Abstract:
A telephone device comprises an operating device, a call request receiving device, a first identification information determination device and a first positive response sending device. The call request receiving device may be configured to receive a call request. The first identification information determination device may be configured to determine, on a condition that the call request is received by the call request receiving device in a time between a call preparing operation being started and the call preparing operation being ended on the operating device, whether or not telephone identification information corresponding to the call preparing operation is identical to telephone identification information of the source of the call request. The first positive response sending device may be configured to send the positive response in reply to the call request on a condition that a positive determination is obtained by the first identification information determination device.
Abstract:
The present invention comprises a method for audio/video conferencing. In a preferred embodiment, the method comprises using a dynamic threshold value to determine whether there is speech on a line. One aspect, the method comprises determining a dynamic threshold value based on one or more characteristics of signals received on a port, associating that dynamic threshold value with the port; and comparing one or more characteristics of signals subsequently received on the port to the dynamic threshold value. Signals received over a plurality of ports are summed, but for ports whose signal characteristics have a specified relationship to the dynamic threshold value associated with that port, signals are not contained in the sum.
Abstract:
A method of detecting that a condition exists that adversely impacts a digital subscriber line service (DSL) over a telephone line shared by the DSL service and a telephone service. The method includes obtaining information regarding operation of the DSL service over a plurality of different time periods, comparing the information for a first of the plurality of time periods with the information for a second of the plurality of time periods, and determining the condition exists based on the comparison.
Abstract:
In one embodiment, a method for ensuring quality of a media message is provided. The method includes receiving information for a media message. At least a portion of the media is analyzed to determine a media quality for the media message. The method then determines if the media quality is acceptable. If the media quality is not acceptable, then an alert may be sent regarding the media quality of the media message. For example, a caller may be prompted to re-record a media message.
Abstract:
The present disclosure provides a method and a system for verifying identity of a user and a system for generating and maintaining verification codes. The method and the system use system-generated caller numbers as verification codes. When an application system needs to verify the identity of a user, the verification system generates a caller phone number and uses a communication switching system to place a call originating from the caller phone number to the user's phone. The user's phone has a caller ID display function to automatically display the caller number, which serves as a user identity verification code. The user provides the received caller number to the application system for user identity verification. No text messaging or other ways of communication is required. The method and the system can achieve reliable user identity verification. A centralized system may support multiple application systems for user identity verification.
Abstract:
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
Abstract:
This document discusses, among other things, limiting contact to a networked contact center that is a host to multiple tenants. In an example embodiment, a communication is received by a networked contact center. In determining whether to allow the communication to reach contact center resources, a contact rate value may be examined. The contact rate value may represent an allowable quantity of contact within a time interval. For some example embodiments, a determination of whether the network contact center is to accept or reject the communication is made based on the contact rate value.
Abstract:
A method for telephony includes receiving at an Internet telephony service provider a subscriber request to place a call to a telephone number. A cache associated with the internet telephony service provider is queried to check if the cache holds a record for the telephone number. If the cache holds the record, the record is obtained. If the cache does not hold the record, a request is sent to a database server that maintains a database of records associating endpoint user terminal telephone numbers of subscribers with respective packet network addresses of the endpoint user terminal. The call is placed to the endpoint user terminal telephone number via a public switched telephone network whilst the request is sent to the database server to retrieve the packet network address of the endpoint user terminal to which calls to the telephone number should be placed.
Abstract:
The present invention is related to telecommunications, and in particular to systems and methods of using telecommunication services for user authentication. Account information is stored for a user, the account information including at least a first phone number associated with the user. A user order is received. A verification phone call is received from the user, the call including charge phone number information. The charge number information is compared to the first phone number to authenticate that the user is associated with the first phone number. Based at least in part on the comparison, the user order is selectively caused to be fulfilled.
Abstract:
A semantic contact center management method and system is provided in which the resources of a contact center (including agents and contacts) are represented as resources connected by properties such as skills and shared prior interactions. Contacts are allocated to agents based on the degree of connectedness and the availability of agents, and this provides visual tools to represent the state of the contact center and to enable automated and supervisor intervention.