Abstract:
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user.
Abstract:
A system for scheduling and transmitting messages is disclosed. The system stores a plurality of audio files in an audio database, generates a schedule of queued messages via the plurality of audio files, transmits the queued messages based on the schedule, and reconfigures the schedule based on a user interaction delivering the queued messages in accordance with the reconfigured schedule. A scheduled plurality of messages can be transmitted in a clear and professional manner. Additionally, “ad hoc” messages can be incorporated into the schedule without significantly disrupting the other messages.
Abstract:
A method comprising establishing a first call between a first device having an associated first user and a second device having an associated second user. During the first call, the first device receives a second call from a third device having an associated third user. In response to receiving the second call, the first user is prompted with call-back options to respond to the second call. The call-back options can include ignore, accept, and auto-schedule a return call. In the event the auto-schedule a return call option is selected, an auto-schedule command is sent from the first device to a server. After the first call is terminated, the first user is prompted with calling options to call the third device in response to the first call terminating.
Abstract:
A method is provided for the production produce accurate waiting time estimates based on at least one of (i) a queue arrival rate and (ii) estimated queue length. In a first embodiment of the present invention, the waiting time for a caller is determined on the basis of a queue arrival rate. In a second embodiment of the present invention, the waiting time for a caller is determined on the basis of a queue length estimate. The queue length estimate is a prediction of the size of the queue at a given time instant.
Abstract:
In order to achieve secure provision of appropriate information according to the status of a plurality of terminal apparatuses, a status detecting section detects the status of a cellular mobile phone, and the like, and a communication destination apparatus determining section selects a terminal apparatus with which communication can be established and at which received information can be presented according to the priority for transmission of the provided information. A content DB retrieves information to be provided. A server communication section transmits retrieved provided information to the selected terminal apparatus. With such a structure, the provided information is presented at another terminal apparatus when a terminal apparatus having a high priority is impossible to establish communication or is unsuitable for presentation of the provided information. Thus, provision of information is securely achieved.
Abstract:
In a contact center, a system for processing communication events has an interaction server for managing events waiting to be routed, a routing server for routing the events, a rules engine, and a gateway server executing rules invocation logic and interacting with the rules engine. The interaction server tracks incoming events, initiates and sends a routing request to the routing server, including a special routing object, for each event that requires conformance to business rules, the routing server, executing the routing object, sends an execution request to the gateway server, which upon receipt of the request prepares a business object model (BOM), being a set of facts upon which the rules engine executes rules appropriate to the facts, resulting in routing direction for the routing server to route the event.
Abstract:
A method, system and apparatus for implementing a Multimedia Ring Back Tone (MRBT) service are provided. The method includes: receiving a call request originated by a calling terminal; parsing a tone playing policy specifying whether to play a caller tone or a callee tone or whether to filter a tone; performing caller tone media negotiation or callee tone media negotiation, or performing no tone negotiation according to the parsing result; and playing the caller tone or the callee tone to the caller, or playing no tone. With the technical solution of the present invention, the caller tone service can be implemented in the IMS domain. Whether a caller tone or a callee tone is played to the caller is determined according to a preset policy. Furthermore, the tone filtering service is also implemented. This gives a user freedom in experiencing the MRBT service.
Abstract:
Methods and systems are provided for routing callers to agents in a call-center routing environment. An exemplary method includes identifying caller data for at least one caller in a queue of callers, and skipping a caller at the front of the queue of callers for another caller based on the identified caller data. The caller data may include one or both of demographic data and psychographic data. Skipping the caller may be further based on comparing caller data with agent data associated with an agent via a pattern matching algorithm such as a correlation algorithm. In one example, if the caller at the front of the queue has been skipped a predetermined number of times the caller at the front is the next routed (and cannot be skipped again).
Abstract:
A system and method track short term and long term intervals to assess whether a voice message source is a likely source of voice spam. Upon detection of a spamming threshold, calls from the source are blocked until detection that a sufficient time interval has elapsed without generation of messages.
Abstract:
Methods and systems are provided for routing callers to agents in a call-center routing environment. An exemplary method includes pooling incoming callers, and causing a caller from the pool of callers to be routed. The caller may be routed from the pool of callers to an agent, placed in another pool of callers, or placed in a queue of callers. The caller data may include demographic or psychographic data. The caller may be routed from the pool of callers based on comparing the caller data with agent data associated with an agent via a pattern matching algorithm and/or computer model for predicting a caller-agent pair outcome. Additionally, if a caller is held beyond a hold threshold (e.g., a time, “cost” function, or the like) the caller may be routed to the next available agent.