Abstract:
Systems, methods, software and apparatus to enable a contact center to handle a spike service requests to minimize the disruption of anomalous traffic. An Artificial Intelligence Engine enables the contact center to track, manage, maintain, assign, and route: (1) normal traffic; and (2) anomalous traffic.
Abstract:
A security event that is associated with one or more communication devices is detected. For example, the security event may be an unexpected change in data being sent from a communication device outside an enterprise. In response to detecting the security event, a Virtual Service Network (VSN) is created that isolates one or more communication devices that may pose a security risk. A corrective action to mitigate the security event is then implemented. For example, the corrective action may be to dynamically instantiate a firewall on the VSN that blocks the transfer of data from the communication device outside the enterprise. This allows an administrator to review the security event and take further action if necessary. Because the VSN with the firewall is created dynamically, the network remains secure while the security event is investigated.
Abstract:
Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information unique to the device. For example, the device can record and store when a user first started the device (a date and time of first use), how the device is configured (including any hardware/software identifications, versions, install dates, time when configurations or installations occurred, etc.), etc. All of the information can be collected for a specified period of time (e.g., 30 minutes, 1 hour, etc.), periodically, or continually. This process yields a large collection of data, which can be condensed (a record before condensing the data may be approximately 10 to 50 MB). The data may then be encapsulated in a blockchain. At least a portion of the blockchain may then be exchanged to identify the device.
Abstract:
An image (e.g., a picture) is received from a communication device. The image has associated metadata that is captured while the image is taken. For example, the metadata may be a location, a date, and a time of the picture. One or more object(s) (e.g., a car) along with characteristics of the object(s) in the image are identified. For example, a characteristic may be an action associated with the object, such as a person is running. In response to analyzing the one or more objects for the one or more characteristics in conjunction with the metadata, one or more potential workflows are determined (e.g., a workflow to call the police). A list that identifies the one or more potential workflows is sent to the communication device. Input to select one of the one or more workflows is received, which initiates the selected workflow.
Abstract:
The system and method identify contact information for a first party. The contact information for the first party includes a plurality of communication endpoints of the first party and a plurality of communication applications for the plurality of communication endpoints of the first party. For example, the plurality of communication endpoints may be a home phone and a cell phone of the first party. The plurality of communication applications may be voice, video, text, and/or virtual reality applications of the first party. An electronic communication request is received from the first party to the second party. In response to receiving the electronic communication request from the first party to the second party, a first communication endpoint of the plurality of communication endpoints for the first party and a first communication application of the plurality of communication applications of the first party is selected based on a rule.
Abstract:
The system and method identify contact information for a first party. The contact information for the first party includes a plurality of communication endpoints of the first party and a plurality of communication applications for the plurality of communication endpoints of the first party. For example, the plurality of communication endpoints may be a home phone and a cell phone of the first party. The plurality of communication applications may be voice, video, text, and/or virtual reality applications of the first party. An electronic communication request is received from the first party to the second party. In response to receiving the electronic communication request from the first party to the second party, a first communication endpoint of the plurality of communication endpoints for the first party and a first communication application of the plurality of communication applications of the first party is selected based on a rule.
Abstract:
An acceptance of an end user license is received from a user communication endpoint. The acceptance of the end user license causes a smart contract to associate a number of digital tokens (i.e., digital currency) with a user of the user communication endpoint. For example, the user may electronically agree to abide by terms associated with transactions within a contact center. A communication session is established between the user communication endpoint and the contact center. Input is received that indicates that the user wants to have a transaction with the contact center. For example, the transaction may be that the user wants to be moved to the top of a contact center queue. The transaction causes a change to the number of digital tokens associated with the user. The change in digital tokens is then stored in a blockchain associated with the contact center.
Abstract:
An image (e.g., a picture) is received from a communication device. The image has associated metadata that is captured while the image is taken. For example, the metadata may be a location, a date, and a time of the picture. One or more object(s) (e.g., a car) along with characteristics of the object(s) in the image are identified. For example, a characteristic may be an action associated with the object, such as a person is running. In response to analyzing the one or more objects for the one or more characteristics in conjunction with the metadata, one or more potential workflows are determined (e.g., a workflow to call the police). A list that identifies the one or more potential workflows is sent to the communication device. Input to select one of the one or more workflows is received, which initiates the selected workflow.
Abstract:
Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information unique to the device. For example, the device can record and store when a user first started the device (a date and time of first use), how the device is configured (including any hardware/software identifications, versions, install dates, time when configurations or installations occurred, etc.), etc. All of the information can be collected for a specified period of time (e.g., 30 minutes, 1 hour, etc.), periodically, or continually. This process yields a large collection of data, which can be condensed (a record before condensing the data may be approximately 10 to 50 MB). The data may then be encapsulated in a blockchain. At least a portion of the blockchain may then be exchanged to identify the device.
Abstract:
A contact center, communication system, and server are disclosed. An illustrative contact center is disclosed as being a multichannel contact center. A customer of the illustrative multichannel contact center is allowed to switch their engagement with the contact center from using a first media type to using a second media type. Upon making such a switch of engagement, the customer may be provided with information regarding resources in the contact center, statistics/metrics of those resources, the ability to provide real-time feedback regarding the engagement, and possibly the ability to select a resource from among a plurality of resources. In this way, the customer may be incentivized to switch their method of engagement to a benefit of both the contact center and the customer.