Patent application number | Description | Published |
20090027479 | Dynamic Visual Background For Call-Center Agents - A system is disclosed that enables a first call participant, such as an agent at a call center, to project a carefully-controlled appearance towards a second call participant, such as a customer calling for technical support, while on a video call. Using the real-time image of the first call participant while on a video call, as well as additional information, the system of the illustrative embodiment selects and superimposes a visual background that appears to the caller as being behind the agent. The visual background can be selected to cater towards what the caller expects or wants to see, or what the message is that the agent-represented business wants to convey. The system of the illustrative embodiment can dynamically change the visual background during a call or from one call to another, depending on factors related to the calling party, factors related to the called party, and so forth. | 01-29-2009 |
20090027484 | Call Resource Management Based on Calling-Party Disengagement from a Call - A system is disclosed that addresses a problem that can occur when a calling party of a video call withdraws from the call, but does not actually hang up. For example, after the calling party begins working through an interactive voice and video response (IVVR) session, the party might put his phone down, step away, drop the phone inadvertently, or otherwise disengage from the call without hanging up. In this event, the terminal itself is still connected to the call, so the call resource is tied up serving the terminal, even though the calling party has temporarily disengaged from the call. The system of the illustrative embodiment detects the disengagement of the party from the call and, as a result, suspends the use of the call resource that has been allocated for the call until the party re-engages with the call. | 01-29-2009 |
20090027485 | Automatic Monitoring of a Call Participant's Attentiveness - A system is disclosed that enables a first call participant, such as an agent at a call center, to receive feedback about his attentiveness towards a second call participant while on a video call. Using the real-time image of the first call participant while on a video call, as well as additional information, the system of the illustrative embodiment evaluates one or more facial characteristics of the first participant, such as eye gaze; accumulates a record of predetermined, attentiveness-related conditions having been met; and notifies the first participant, or some other person such as the participant's supervisor, of the participant's attentiveness patterns. | 01-29-2009 |
20090041212 | Interactive Voice Response System With Prioritized Call Monitoring - The present invention enables service agents in a call center to monitor portions of calls that are especially error-prone (e.g., automated speech recognition of an address, etc.), while portions of calls that are not error-prone occur without any human monitoring. An interactive voice response (IVR) system script (e.g., a VXML script, etc.) is divided into a plurality of independent dialog sequences, each of which is assigned a human-monitoring requirement that indicates whether (and optionally, to what degree) the dialog sequence requires monitoring by a service agent. In addition, instances of the dialog sequences in calls are prioritized based on an indication of caller intelligibility during (i) prior dialog sequences in the current call, and (ii) prior calls involving the same caller and/or the same contact identifier (e.g., telephone number, email address, Internet Protocol address, etc.). | 02-12-2009 |
20090060163 | Call Establishment in Call Centers Having Heterogeneous Terminals - A method of establishing calls with call centers that have heterogeneous hardware and software is disclosed. In particular, the data processing system for establishing a call selects one or more terminals for call based on the set of capabilities of the respective terminals and on the quality-of-service parameters that characterize the telecommunications channels connecting the terminals. | 03-05-2009 |
20090116635 | Handling of a Session Initiation Protocol-Capable Telecommunications Terminal that is Put on Hold - A method is disclosed that enables the proper treatment of a queued call by a call center, or other data-processing system capable of queuing calls, in which the calling terminal of the queued call has been put on hold by its user. The call center is able to detect the terminal being put on hold by monitoring for a SIP re-INVITE request, in which the session description signifies an on-hold condition. When it is determined that the calling terminal is on hold, the call center modifies its treatment of the queued call. For example, the call center might freeze the call's position in the queue until the calling party takes the phone off of hold. As another example, the call center might allow the call to work its way to the top of the queue, with the terminal on hold, and then maintain the call's position at the top of the queue until a service agent is available. | 05-07-2009 |
20090131015 | Determining Authentication Challenge Timing and Type - An apparatus and methods are disclosed for authenticating users of wireless telecommunications terminals. In particular, the present invention enables the timing and type of authentication challenges to vary based on one or more of: the user's current geo-location, the current day and time, the presence or absence of other nearby users, and the identity of any nearby users. In accordance with the illustrative embodiment, the re-authentication time period (i.e., the length of time between authenticating and re authenticating a user) and the authentication challenge type (e.g., username/password, fingerprint recognition, etc.) can be determined based on these factors. The present invention is advantageous in that it enables the shortening of the re-authentication time and the selection of a more secure type of authentication challenge when it is more likely that a user's wireless telecommunications terminal might be accidentally left behind or stolen. | 05-21-2009 |
20090133106 | Authentication Frequency And Challenge Type Based On Environmental And Physiological Properties - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.). | 05-21-2009 |
20090133117 | Authentication Frequency And Challenge Type Based On Application Usage - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage. | 05-21-2009 |
20090185673 | Voice-Over-IP Call Recording in Call Centers - An apparatus and methods are disclosed for recording calls in a Voice over Internet Protocol (VoIP)-based call center. In accordance with the illustrative embodiment, one of a plurality of data-processing systems in the call center is selected for each call to decompress and decrypt the call's media stream(s). The selection criteria include the type of compression algorithm, the type of encryption scheme, the processing capabilities of the data-processing systems, the current processing load of the data-processing systems, and the available communication bandwidth into and out of the data-processing systems. The selected data-processing system is subsequently incorporated into the call path between the calling SIP endpoint and the call center SIP endpoint, if necessary, and for the duration of the call decompresses/decrypts the media stream(s), generates a copy of the decompressed/decrypted stream(s), and transmits the copied stream(s) to a recording device in the call center. | 07-23-2009 |
20100079256 | Monitoring Responsive Objects in Vehicles - A vehicle for carrying responsive objects is outfitted with a proxy for the responsive objects. The vehicle is also outfitted with a sensor that detects which responsive objects it is carrying and sensor that detect environmental conditions (e.g., temperature, humidity, barometric pressure, etc.) inside and outside of the vehicle. When an inquiry is directed to a responsive object in the vehicle, the proxy intercepts the inquiry and responds with the status of the vehicle. In accordance with the illustrative embodiment, the responsive objects use different protocols, and the proxy is multi-lingual in the sense that it can communicate with the inquirer with the same protocol that is used to communicate with the responsive object. In this way, the illustrative embodiment provides a mechanism for monitoring the location and condition of responsive without some of the costs and disadvantages for doing so in the prior art. | 04-01-2010 |
20100080368 | Determining a use context for a telecommunications terminal user - A technique is disclosed that addresses a problem in managing the correct context in which a telecommunications terminal is utilized by its user—that is, a work use context, a personal use context, and so forth. The disclosed technique enables the automated management of use contexts by a terminal on behalf of its user, across the possibly multiple terminals that are utilized by the user. Each terminal manages the use contexts by utilizing temporal-, schedule-, spatial-, and proximity-related information, in combination with the terminal's current and/or anticipated usage by the user, in order to establish a use context that is currently appropriate for that user at that terminal. As part of establishing a use context, the terminal makes available to its user a predetermined set of user interface properties and a predetermined set of user profile properties. Such properties can include contact lists, applications, server links, logins, and so forth. | 04-01-2010 |
20100082342 | Method of Retaining a Media Stream without Its Private Audio Content - A method is disclosed that enables the handling of audio streams for segments in the audio that might contain private information, in a way that is more straightforward than in some techniques in the prior art. The data-processing system of the illustrative embodiment receives a media stream that comprises an audio stream, possibly in addition to other types of media such as video. The audio stream comprises audio content, some of which can be private in nature. Once it receives the data, the data-processing system then analyzes the audio stream for private audio content by using one or more techniques that involve looking for private information as well as non-private information. As a result of the analysis, the data-processing system omits the private audio content from the resulting stream that contains the processed audio. | 04-01-2010 |
20100082479 | Proxy-based payment system for portable objects - A system is disclosed that features a transport vehicle that carries responsive objects, such as a truck hauling cargo units, in which the objects are equipped to provide payment information when queried. The transport vehicle is outfitted with a proxy that represents the responsive objects. The proxy is configured such that it is better able than the responsive objects to receive payment request signals from a querying device. The vehicle is also outfitted with i) sensors that detect the responsive objects and ii) sensors that detect state information of the vehicle, in which both sets of sensors provide information to the proxy. The object sensors are able to query each responsive object in the same way as the querying device would query those objects in the prior art. The proxy then responds to the query on behalf of the responsive objects. | 04-01-2010 |
20100082484 | Proxy-Based, Transaction Authorization System - A system is disclosed that features a transport vehicle in which a responsive object is present, such as a truck in which a cellphone is present, in which the object is equipped to provide location or other state information when queried. The transport vehicle is outfitted with a proxy that represents the responsive object. The proxy is configured such that it is better able than the responsive object to estimate the responsive object's location or state. The vehicle is also outfitted with i) sensors that detect the responsive object and ii) sensors that detect state information of the vehicle. The object sensors are able to query the object in the same way as the querying device would query that object in the prior art. Using information from the sensors, the proxy then responds to the query on behalf of the responsive object, and an authentication device processes the query. | 04-01-2010 |
20100145739 | Proxy-Based Reservation Scheduling System - A system is disclosed that features a transport vehicle that carries responsive objects in which the objects are equipped to provide state information about their states when queried. The transport vehicle is outfitted with a proxy that represents the responsive objects. The proxy is configured such that it is better able than the responsive objects to receive state query signals from a querying device. The vehicle is also outfitted with I) sensors that detect the responsive objects and ii) sensors that detect state information of the vehicle, in which both sets of sensors provide information to the proxy. The object sensors are able to detect the state of each responsive object or query the object about its state in the same way as the querying device would query those objects in the prior art. The proxy then responds to the query on behalf of the responsive objects. | 06-10-2010 |
20100303216 | Authenticating A User Based On The User's Ability To Distinguish Type-A From Type-B Sounds - A method of authentication is disclosed. When a user registers with an enterprise, the enterprise instructs the user to select sounds from a selection of sounds. Any sound that the user selects is designated as a “type-A” sound and any sound that is not so designated is deemed a “type-B” sound. To authenticate the user, the enterprise combines type-A sounds and type-B sounds into a temporal series of sounds and constructs questions about the series that can only be answered by someone who can recognize and distinguish type-A sounds from type-B sounds. The series of sounds and the questions are then transmitted to the user. If the user is able to answer the questions, then he or she is authenticated, and if not, then he or she is not authenticated. | 12-02-2010 |
20100303224 | Assisting Contact Center Agents and Customers - A method of receiving a call from a first caller that is requesting for assistance with a product. Once the call center receives the call, a call-processing switch routes the first caller to a first agent. Once the caller is routed to the first agent, a first message is transmitted to both the first caller's terminal and the first agent's terminal. After the first message is presented to the first caller and the first agent, the call-processing switch will monitor the communications stream for distress. During monitoring of the communications stream, the call-processing switch will estimate whether a level of distress is present in the communications stream. If it is estimated by the call-processing switch that there is distress present in the communications stream, the call-processing switch will transmit a second message to the first caller's terminal and the first agent's terminal. | 12-02-2010 |
20100322407 | Servicing Calls in Call Centers Based on Caller Geo-Location - Methods are disclosed for servicing incoming calls at a call center based on one or more of the following: the geo-locations of the calling telecommunications terminals; the direction of movement of the calling telecommunications terminals (e.g., north, south, toward a particular geo-location or area, away from a particular geo-location or area, etc.); the speed of movement of the calling telecommunications terminals; and the local time at the calling telecommunications terminal. For example, in accordance with the illustrative embodiments, a person who calls the Home Depot® call center from his or her cell phone while in a Home Depot® store might be given priority over another call that was received earlier but was not placed from a Home Depot® store. | 12-23-2010 |
20110066423 | Speech-Recognition System for Location-Aware Applications - An apparatus and associated methods are disclosed that enable a speech-recognition system to perform functions related to the geo-locations of wireless telecommunications terminal users. In accordance with the illustrative embodiment, a geo-spatial grammar is employed that comprises rules concerning the geo-locations of users, and a speech-recognition system uses the geo-spatial grammar to estimate the geo-locations of wireless telecommunications terminal users and generate actions in location-aware applications, in addition to its usual function of identifying words and phrases in spoken language. The present invention is advantageous in a variety of location-aware applications, such as interactive voice response (IVR) systems, voice-activated navigation systems, voice search, and voice dialing. | 03-17-2011 |
20110069828 | Dynamic IVR Dialog based on Analytics Data - A method comprising receiving, at a call-processing switch, a call from a calling entity in which the calling entity is a natural person and a telecommunications terminal, and, wherein the call received at the call-processing switch comprises (i) the identity of the caller telecommunications terminal, (ii) the identity of the caller, and (iii) the geo-location of the calling entity. Upon receiving the call, the call-processing switch identifies (i) global contextual information, (ii) contextual information at the calling entity, and (iii) contextual information at the call-processing switch, wherein the temporal order and the hierarchical order of menu items in a menu are reconfigured for presentation to the calling entity based on (i) the identity of the caller telecommunications terminal, (ii) the identity of the caller, (iii) the geo-location of the calling entity, (iv) global contextual information, (v) contextual information at the calling entity, and (vi) contextual information at the call-processing switch. | 03-24-2011 |
20110071889 | Location-Aware Retail Application - A method and apparatus are disclosed for potentially increasing sales of a retail organization using location-based technology. The illustrative embodiment comprises a location-aware application that can infer when a first customer is potentially interested in purchasing a particular item during a visit to a retail location, and can infer when there is a second customer at the retail location who is familiar with that item (e.g., a customer who previously purchased that item, etc.). When such a match occurs, the second customer is notified of the presence of the first customer, and of the first customer's potential interest in purchasing the item, and is encouraged to provide assistance to the first customer (e.g., discuss features of the item with the first customer, discuss advantages of the item in comparison to other items, etc.). | 03-24-2011 |
20110137931 | Search Strategy Capture and Retrieval Method - A system that improves searching based on a search term by first capturing successful search strategies and then offering them in the results of a subsequent search based on the same search term. In the illustrative embodiment of the present invention, a search engine collects successful search sequences based on a search term, a database stores the search sequences and then provides them to the search engine in response to subsequent uses of the search term. The search engine comprises a data capture mechanism that gives a searcher a way of indicating when a successful search has been completed. | 06-09-2011 |