Patent classifications
H04M2201/405
Virtual office receptionist
Provided is an office receptionist system formed from a distributed set of system valets and a system concierge. The system valets record and pass human inquiries at various points of ingress and egress to the system concierge. The system concierge parses each inquiry, determines the type of inquiry being made, and further determines whether the inquiry provides sufficient information for the determined inquiry type. The sufficiency of the inquiry is determined from a rule set that further defines different data sources from which the system concierge obtains data elements for generating a response to the inquiry as well as the actions to perform as part of responding to the inquiry. The response is returned to the system valet originating the inquiry for playback thereon.
Hardware command device with audio privacy features
A hardware device may receive a command from a user and then respond to that command with information. Such commands may cause an audible response to be broadcast via speaker. A device's audio reply to a command may include sensitive details that a person may not wish to share. When a device makes such an audio reply, it may therefore divulge sensitive information to one or more other people that are in listening range. A person utilizing such a device may thus inadvertently compromise his own privacy. The present disclosure includes techniques that are usable to mitigate such privacy exposures by detecting a presence of a second person in a surrounding environment and creating a reply that omits some or all of the sensitive information that might have otherwise been broadcast by a command device.
REPRIORITIZING WAITLISTED CALLERS BASED ON REAL-TIME BIOMETRIC FEEDBACK
Techniques for reprioritizing waitlisted callers using biometric feedback. A biometric aspect of a calling user is monitored in real time via a sensor. A digital output characterizing an emotional state of the user is generated. The digital output is encoded and transmitted to a server via multi-frequency signaling. The server decodes the digital output and reprioritizes the calling user relative to other calling users in the waitlist, in order to expedite the calling user being serviced.
Semiautomated relay method and apparatus
A system and method, the method comprising receiving, at a processor, an hearing user's (HU's) voice signal from an HU participant during a first call, wherein the first call is a communication across a communication network, the processor programmed to perform the steps of, examining at least a portion of the voice signal to determine an identity of the HU, identifying a voice model associated with the identity of the HU, wherein the voice model comprises a plurality of rules, and further wherein each of the plurality of rules is a rule for transcribing a word in the HU voice signal into text and generating a text output, wherein the text output is a transcription of a plurality of words identified in the HU voice signal, and further wherein at least one of the plurality of words identified is identified using at least one rule of the plurality of rules.
System and methods for easy, secure, error free and controlled information sharing via audio communication
Embodiments herein disclose methods and systems for a simple, error free, secure, and controlled information sharing through an audio communication. The system is configured to facilitate the audio communication, generate permanent unique identification number, store map between permanent unique user identification number to the user information to share, facilitate secure and controlled information sharing and easy retrieval of error free shared information through a secure communication mechanism between a client application and a centralized server application. Embodiments herein facilitate user to communicate the permanent unique identification number over the audio communication in place of error free information to be communicated with a caller, by executing the client application and the centralized server application.
ACTIVE CALL LAWFUL INTERCEPTION AND PRESERVATION TECHNIQUE
A communication system and method for identifying a threatening and/or illegal call includes (1) a telephony network, (2) a first user device in communication with the telephony network, wherein the first user device is assigned to a first user who is an organization member, (3) a second user device in communication with the telephony network, wherein the second user device is assigned to a second user who is not an organization member, (4) a communications server in communication with at least the first user device, (5) a natural language processor (NLP) in communication with the communications server; and (6) a threatening language database in communication with the communications server and/or the NLP. The NLP is configured to monitor language used by the second user during a communication with first user to identify threatening language by comparing the language used by the second user to the threatening language in the threatening language database.
Systems and methods for prioritizing emergency calls
Systems for and methods of determining the priority of a call interaction include receiving a call interaction from a call center; validating, by a validation and transcription engine, that the call interaction is authentic; converting, by the validation and transcription engine, the call interaction into text; calculating, by the data calculation engine, a priority of the call interaction from the text and organization, location, and time information in the text by determining an important of words in the text and correlating the words to a priority class using a pre-trained algorithm that is trained on emergency-type and emergency services-type language; determining that the call interaction should be transmitted to the call center for initial handling by a call center agent; and transmitting the call interaction, the calculated priority, and the extracted information to the call center.
System and methods for easy, secure, error free and controlled information sharing via audio communication
Embodiments herein disclose methods and systems for a simple, error free, secure, and controlled information sharing through an audio communication. The system is configured to facilitate the audio communication, generate permanent unique identification number, store map between permanent unique user identification number to the user information to share, facilitate secure and controlled information sharing and easy retrieval of error free shared information through a secure communication mechanism between a client application and a centralized server application. Embodiments herein facilitate user to communicate the permanent unique identification number over the audio communication in place of error free information to be communicated with a caller, by executing the client application and the centralized server application.
Personal Voice-Based Information Retrieval System
The present invention relates to a system for retrieving information from a network such as the Internet. A user creates a user-defined record in a database that identifies an information source, such as a web site, containing information of interest to the user. This record identifies the location of the information source and also contains a recognition grammar based upon a speech command assigned by the user. Upon receiving the speech command from the user that is described within the recognition grammar, a network interface system accesses the information source and retrieves the information requested by the user.
Cross-linking call metadata
A device for determining a behavioral deviation for an individual. The device includes a memory and a processor. The memory may store instructions. The processor may be coupled to the memory. When the processor executes the instructions, the processor may: generate a profile for a first individual using data associated with an identifier for the first individual, wherein the profile comprises behavioral information that matches a characteristic of the data; receive, from a first electronic device, a first multimedia item representing a first communication by the first individual; determine that a characteristic of the first multimedia item does not match the characteristic of the data; and send a first notification to a second electronic device indicating that a behavior of the first individual deviated from the behavioral information of the profile.