . In another embodiment, thewindow handler routine 1010 is a plug-in module that analyzes output data generated by applications executing on thesecond operating system 1050 and forwards a determination of whether or not the output data includes contact information to thesecond interface object 1030. As described above in connection withFIGS. 10A , 10B and 10C, and in one embodiment, the interface objects may establish a connection between operating systems over which the interface objects communicate, exchanging proxied requests and responses. - The method includes receiving, by the first interface object, an identification of a window displayed by the first operating system and generated by a second application executed by the second operating system (1106). In one embodiment, the
client agent 220 identifies awindow 1012 as described above in connection withFIGS. 3-9 . In another embodiment, theclient agent 220 interacts with thefirst interface object 1002 as if thefirst interface object 1002 were awindow handler routine 410 in a plurality ofwindow handlers 410. In still another embodiment, theclient agent 220 transmits to thefirst interface object 1002 requests to indicate whether or not output data displayed by awindow 1012 includes contact information. In some embodiments, thefirst interface object 1002 receives window identification information associated with awindow 1012 and determines that thewindow 1012 displays output data generated by a resource executing on thesecond operating system 1050, which may execute on thesecond computing device 200. - The method includes requesting, by the first interface object, from the second interface object, analysis of the identified window (1108). In one embodiment, the
first interface object 1002 analyzes the window identification information to identify an associated resource generating the output data 1020 as described above in connection withFIGS. 3-9 . In another embodiment, thefirst interface object 1002 transmits the window identification information with a request for analysis of output data displayed by thewindow 1012 to thesecond interface object 1030 for processing. - The method includes directing, by second interface object, analysis of data displayed in the window by the at least one window handler routine executed by the second operating system (1110). In one embodiment, the
second interface object 1030 receives a request from thefirst interface object 1002 and identifies at least onewindow handler routine 1010 providing functionality for processing the received request. In another embodiment, thesecond interface object 1030, implementing functionality such as that described above in connection with theclient agent 220 andFIGS. 3-9 , accesses a plurality ofwindow handler routines 1010, each of which may have an associated level of priority, and requests that at least one of thewindow handler routines 1010 analyze output data 1020. In some embodiments, thesecond interface object 1030 transmits the received request to a non-window handler application. - The method includes receiving, by the first interface object, from the second interface object, an identification of contact information displayed by the window resulting from the analysis by the at least one window handler routine executed by the second operating system (1112). In one embodiment, the
client agent 220 displays a user interface for interacting with the identified contact information, responsive to receiving the identification of the contact information from the first interface object. In another embodiment, thefirst interface object 1002 transmits the identification ofcontact information 1024 to theclient agent 220. In still another embodiment, thefirst interface object 1002 receives, from thesecond interface object 1030, an indication that the window does not display contact information, responsive to the analysis by the at least one window handler routine. - In some embodiments, the
first interface object 1002 transmits the identification ofcontact information 1024 to an analysis component, such asparser 312, for confirmation that the identified data is contact information. In one of these embodiments, the analysis component determines that the identified information does not include a telephone number. In another of these embodiments, the analysis component determines that the identified information does not include a facsimile number. In still another of these embodiments, the analysis component determines that the identified information does not include contact information. In still even another of these embodiments, the analysis component transmits an identification to theclient agent 220 that the identified information is not contact information. In yet another of these embodiments, the analysis component transmits an instruction to theclient agent 220 not to display a user interface for interacting with the identified contact information. - In some embodiments, the methods and systems described herein provide functionality for allowing a
client software 220 executed by one operating system to interact with awindow handler routine 1010, or other application, executed by a second operating system either on the same or a different computing device, to determine whether remotely-generated output data includes contact information. In one of these embodiments, by allowing thelocal client software 220 to request analysis of output data generated by applications executing in an environment remote from theclient software 220, the methods and systems described herein improve the functionality of theclient software 220 to include the ability to analyze data from output data regardless of the environment in which the resource generating the output data executes, without requiring the execution of additional client software in the local environment. - It should be understood that the systems described above may provide multiple ones of any or each of those components and these components may be provided on either a standalone machine or, in some embodiments, on multiple machines in a distributed system. In addition, the systems and methods described above may be provided as one or more computer-readable programs embodied on or in one or more articles of manufacture. The article of manufacture may be a floppy disk, a hard disk, a CD-ROM, a flash memory card, a PROM, a RAM, a ROM, or a magnetic tape. In general, the computer-readable programs may be implemented in any programming language, such as LISP, PERL, C, C++, C#, PROLOG, or in any byte code language such as JAVA. The software programs may be stored on or in one or more articles of manufacture as object code. Having described certain embodiments of methods and systems for identifying a window lacking communications data relevant to a user of a computing device, it will now become apparent to one of skill in the art that other embodiments incorporating the concepts of the disclosure may be used. Therefore, the disclosure should not be limited to certain embodiments, but rather should be limited only by the spirit and scope of the following claims.
Claims (21)
1. A method for identifying a window lacking communications data relevant to a user of a computing device, the method comprising:
receiving an identification of each of a plurality of windows displayed to a user of a computing device;
receiving an indication of whether each of the plurality of windows contains contact information displayed to the user;
receiving an indication of whether the user interacted with the information displayed by each of the plurality of windows;
analyzing, for each of the plurality of windows, the received indication of whether the user interacted with the displayed information, the received indication of whether each of the plurality of windows contains contact information displayed to the user, and the received identification of each of the plurality of windows; and
generating an enumeration of window identification information for at least one filtered window.
2. The method of claim 1 , wherein receiving the identification of each of the plurality of windows further comprises receiving information associated with each of the plurality of windows.
3. The method of claim 1 , wherein receiving the identification of each of the plurality of windows further comprises receiving an identification of a window type associated with at least one window in the plurality of windows.
4. The method of claim 1 , wherein receiving the identification of each of the plurality of windows further comprises receiving an identification of an ancestor window of at least one window in the plurality of windows.
5. The method of claim 1 , wherein receiving the identification of each of the plurality of windows further comprises receiving an identification of a descendant window of at least one window in the plurality of windows.
6. The method of claim 1 , wherein receiving the identification of each of the plurality of windows further comprises receiving an identification of a type of class of at least one window in the plurality of windows.
7. The method of claim 1 , wherein receiving the identification of each of the plurality of windows further comprises receiving caption data associated with at least one window in the plurality of windows.
8. The method of claim 1 , wherein receiving an indication of whether each of the plurality of windows contains contact information displayed to the user further comprises receiving an identification of a telephone number displayed to the user.
9. The method of claim 1 , wherein receiving an indication of whether each of the plurality of windows contains contact information displayed to the user further comprises receiving an identification of a facsimile number displayed to the user.
10. The method of claim 1 , wherein receiving an indication of whether each of the plurality of windows contains contact information displayed to the user further comprises receiving an identification of an electronic mail address displayed to the user.
11. The method of claim 1 , wherein receiving an indication of whether each of the plurality of windows contains contact information displayed to the user further comprises receiving an identification that no contact information is displayed to the user.
12. The method of claim 1 , wherein receiving an indication of whether the user interacted with the information displayed by each of the plurality of windows further comprises receiving an indication that the user interacted with a user interface element selectable to initiate a telecommunications session based on the information displayed by at least one of the plurality of windows.
13. The method of claim 1 , wherein receiving an indication of whether the user interacted with the information displayed by each of the plurality of windows further comprises receiving an indication that the user did not interact with a user interface element associated with the information.
14. The method of claim 1 , wherein analyzing further comprises applying at least one heuristic to the received indication of whether the user interacted with the displayed information.
15. The method of claim 1 , wherein analyzing further comprises applying at least one heuristic to the received indication of whether each of the plurality of windows contains contact information displayed to the user.
16. The method of claim 1 , wherein analyzing further comprises applying at least one heuristic to the received identification of each of the plurality of windows.
17. The method of claim 1 further comprises determining, responsive to the analysis, that a type of window does not display contact information relevant to a user.
18. The method of claim 1 further comprising providing, to a window handler filter routine the generated enumeration of window identification information for at least one filtered window.
19. A system for identifying a window lacking communications data relevant to a user of a computing device, the method comprising:
a client agent comprising i) a window handler filter routine generating an identification of each of a plurality of windows displayed to a user of a computing device, and ii) a window handler routine generating an indication of whether each of the plurality of windows displays contact information to the user, the client agent generating an indication of whether the user interacted with the information displayed by each of the plurality of windows; and
an analysis component i) analyzing, for each of the plurality of windows, at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information, and ii) generating an enumeration of window identification information for at least one filtered window.
20. The system of claim 19 further comprising at least one heuristic applied by the analysis component to at least one of: a received identification of each of the plurality of windows, a received indication of whether each of the plurality of windows displays contact information, and a received indication of whether the user interacted with the displayed contact information in determining whether to filter at least one of the plurality of windows.
21. The system of claim 19 further comprising at least one user interface generated by the client agent and displayed to a user, the at least one user interface displaying an interface element for initiating a telecommunications session based on the information displayed by at least one of the plurality of windows.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/341,779 US20090187854A1 (en) | 2007-12-21 | 2008-12-22 | Methods and systems for generating an enumeration of window types that lack contact data relevant to a user |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US1602507P | 2007-12-21 | 2007-12-21 | |
US12/341,779 US20090187854A1 (en) | 2007-12-21 | 2008-12-22 | Methods and systems for generating an enumeration of window types that lack contact data relevant to a user |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090187854A1 true US20090187854A1 (en) | 2009-07-23 |
Family
ID=40394279
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/341,779 Abandoned US20090187854A1 (en) | 2007-12-21 | 2008-12-22 | Methods and systems for generating an enumeration of window types that lack contact data relevant to a user |
US12/341,919 Abandoned US20090183110A1 (en) | 2007-12-21 | 2008-12-22 | Systems and Methods for Efficient Processing of Data Displayed by a Window |
US12/341,809 Abandoned US20090187848A1 (en) | 2007-12-21 | 2008-12-22 | Methods and systems for identifying a process for analyzing data displayed by a window to a user of a computing device |
US12/341,797 Active 2032-05-19 US8938743B2 (en) | 2007-12-21 | 2008-12-22 | Methods and systems for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/341,919 Abandoned US20090183110A1 (en) | 2007-12-21 | 2008-12-22 | Systems and Methods for Efficient Processing of Data Displayed by a Window |
US12/341,809 Abandoned US20090187848A1 (en) | 2007-12-21 | 2008-12-22 | Methods and systems for identifying a process for analyzing data displayed by a window to a user of a computing device |
US12/341,797 Active 2032-05-19 US8938743B2 (en) | 2007-12-21 | 2008-12-22 | Methods and systems for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system |
Country Status (2)
Country | Link |
---|---|
US (4) | US20090187854A1 (en) |
WO (1) | WO2009086316A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110070873A1 (en) * | 2009-09-21 | 2011-03-24 | Avaya Inc. | Method for Telephony Client Synchronization in Telephone Virtualization |
US20110069699A1 (en) * | 2009-09-22 | 2011-03-24 | Avaya Inc. | Method for Telephony Client Synchronization in Telephone Virtualization |
US20110075825A1 (en) * | 2009-09-30 | 2011-03-31 | Avaya Inc. | Method for the Selection of an Active Software Environment of a Virtualized Telecommunications Terminal |
US20110124327A1 (en) * | 2009-11-20 | 2011-05-26 | Avaya Inc. | Method for Telecommunications Device Synchronization |
WO2012140657A1 (en) * | 2011-04-14 | 2012-10-18 | Passcall Advanced Technologies (Transforma) Ltd. | Call initiation system and method |
CN103458034A (en) * | 2013-09-04 | 2013-12-18 | 国云科技股份有限公司 | Method for having access to SPICE protocol remote desktop through WEB page |
US20140129614A1 (en) * | 2012-11-02 | 2014-05-08 | Adobe Systems Incorporated | Integrating web analytics products with web conferencing products for better reporting of user interaction and data tracking |
US8995630B1 (en) | 2010-08-01 | 2015-03-31 | Tulsa Holdings, Llc | Telephony and applications communication in a non-mobile telephone system |
CN104580531A (en) * | 2015-02-05 | 2015-04-29 | 湖南合天智汇信息技术有限公司 | Web remote desktop access control method based on WebSocket agency |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9235452B2 (en) * | 2010-02-05 | 2016-01-12 | Microsoft Technology Licensing, Llc | Graphics remoting using augmentation data |
US9603085B2 (en) | 2010-02-16 | 2017-03-21 | Qualcomm Incorporated | Methods and apparatus providing intelligent radio selection for legacy and non-legacy applications |
US8239409B2 (en) | 2010-02-26 | 2012-08-07 | The Invention Science Fund I, Llc | Providing a modified non-communication application interface for presenting a message |
US20110211590A1 (en) * | 2010-02-26 | 2011-09-01 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Presenting messages through a channel of a non-communication productivity application interface |
US9626633B2 (en) * | 2010-02-26 | 2017-04-18 | Invention Science Fund I, Llc | Providing access to one or more messages in response to detecting one or more patterns of usage of one or more non-communication productivity applications |
US20110214070A1 (en) * | 2010-02-26 | 2011-09-01 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Providing access to one or more messages in response to detecting one or more patterns of usage of one or more non-communication productivity applications |
US8930439B2 (en) * | 2010-04-30 | 2015-01-06 | Nokia Corporation | Method and apparatus for providing cooperative user interface layer management with respect to inter-device communications |
US8458490B2 (en) | 2010-05-28 | 2013-06-04 | Dell Products, Lp | System and method for supporting full volume encryption devices in a client hosted virtualization system |
US8990584B2 (en) | 2010-05-28 | 2015-03-24 | Dell Products, Lp | System and method for supporting task oriented devices in a client hosted virtualization system |
US9134990B2 (en) | 2010-05-28 | 2015-09-15 | Dell Products, Lp | System and method for implementing a secure client hosted virtualization service layer in an information handling system |
US8719557B2 (en) | 2010-05-28 | 2014-05-06 | Dell Products, Lp | System and method for secure client hosted virtualization in an information handling system |
US8938774B2 (en) | 2010-05-28 | 2015-01-20 | Dell Products, Lp | System and method for I/O port assignment and security policy application in a client hosted virtualization system |
US8527761B2 (en) | 2010-05-28 | 2013-09-03 | Dell Products, Lp | System and method for fuse enablement of a secure client hosted virtualization in an information handling system |
US8589702B2 (en) | 2010-05-28 | 2013-11-19 | Dell Products, Lp | System and method for pre-boot authentication of a secure client hosted virtualization in an information handling system |
US8751781B2 (en) | 2010-05-28 | 2014-06-10 | Dell Products, Lp | System and method for supporting secure subsystems in a client hosted virtualization system |
US8639923B2 (en) | 2010-05-28 | 2014-01-28 | Dell Products, Lp | System and method for component authentication of a secure client hosted virtualization in an information handling system |
US8959220B2 (en) | 2010-11-02 | 2015-02-17 | International Business Machines Corporation | Managing a workload of a plurality of virtual servers of a computing environment |
US8966020B2 (en) * | 2010-11-02 | 2015-02-24 | International Business Machines Corporation | Integration of heterogeneous computing systems into a hybrid computing system |
US9253016B2 (en) | 2010-11-02 | 2016-02-02 | International Business Machines Corporation | Management of a data network of a computing environment |
US9081613B2 (en) | 2010-11-02 | 2015-07-14 | International Business Machines Corporation | Unified resource manager providing a single point of control |
US8984109B2 (en) | 2010-11-02 | 2015-03-17 | International Business Machines Corporation | Ensemble having one or more computing systems and a controller thereof |
US8831658B2 (en) | 2010-11-05 | 2014-09-09 | Qualcomm Incorporated | Controlling application access to a network |
US9264868B2 (en) | 2011-01-19 | 2016-02-16 | Qualcomm Incorporated | Management of network access requests |
US9178965B2 (en) | 2011-03-18 | 2015-11-03 | Qualcomm Incorporated | Systems and methods for synchronization of application communications |
US9571952B2 (en) | 2011-04-22 | 2017-02-14 | Qualcomm Incorporatd | Offloading of data to wireless local area network |
KR101229752B1 (en) * | 2011-06-01 | 2013-02-05 | 엘지전자 주식회사 | Mobile terminal and method for controlling the same |
KR101801359B1 (en) * | 2011-07-28 | 2017-11-24 | 엘지전자 주식회사 | Mobile terminal |
US9137737B2 (en) | 2011-08-29 | 2015-09-15 | Qualcomm Incorporated | Systems and methods for monitoring of background application events |
US10133586B2 (en) * | 2014-04-01 | 2018-11-20 | Henry Graber | Method to configure, control, and display data products from a user interface |
US9787529B1 (en) * | 2015-01-16 | 2017-10-10 | Juniper Networks, Inc. | Systems and methods for tunneling socket calls across operating systems |
US10254912B2 (en) * | 2015-09-10 | 2019-04-09 | Honeywell International Inc. | Methods and systems for non-intrusive system data pipe |
US11150920B2 (en) * | 2018-05-25 | 2021-10-19 | Vmware, Inc. | 3D API redirection for virtual desktop infrastructure |
US11190573B2 (en) * | 2018-07-25 | 2021-11-30 | Vmware, Inc. | Techniques for improving implementation of a remote browser within a local browser |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040239701A1 (en) * | 2003-05-07 | 2004-12-02 | International Business Machines Corporation | Display data mapping method, system, and program product |
US20050117737A1 (en) * | 1998-10-29 | 2005-06-02 | Stanford Michael D. | Telephone functions for computers |
US7003327B1 (en) * | 1999-07-23 | 2006-02-21 | Openwave Systems Inc. | Heuristically assisted user interface for a wireless communication device |
US20060224989A1 (en) * | 2005-04-01 | 2006-10-05 | Microsoft Corporation | Method and apparatus for application window grouping and management |
US20070143414A1 (en) * | 2005-12-15 | 2007-06-21 | Daigle Brian K | Reference links for instant messaging |
US7333976B1 (en) * | 2004-03-31 | 2008-02-19 | Google Inc. | Methods and systems for processing contact information |
US20080256563A1 (en) * | 2007-04-13 | 2008-10-16 | Cheng Han | Systems and methods for using a lodestone in application windows to insert media content |
US7600267B2 (en) * | 2004-10-21 | 2009-10-06 | International Business Machines Corporation | Preventing a copy of a protected window |
Family Cites Families (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US78406A (en) * | 1868-05-26 | wheaton | ||
US76503A (en) * | 1868-04-07 | nilbs | ||
US72426A (en) * | 1867-12-17 | smith | ||
US75993A (en) * | 1868-03-24 | Charles s | ||
GB9105278D0 (en) * | 1990-04-27 | 1991-04-24 | Sun Microsystems Inc | Method and apparatus for implementing object-oriented programming using unmodified c for a window-based computer system |
US5408659A (en) * | 1992-03-05 | 1995-04-18 | International Business Machines Corporation | Link pane class and application framework |
US5375200A (en) * | 1992-11-13 | 1994-12-20 | International Business Machines Corporation | Method and system for graphic interaction between data and applications within a data processing system |
JPH06253308A (en) * | 1993-03-01 | 1994-09-09 | Fujitsu Ltd | Video communication control system |
US6212577B1 (en) * | 1993-03-03 | 2001-04-03 | Apple Computer, Inc. | Method and apparatus for improved interaction with an application program according to data types and actions performed by the application program |
US5522025A (en) * | 1993-10-25 | 1996-05-28 | Taligent, Inc. | Object-oriented window area display system |
JPH10507853A (en) * | 1994-10-25 | 1998-07-28 | オブジェクト テクノロジー ライセンシング コーポレイション | Object oriented system for servicing windows |
US6204847B1 (en) * | 1995-07-17 | 2001-03-20 | Daniel W. Wright | Shared virtual desktop collaborative application system |
US6430282B1 (en) | 1995-09-29 | 2002-08-06 | Nortel Networks Limited | Methods and apparatus for originating voice calls |
US5889518A (en) * | 1995-10-10 | 1999-03-30 | Anysoft Ltd. | Apparatus for and method of acquiring, processing and routing data contained in a GUI window |
US6437803B1 (en) * | 1998-05-29 | 2002-08-20 | Citrix Systems, Inc. | System and method for combining local and remote windows into a single desktop environment |
US6324264B1 (en) * | 1996-03-15 | 2001-11-27 | Telstra Corporation Limited | Method of establishing a communications call |
US6285364B1 (en) * | 1997-06-03 | 2001-09-04 | Cisco Technology, Inc. | Method and apparatus for organizing and displaying internet and telephone information |
WO1999005590A2 (en) * | 1997-07-25 | 1999-02-04 | Starvox, Inc. | Apparatus and method for integrated voice gateway |
FI109733B (en) * | 1997-11-05 | 2002-09-30 | Nokia Corp | Utilizing the content of the message |
US20020007374A1 (en) * | 1998-12-16 | 2002-01-17 | Joshua K. Marks | Method and apparatus for supporting a multicast response to a unicast request for a document |
US6839348B2 (en) * | 1999-04-30 | 2005-01-04 | Cisco Technology, Inc. | System and method for distributing multicasts in virtual local area networks |
US6404746B1 (en) * | 1999-07-13 | 2002-06-11 | Intervoice Limited Partnership | System and method for packet network media redirection |
US6363065B1 (en) * | 1999-11-10 | 2002-03-26 | Quintum Technologies, Inc. | okApparatus for a voice over IP (voIP) telephony gateway and methods for use therein |
JP3526019B2 (en) * | 1999-11-30 | 2004-05-10 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Image display system, image display device, and image display method |
US6427233B1 (en) * | 1999-12-17 | 2002-07-30 | Inventec Corporation | Method for addressing the dynamic windows |
US20020118231A1 (en) * | 2000-11-14 | 2002-08-29 | Jeff Smith | Method of realistically displaying and interacting with electronic files |
US20020129159A1 (en) * | 2001-03-09 | 2002-09-12 | Michael Luby | Multi-output packet server with independent streams |
US20020130880A1 (en) * | 2001-03-16 | 2002-09-19 | Koninklijke Philips Electronics N.V. | Locally enhancing display information |
US7242680B2 (en) * | 2001-03-20 | 2007-07-10 | Verizon Business Global Llc | Selective feature blocking in a communications network |
US8811164B2 (en) * | 2001-03-20 | 2014-08-19 | Verizon Patent And Licensing Inc. | Selective feature blocking in a communications network |
US8200577B2 (en) * | 2001-03-20 | 2012-06-12 | Verizon Business Global Llc | Systems and methods for retrieving and modifying data records for rating and billing purposes |
GB0107721D0 (en) * | 2001-03-28 | 2001-05-16 | Group 3 Technology Ltd | Communications module for controlling the operation of a private branch exchange |
US7177412B2 (en) * | 2001-09-24 | 2007-02-13 | Berlyoung Danny L | Multi-media communication management system with multicast messaging capabilities |
US20030058266A1 (en) * | 2001-09-27 | 2003-03-27 | Dunlap Kendra L. | Hot linked help |
US20030074647A1 (en) * | 2001-10-12 | 2003-04-17 | Andrew Felix G.T.I. | Automatic software input panel selection based on application program state |
US6990590B2 (en) * | 2002-01-10 | 2006-01-24 | International Business Machines Corporation | Strategic internet persona assumption |
US7019757B2 (en) * | 2002-01-28 | 2006-03-28 | International Business Machines Corporation | Changing the alpha levels of an application window to indicate a status of a computing task |
JP2003295969A (en) * | 2002-03-29 | 2003-10-17 | Fujitsu Ltd | Automatic information input program |
JP2004164132A (en) * | 2002-11-11 | 2004-06-10 | Nec Corp | Multiwindow display device, multiwindow management method for use therewith, and display control program |
US7221748B1 (en) * | 2002-11-12 | 2007-05-22 | Bellsouth Intellectual Property Corporation | Method for linking call log information to address book entries and replying using medium of choice |
US20050057498A1 (en) * | 2003-09-17 | 2005-03-17 | Gentle Christopher R. | Method and apparatus for providing passive look ahead for user interfaces |
KR100661313B1 (en) * | 2003-12-03 | 2006-12-27 | 한국전자통신연구원 | Multimedia communication system based on session initiation protocol capable of providing mobility using lifelong number |
JP4576115B2 (en) * | 2003-12-18 | 2010-11-04 | 株式会社日立製作所 | VoIP gateway device and method for controlling call arrival and departure in VoIP gateway device |
US20060184410A1 (en) * | 2003-12-30 | 2006-08-17 | Shankar Ramamurthy | System and method for capture of user actions and use of capture data in business processes |
US7430720B2 (en) * | 2004-03-05 | 2008-09-30 | America Online, Inc. | System and method for preventing screen-scrapers from extracting user screen names |
KR100586982B1 (en) * | 2004-05-20 | 2006-06-08 | 삼성전자주식회사 | Display system and management method for virtual workspace thereof |
US7475341B2 (en) * | 2004-06-15 | 2009-01-06 | At&T Intellectual Property I, L.P. | Converting the format of a portion of an electronic document |
US7840681B2 (en) * | 2004-07-30 | 2010-11-23 | International Business Machines Corporation | Method and apparatus for integrating wearable devices within a SIP infrastructure |
US7434173B2 (en) * | 2004-08-30 | 2008-10-07 | Microsoft Corporation | Scrolling web pages using direct interaction |
US8090776B2 (en) * | 2004-11-01 | 2012-01-03 | Microsoft Corporation | Dynamic content change notification |
US20070021981A1 (en) * | 2005-06-29 | 2007-01-25 | James Cox | System for managing emergency personnel and their information |
US7900158B2 (en) * | 2005-08-04 | 2011-03-01 | Microsoft Corporation | Virtual magnifying glass with intuitive use enhancements |
GB2432744B (en) * | 2005-11-24 | 2011-01-12 | Data Connection Ltd | Telephone call processing method and apparatus |
FR2895182A1 (en) * | 2005-12-20 | 2007-06-22 | Thomson Licensing Sas | METHOD FOR TRANSMITTING DIGITAL TELEVISION SERVICES, GATEWAY AND CORRESPONDING NETWORK |
US8494281B2 (en) * | 2006-04-27 | 2013-07-23 | Xerox Corporation | Automated method and system for retrieving documents based on highlighted text from a scanned source |
CN101461240A (en) * | 2006-06-02 | 2009-06-17 | 艾利森电话股份有限公司 | A method and apparatus in a media player |
US7996459B2 (en) * | 2006-08-31 | 2011-08-09 | Microsoft Corporation | Video-switched delivery of media content using an established media-delivery infrastructure |
US7895209B2 (en) * | 2006-09-11 | 2011-02-22 | Microsoft Corporation | Presentation of information based on current activity |
US7860532B2 (en) * | 2006-10-02 | 2010-12-28 | Nokia Corporation | Method and system for initiating a communication from an arbitrary document |
US7934230B2 (en) * | 2007-05-04 | 2011-04-26 | Alcatel Lucent | IPTV architecture for dynamic commercial insertion |
US20080281971A1 (en) * | 2007-05-07 | 2008-11-13 | Nokia Corporation | Network multimedia communication using multiple devices |
US8949886B2 (en) * | 2007-06-18 | 2015-02-03 | Alcatel Lucent | Targeted advertisement insertion with interface device assisted switching |
US20090049392A1 (en) * | 2007-08-17 | 2009-02-19 | Nokia Corporation | Visual navigation |
EP2086237B1 (en) * | 2008-02-04 | 2012-06-27 | Alcatel Lucent | Method and device for reordering and multiplexing multimedia packets from multimedia streams pertaining to interrelated sessions |
EP2104305A1 (en) * | 2008-03-21 | 2009-09-23 | Koninklijke KPN N.V. | Call service handling in an IMS-based system |
EP2112799A1 (en) * | 2008-04-25 | 2009-10-28 | Koninklijke KPN N.V. | Service integrity handling in an IMS-based system |
US20100141552A1 (en) * | 2008-12-04 | 2010-06-10 | Andrew Rodney Ferlitsch | Methods and Systems for Imaging Device and Display Interaction |
-
2008
- 2008-12-22 WO PCT/US2008/088046 patent/WO2009086316A1/en active Application Filing
- 2008-12-22 US US12/341,779 patent/US20090187854A1/en not_active Abandoned
- 2008-12-22 US US12/341,919 patent/US20090183110A1/en not_active Abandoned
- 2008-12-22 US US12/341,809 patent/US20090187848A1/en not_active Abandoned
- 2008-12-22 US US12/341,797 patent/US8938743B2/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050117737A1 (en) * | 1998-10-29 | 2005-06-02 | Stanford Michael D. | Telephone functions for computers |
US6980641B1 (en) * | 1998-10-29 | 2005-12-27 | Intel Corporation | Method and apparatus for controlling a computer to implement telephone functions with an enhanced minidialer function |
US7720207B2 (en) * | 1998-10-29 | 2010-05-18 | Intel Corporation | Telephone functions for computers |
US7003327B1 (en) * | 1999-07-23 | 2006-02-21 | Openwave Systems Inc. | Heuristically assisted user interface for a wireless communication device |
US20040239701A1 (en) * | 2003-05-07 | 2004-12-02 | International Business Machines Corporation | Display data mapping method, system, and program product |
US7333976B1 (en) * | 2004-03-31 | 2008-02-19 | Google Inc. | Methods and systems for processing contact information |
US7600267B2 (en) * | 2004-10-21 | 2009-10-06 | International Business Machines Corporation | Preventing a copy of a protected window |
US20060224989A1 (en) * | 2005-04-01 | 2006-10-05 | Microsoft Corporation | Method and apparatus for application window grouping and management |
US20070143414A1 (en) * | 2005-12-15 | 2007-06-21 | Daigle Brian K | Reference links for instant messaging |
US20080256563A1 (en) * | 2007-04-13 | 2008-10-16 | Cheng Han | Systems and methods for using a lodestone in application windows to insert media content |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110070873A1 (en) * | 2009-09-21 | 2011-03-24 | Avaya Inc. | Method for Telephony Client Synchronization in Telephone Virtualization |
US9143597B2 (en) | 2009-09-21 | 2015-09-22 | Avaya Inc. | Method for telephony client synchronization in telephone virtualization |
US20110069699A1 (en) * | 2009-09-22 | 2011-03-24 | Avaya Inc. | Method for Telephony Client Synchronization in Telephone Virtualization |
US9338273B2 (en) | 2009-09-22 | 2016-05-10 | Avaya Inc. | Method for telephony client synchronization in telephone virtualization |
US8718611B2 (en) * | 2009-09-30 | 2014-05-06 | Avaya Inc. | Method for the selection of an active software environment of a virtualized telecommunications terminal |
US20110075825A1 (en) * | 2009-09-30 | 2011-03-31 | Avaya Inc. | Method for the Selection of an Active Software Environment of a Virtualized Telecommunications Terminal |
US20110124327A1 (en) * | 2009-11-20 | 2011-05-26 | Avaya Inc. | Method for Telecommunications Device Synchronization |
US9094426B2 (en) | 2009-11-20 | 2015-07-28 | Avaya Inc. | Method for telecommunications device synchronization |
US8995630B1 (en) | 2010-08-01 | 2015-03-31 | Tulsa Holdings, Llc | Telephony and applications communication in a non-mobile telephone system |
WO2012140657A1 (en) * | 2011-04-14 | 2012-10-18 | Passcall Advanced Technologies (Transforma) Ltd. | Call initiation system and method |
US20140129614A1 (en) * | 2012-11-02 | 2014-05-08 | Adobe Systems Incorporated | Integrating web analytics products with web conferencing products for better reporting of user interaction and data tracking |
CN103458034A (en) * | 2013-09-04 | 2013-12-18 | 国云科技股份有限公司 | Method for having access to SPICE protocol remote desktop through WEB page |
CN104580531A (en) * | 2015-02-05 | 2015-04-29 | 湖南合天智汇信息技术有限公司 | Web remote desktop access control method based on WebSocket agency |
Also Published As
Publication number | Publication date |
---|---|
WO2009086316A1 (en) | 2009-07-09 |
US20090183110A1 (en) | 2009-07-16 |
US20090183186A1 (en) | 2009-07-16 |
US20090187848A1 (en) | 2009-07-23 |
US8938743B2 (en) | 2015-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8938743B2 (en) | Methods and systems for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system | |
US10762277B2 (en) | Optimization schemes for controlling user interfaces through gesture or touch | |
US10025758B2 (en) | Support for non-native file types in web application environment | |
US8117555B2 (en) | Cooperating widgets | |
US8782021B2 (en) | Systems and methods for folder redirection | |
US10135842B2 (en) | Content-based isolation for computing device security | |
EP1061446A2 (en) | Web-based enterprise management with multiple repository capability | |
US20190207922A1 (en) | Application managed service instances | |
US11620034B2 (en) | Systems and methods for providing tab previews via an operating system user interface | |
AU2008314541A1 (en) | System and method for transferring data among computing environments | |
US20220214931A1 (en) | System and method for exposing features of integration platform adapters as first-class actions in an orchestration template | |
CN117519829A (en) | System and method for hosting another browser within a browser | |
CN116483487A (en) | Robot process automation robot design interface based on browser | |
CN103902727A (en) | Network search method and device | |
CN116893807A (en) | System and method for designing a robotic flow automation robot using a browser | |
EP1061445A2 (en) | Web-based enterprise management with transport neutral client interface | |
US11893199B2 (en) | Systems and methods for viewing incompatible web pages via remote browser instances | |
WO1999040512A9 (en) | Method and system for user defined interactions between plurality of active software applications | |
US20230114321A1 (en) | Cloud Data Ingestion System | |
US11132113B1 (en) | Interaction signal processing in distributed computing systems | |
TWM600871U (en) | Computer program product and apparatus for arranging and executing jobs | |
US10546040B2 (en) | System and method for automatic provisioning of companion resources in a web hosting environment | |
US11736429B2 (en) | Contextual turning of dialog from any app into actionable workspace notification | |
US20240086211A1 (en) | Generation of virtualized shared tab for screen sharing | |
TWI702540B (en) | Load control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |