Abstract:
Interactions between agents of a contact center and customers provide the bulk of many communications and generally work well, except when the customer is deaf or mute. Customers that sign would often prefer to conduct interactions in sign language but the pool of agents having such skills is limited. By providing systems and methods to alter an image of a non-signing agent, a customer may be presented with an image of a signing agent. Additionally, systems and methods herein enable a non-signing agent to be presented with generated speech and/or text translated from the signing gestures provided by the image of the signing customer.
Abstract:
A robotic customer service agent (“robot”) is provided to a service location. The robot may present a number of security concerns that, whether realized or not, present barriers to acceptance. A robot is provided that is determined to be in compliance with a security criteria. The security criteria may be related to software (e.g., running anti-virus software), hardware (e.g., an added camera is secure), communication (e.g., no unexpected communications), or other aspect. Should the robot be in compliance, it may operate in a secure mode, such as to perform or access more sensitive information. If the robot is not in compliance, the robot is operated in a non-secure mode, such as to block data transmissions, information capturing, or other process or operation that may present a security risk.
Abstract:
Acceptance of robotic service agents may be improved if robots are compliant with a monitoring program of a third party. A robot may be allowed to perform certain operations if monitored or prevented from such operations if unmonitored. If authorized, a robot may be able to perform certain operations unmonitored; however, the third party may report the authorized exception. Should the robot be unmonitored, and absent unauthorized exception, the robot performs only those operations approved for unmonitored mode. Otherwise, the robot is enabled to perform tasks approved for monitored and unmonitored mode. The third party may report the monitoring, lack of monitoring, and compliance with a monitoring program accordingly.
Abstract:
Robotic customer service agents may require verification of a human. The verification may be of the identity of the human and/or a capability of the human. If verified, the robot operates in a verified mode and otherwise operates in a non-verified mode. The robot performs a customer service task in one of the verified mode or the non-verified mode, which may alter, omit, or substitute actions as appropriate for the mode.
Abstract:
Robotic customer service agents may require verification of a human. The verification may be of the identity of the human and/or a capability of the human. If verified, the robot operates in a verified mode and otherwise operates in a non-verified mode. The robot performs a customer service task in one of the verified mode or the non-verified mode, which may alter, omit, or substitute actions as appropriate for the mode.
Abstract:
Banks and other financial institutions struggle to determine when to authorize and when to deny a transaction, such as credit card transactions, for customers. Customers, such as those who travel infrequently or otherwise make purchases at unusual locations, may have transactions denied at such locations. Conversely, stolen credit cards or their numbers, are often utilized in atypical locations for the customer. The provision of a secondary indicator of the customer's location to a bank, such as via an application or a check-in operation on a social media website, allows the bank to determine that the customer is likely at a location associated with a prospective transaction. Confirming a customer's location via a check-in operation, which may require the customer's device and/or social media credentials, provides an extra level of security while minimizing undue denial of legitimate transactions.
Abstract:
Contact centers strive to provide quality customer service in a timely manner as well as to maintain profitability to ensure continued business operations. Having optimal agents available to accept every work item a customer may have is expensive and, when such skills are unneeded, wasteful. Once a work item is received, an optimal agent or agents are identified; however, if the wait time is unacceptable, the work item may be passed to a suboptimal agent who is able to process a portion of the work item. Once the optimal agent becomes available, the work item is joined by the optimal agent or, alternatively, a second non-optimal agent is brought in to address a second portion of the work item.
Abstract:
An automated system for message analysis whereby messages within a given category may be identified and processed as a category connote. While a domain of messages may be monitored and processed in the due course of business, connote message are different. For example, a number of messages may fall into a domain of “poor airline food.” Such messages may be processed in the due course of business. However, a message with a different aspect, such as, “I found glass in my food,” may be initially identified as begin within the domain of “poor airline food,” and processed further to distinguish the message as being a connote with regard to the “poor airline food” category and warranting special handling.
Abstract:
The delivery of goods to a customer comprises a substantial portion of human activity. To correct address errors and/or to more precisely locate delivery locations, systems are provided to assist human, human operated vehicle, or autonomous vehicles to locate a delivery point. Often the location of a delivery point is inaccurate or imprecise. GPS and other coordinate systems often fail or are imprecise without an unobstructed view of the sky. Even with coordinates available, the delivery point may be different from the coordinates or, more commonly, coordinates that are different from some standard point within a postal address associated with the coordinates. Providing a delivery system that utilizes a broadcasted identifier, such as an identifier associated with the order of the item, the delivery of the item may be made proximate to the source of the broadcasted identifier or further refined using the broadcasted identifier as a reference.
Abstract:
Agents of a contact center process work items for clients of the contact center. Agents may, at some point, experience “burnout.” Detecting early signs, and automatically mitigating the burnout allows agents to maintain interest in their work and avoid expensive training of new agents and lost experience of burnt-out agents. Agents may be monitored for single events and/or a pattern of events indicating burnout. Automatic detection and response to the burnout provides agents indicating burnout to have more interesting, less difficult, or otherwise more favorable working conditions. Feedback monitoring determines if the mitigation efforts are successful. If not, and an agent is burnt out and likely to quit, measures may be automatically launched to prevent the burnt-out agent from “infecting” other agents.