Abstract:
A method is disclosed herein for recognizing a repeated utterance in a mobile computing device via a processor. A first utterance is detected being spoken into a first mobile computing device. Likewise, a second utterance is detected being spoken into a second mobile computing device within a predetermined time period. The second utterance substantially matches the first spoken utterance and the first and second mobile computing devices are communicatively coupled to each other. The processor enables capturing, at least temporarily, a matching utterance for performing a subsequent processing function. The performed subsequent processing function is based on a type of captured utterance.
Abstract:
A technique for managing simultaneous incoming and outgoing calls between the same far-end called terminal and far-end calling terminal and/or same user associated with a far-end called terminal and user associated with the far-end calling terminal includes an easy call abandon facility on a near-end terminal configured to compare information associated with an outgoing call to information associated with an incoming call. The easy call abandon facility is configured to initiate an audible or visible indicator when the terminal and/or user of the far-end called party is the same as that of the far-end calling party. In response to an easy call abandon indication received from a near-end terminal user, the easy call abandon facility disconnects the call from the near-end and connects the call received from the far-end terminal.
Abstract:
Systems and methods for routing and/or servicing contacts using video analysis of one or more video streams are provided. The systems and methods are particularly applicable to a contact center.
Abstract:
Identifying an incoming call as from a mobile device of an enterprise communication system. Creating a first list relating mobile devices of the enterprise communication system with Public Land Mobile Network (PLMN) number of the device. Creating a hashmap comprising keys. Each key comprising the last n digits assigned as a PLMN number to at least one mobile device of the enterprise communication system. The hashmap further comprising a plurality of buckets. Each bucket corresponding to a key, and comprising a second list identifying each enterprise-associated mobile device having a PLMN number ending with the key. Receiving an Automatic Number Identification (ANI) number of an call incoming to the enterprise communication system. Retrieving at least one bucket corresponding to a key comprising the last n digits of the ANI number. Searching the retrieved bucket for the unique identifier associated with the full PLMN number.
Abstract:
A method for providing directory assistance includes receiving a communication from a requestor for a desired contact listing and retrieving a requester profile relating to the requester where the profile including a calling history of the requester. At least one listing is retrieved in response to the communication for a desired contact listing, where the retrieving of the desired listing includes reviewing the calling history of the requester and including, among the at least one retrieved response, a predictive listing.
Abstract:
A computer places in a call queue a call having caller identification information. The computer creates a database record that includes the caller identification information of the call placed in the call queue and an aggregate call queue duration value representing the aggregate time that one or more calls having the caller identification information have been in the call queue. The computer calculates a call queue duration for the call, and adds the calculated call queue duration for the call to the aggregate call queue duration value of the database record associated with the caller identification information of the call. If the aggregate call queue duration value exceeds a predetermined value, the computer provides special treatment to the call.
Abstract:
Conference calls are managed using a permanent or default password associated with a particular call-in phone number and at least one temporary, dynamically-generated password for that same call-in phone number. The temporary passwords are preferably applicable for a particular time period or interval. If a temporary password is not defined for the time period in which a conference call takes place, the default password may be used. Conference call access is restricted to participants who provide the proper password—namely, the temporary password during a time period for which a temporary password has been generated, and the default password otherwise.
Abstract:
A method and apparatus to process an incoming message is described. The method may comprise, at a recipient system, receiving an incoming message from a message communicator and automatically analyzing message content to identify a keyword included in the message content. Thereafter, a predefined action associated with the keyword may be identified and the action may be performed. In an example embodiment, the predefined action may be a priority with the message, alerting an intended recipient of the message, routing the message to the intended recipient, paging the intended recipient, emailing the message to the intended recipient, sending an SMS message to the intended recipient, or the like. In an example embodiment, a user/owner of a mailbox may search a message database to identify incoming messages which includes the search term in the message content.
Abstract:
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
Abstract:
A voice emitting and collecting device that is capable of picking up/outputting a voice emitted from a talker at a high S/N ratio by eliminating the influence of a diffracting voice despite a simple configuration is provided. A signal differencing circuit 191 outputs difference signals MS1 to MS4 between voice collecting beam signals MB11 to MB14 and voice collecting beam signals MB21 to MB24. A level comparator 195 selects the difference signal having a maximum level. A signal selecting circuit 196 selects voice collecting beam signals MB1x, MB2x of the difference signal MS that is selected/pointed by the level comparator 195. A subtracter 199 subtracts the voice collecting beam signal MB2x from the voice collecting beam signal MB1x, and output a resultant signal. Accordingly, main components of the diffracting voice can be removed from the voice collecting beam signal.