Abstract:
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user.
Abstract:
Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.
Abstract:
Subscribers of an enhanced communication system are enabled to indicate invocation or clearing of media specific features such as music-on-hold or video-on-hold. The invocation or clearing is transmitted to participating end points as a Session Initiation Protocol (SIP) re-INVITE message with Session Description Protocol (SDP) attribute descriptions identifying the feature, applicable media channels and whether the message is for invocation or clearing of the feature.
Abstract:
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user.
Abstract:
A system comprising a first network element, a second network element and a communication device. The first network element is communicatively coupled to the second network element and the communication device. The communication device sends multimedia session information to the first network element. The first network element analyzes the multimedia session information for urgent emergency circumstances. The first network element forwards the multimedia session information to a destination on the second network element if urgent emergency circumstances are found in the multimedia session information.
Abstract:
In a method for checking a subscriber line with a first and a second electrical line, wherein each line is connected to an encoder/decoder via a subscriber line circuit, the first line is connected to ground, a resistance of the second line is increased, an audio signal is outputted from the encoder/decoder to the first line; and a first frequency-selective signal is measured at a point at which the encoder/decoder is connected to the first line. Further, the second line is connected to ground, a resistance of the first line is increased, a further audio signal is output from the encoder/decoder to the second line, and a second frequency-selective signal is measured at a point at which the encoder/decoder is connected to the second line. An amplitude difference between the first and second frequency-selective signals is ascertained.
Abstract:
A method of and system for managing a conference call among participants and a moderator provides a control mode in which only one participant can speak at time. All participants other than the speaker are muted. The system maintains a talk queue. When a participant requests to speak, the system places the participant in the talk queue. The system may announce to the moderator that the participant has registered to speak. The system may also announce to the moderator the participant's position in the talk queue. When a speaking participant relinquishes, or is preempted from, the speaking position, the system mutes the speaking participant. The system informs the participant at the top of the talk queue that it is his or her turn to speak and unmutes that participant, whereby that participant becomes the new speaking participant. The system removes the new speaking participant from the talk queue. The system may announce their respective positions to the other participants in the talk queue. The system may include priority codes. If a participant enters a priority code when he or she requests to speak, the system places the participant at the top of the talk queue. If the participant does not enter a priority code, the system places the participant at the bottom of the talk queue.
Abstract:
A method for scheduling and transmitting messages is disclosed. The method comprises storing a plurality of audio files in an audio database, generating a schedule of queued messages via the plurality of audio files, transmitting the queued messages based on the schedule, reconfiguring the schedule based on a user interaction delivering the queued messages in accordance with the reconfigured schedule. Through the use of the method in accordance with the present invention, a scheduled plurality of messages can be transmitted in a clear and professional manner. Additionally, “ad hoc” messages can be incorporated into the schedule without significantly disrupting the other messages.
Abstract:
The present invention relates to a general intellectual click-to-dial method and a software architecture thereof. The software architecture, which is installed on the PC end of a user, comprises: a configuration module for configuring a locally-configured telephone number and a default format of telephone number; a number acquisition module for monitoring and deciding whether the user has selected a text content; a number analysis module for deciding telephone number validity of the text content selected by the user based on the default format of telephone number provided by said configuration module, and for providing an interface for user click-to-dial where the selected text content is a valid telephone number; and a dialing module for forming a click-to-dial message and sending it to a click-to-dial server. The invention breaks through the restriction of existing click-to-dial, and hence is suitable for not only the case in which telephone numbers are embedded in Web pages but also the case in which telephone numbers are embedded in any text-based electronic documents. Therefore, the invention provides high value-added applications for VoIP enterprise application IP Centrex and IP PBX.
Abstract:
A system, method, and computer program product for dynamically adapting selections in an automatic phone support system is described. The invention may integrate a dynamic knowledge base of responses with the menu selections on an automated phone system or other response system to present the most frequently used items earlier in the option list, or otherwise order options and information. Call data may be captured from single callers or historical ensembles of callers. An automatically generated similarity relationship may be used to initialize the system without historical call data, based on textual similarity or other techniques. Prioritization of options provides a more enjoyable, efficient experience for callers without increasing administrative overhead.