Patent classifications
H04M2203/6009
Door-knocking for teleconferencing
A method for teleconferencing between a monitoring device and a user device includes establishing an audio channel connection between the user device and the monitoring device of a remote user; displaying an entry code on a display of the monitoring device; obtaining from a user of the monitoring device a verbal confirmation of the entry code; and, in response to receiving the entry code from the remote user, enabling a camera of the monitoring device. In response to the verbal confirmation, the entry code is sent to the remote user. Enabling the camera of the monitoring device establishes an audio-visual connection between the user device and the monitoring device.
CLOUD-BASED CONTACTS MANAGEMENT
Various embodiments disclosed herein provide for a system for managing and adding contacts. A first mobile device can display an image that can be recorded by a second mobile device. Similarly, the first mobile device can record an image displayed by the second mobile device. The image data from each mobile device can be transmitted to a cloud based contact management system, which can match the images to contact information associated with each mobile device. The contact management system can then push the contact details of each mobile device to the other mobile device, and/or link social media accounts associated with each mobile device. The contact management system can also store connection records that represent an ongoing authorization to push contact information changes from each user to the other, respectively.
SOCIAL NETWORK SYSTEMS AND METHODS OF OPERATION
A method of forming unique, private, personal, virtual social networks on a social network system that includes a database storing data relating to corresponding user entities. The method includes: a first user entity sending an invitation to a second user entity, recording in the database the second user entity as a direct contact of the first user entity and determining that third user entities, directly connected to the second user entity, are indirect contacts. A unique, personal, social network formed from direct and indirect contacts is thereby created for each user entity. Each user entity is able to control privacy of its data with respect to other user entities depending on the connection factor to that other entity and/or that other entity's attributes. Each user entity is able to take the role of provider or participant in applications where the provider provides an item or service to the participant.
CALL ORIGINATION VALIDATION FOR INCOMING CALLS WITHIN A WIRELESS COMMUNICATION NETWORK
A computer-implemented method for validating the origination of an incoming customer call on a wireless communication network may include receiving a SIP invite message at the wireless communication network when the call is initiated, determining whether the SIP invite message includes one or more indicators indicating that the call originated within the wireless communication network from a device with a SIM registered in the wireless communication network, and writing a classification code to a database indicating that the call is validated if the SIP invite message includes the one or more indicators. The method may further include receiving the call at an agent computer device with caller identification information, querying the database via the agent computer device according to the caller identification information to obtain the classification code of the customer call, and suppressing a step used for call authentication if the classification code indicates that the call is validated.
Protecting sensitive information provided by a party to a contact center
In one embodiment, a secure mechanism operates in conjunction with a three-way bridge in a contact center to protect against inadvertent exposure of sensitive information provided during a call. During the call, an agent may bridge on an interactive voice response system (“IVR”) onto the call prompting the party to enter sensitive information, such as a credit card account number, to effect a payment. The information may be provided by the party using dual-tone multiple frequency (“DTMF”) tones or speech. The IVR may provide a confirmatory announcement indicating the sensitive information received. A switch may be controlled by the IVR so that any sensitive information expected from the party or provided by the IVR in a confirmatory announcement is not presented to the agent or to a recording system. In this manner, the IVR suppresses the exposure of sensitive information to the agent and/or a recording system.
Method and apparatus for data management of third party services
Aspects of the subject disclosure may include, for example, a method comprising caching, by a server comprising a processor, a subscriber profile in a network repository to create a cached subscriber profile. The cached subscriber profile comprises a replica of stored subscriber data. The method also comprises updating the cached subscriber profile in accordance with subscriber use of a first application from a first application provider to produce a first updated version of the cached subscriber profile. The method further comprises updating the first updated version of the cached subscriber profile in accordance with subscriber use of a second application from a second application provider to produce a second updated version of the cached subscriber profile. The first and second updated versions of the cached subscriber profile are accessible by the first application provider and by the second application provider. Other embodiments are disclosed.
Transmission management system, transmission system, transmission management method, and storage medium
A transmission management system for controlling data transmission between a first transmitting terminal and a second transmitting terminal is provided. The transmission management system includes a receiving unit that receives location information about the second transmitting terminal; and a transmitting unit that transmits first presence information about the first transmitting terminal to the second transmitting terminal depending on first location information about the second transmitting terminal received by the receiving unit, and transmits second presence information about the first transmitting terminal to the second transmitting terminal depending on second location information about the second transmitting terminal received by the receiving unit.
System and method for secure transmission of data signals
A call processing system comprises first and second interfaces configured to selectively pass voice signals and data signals between caller and agent to enable communication. An attenuation means is configured to selectively attenuate voice and data signals passing from the first interface to the second interface to impede the agent from receiving voice and data signals from the caller. While a string of discrete data signals is received at the first interface, the system is configured to operate exclusively in each of: a first mode in which voice and data signals are permitted to pass from the first interface to the second interface to enable the agent to receive them from the caller; and a second mode in which the attenuation means attenuates voice and data signals passing from the first interface to the second interface to impede the agent from receiving them from the caller.
CUSTOMER JOURNEY CONTACT LINKING TO DETERMINE ROOT CAUSE AND LOYALTY
Systems and methods include identifying sets of communications using AB testing based on a difference in metadata values between the sets for a first type of metadata, determining at least one similarity between communications in a first set based on metadata values of a second type of metadata, determining at least one similarity between the communications in the second set based on metadata values of the second type of metadata or a third type of metadata, comparing the at least one similarity from the first set to the at least one similarity of the second set to identify differences in metadata values or types of metadata, and determining, based on the differences, a suggested action for an agent for a future communication with respect to at least one of a desired script, a target phrase, or a desired acoustic characteristic.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CALL TRACKING USING CALLER IDENTIFICATION IN CROSS-CHANNEL MARKETING AUTOMATION MANAGEMENT SUPPORT WITH INTELLIGENT PRIVACY PROTECTION
A system, methods, and computer program products for performing call tracking in a novel way wherein caller ID data is obfuscated so as to preserve a caller's privacy by protecting their telephone number.