Abstract:
In one embodiment, a method includes capturing a facial image (32, Fig. 3) of a participant to a video conference session (10, Fig. 1) from a video stream of the video conference session. A database (23, Fig. 1) containing a plurality a stored facial images is then accessed in an attempt to match the facial image with one of the stored facial images. Each stored facial image is associated with information in the database associated with a person, the information being retrieved in the event of a match. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
Abstract:
A system and method for enabling an enhanced camp-on feature for a communications device. In an illustrative embodiment, the system includes a first mechanism for providing information pertaining to why a first user of a first communications device is unable to be contacted. A second mechanism enables a second user of a second communications device to make a camp-on selection based on the information. In a more specific embodiment, the information includes state information pertaining to the first communications device. The first means includes a fist module running on the first communications device. The first module is adapted to selectively relay the state information to an entity connected to the network. In the specific embodiment, the entity connected to the network includes Private Branch eXchange (PBX) system.
Abstract:
[56] In one embodiment, techniques for sending a conference invite that provides access to a list of participants in an existing conference are provided. A participant in a conference (104-1... 104-n) may decide to send an invite for the existing conference to the user (106). A request for inviting the user into the existing conference is received. A list of participants in the existing conference is determined. An invite message for the conference is then generated where the invite message includes information for the list of participants (104-1... 104-n). The invite message is then sent to the user (106) where the information for the list of participants is accessible to the user. For example, the list of participants may be displayed as caller ID information when the invite message is received by the user.
Abstract:
A system and method for enabling an enhanced camp-on feature for a communications device. In an illustrative embodiment, the system includes a first mechanism for providing information pertaining to why a first user of a first communications device is unable to be contacted. A second mechanism enables a second user of a second communications device to make a camp-on selection based on the information. In a more specific embodiment, the information includes state information pertaining to the first communications device. The first means includes a fist module running on the first communications device. The first module is adapted to selectively relay the state information to an entity connected to the network. In the specific embodiment, the entity connected to the network includes Private Branch eXchange (PBX) system.
Abstract:
A unified messaging system includes a unit to store a message operable to store a message sent to a user, the message having a selectable security attribute set to a one of a plurality of levels. A module associated with the unit operates to secure a voice channel used by the user to listen to the message when the selectable security level is set to a high level indicating encryption. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Abstract:
A method and apparatus to process an incoming message is described. The method may comprise, at a recipient system, receiving an incoming message from a message communicator and automatically analyzing message content to identify a keyword included in the message content. Thereafter, a predefined action associated with the keyword may be identified and the action may be performed. In an example embodiment, the predefined action may be a priority with the message, alerting an intended recipient of the message, routing the message to the intended recipient, paging the intended recipient, emailing the message to the intended recipient, sending an SMS message to the intended recipient, or the like. In an example embodiment, a user/owner of a mailbox may search a message database to identify incoming messages which includes the search term in the message content.
Abstract:
A system and method for providing interactive communications includes receiving a communication from an originator destined for a persona. An identity of the persona is determined and one or more rules associated with the identity of the persona is determined. Presence information of the persona is obtained. The communication is sent to the persona in accordance with the determination of the identity of the persona, the one or more rules associated with the identity, and the presence information of the persona.
Abstract:
A method for handling calls at an automatic call distribution system includes receiving a first call for connection with one of a plurality of agents and distributing the first call to a first agent of the plurality of agents. The method includes presenting to the first agent at least one target time associated with handling the first call and modifying the at least one target time associated with handling the first call based on call parameters and a service level goal. The call parameters comprise a status of a queue comprising calls awaiting connection with agents. The method also includes presenting the at least one modified target time associated with handling the first call to the first agent.
Abstract:
Disclosed are methods and apparatus for methods and apparatus for automatically contacting a service center (112, 110) for one or more particular products (102, 104, 122, 124), as well as contacting other types of entities with respect to any type of item. In a first embodiment, each item includes a radio frequency identification (RFID) of the particular products that is used to automatically contact a service center or the like (210). In a second embodiment, the RFID of the particular product is automatically sent to the service center or the like (214). In the first embodiment, the RFID of each product contains contact information, such as a 1-800 telephone number, a URL address, or email address, for a particular service center or the like. In one implementation, an RFID reader (104) is coupled with a communication device, such as a telephone or computer device, and the user uses the RFID reader to scan an RFID of a particular item (e.g., a malfunctioning product) (206). The relevant service center or the like is then contacted based on the RFID scan (210). For example, the user is connected to an agent at the relevant service center via a telephone or computer network. In the second embodiment, when a service center (or the like) needs RFID tag data for a particular item, a user may select a "send" option (e.g., on the communication device or reader) to have such RFID tag data automatically transmitted to the service center or the like (214).
Abstract:
In one embodiment, a method for enhanced extension mobility includes accessing user input indicating either a desire of a user to logon at an endpoint in a private mode according to which the endpoint supports only an extension of the user or a desire of the user to logon at the endpoint in a shared mode according to which the endpoint concurrently supports an extension of the user and or more other extensions of one or more other users. The method includes configuring the endpoint to support only an extension of the user if the user input indicates a desire of the user to logon at the endpoint in a private mode according to which the endpoint supports only an extension of the user. The method includes configuring the endpoint to concurrently support an extension of the user and one or more other extensions of one or more other users if the user input indicates a desire of the user to logon at the endpoint in a shared mode according to which the endpoint concurrently supports an extension of the user and one or more other extensions of one or more other users.