Abstract:
A method for granting access to secure information includes receiving from a caller a call for connection with one of a plurality of agents, distributing the call to the agent of the plurality of agents, initiating an active communication session between the caller and the agent for handling the call, and granting to the agent access to the secure caller information using a plurality of access authentication information that includes an active communication session between the caller and the agent.
Abstract:
A unified messaging system includes a unit to store a message operable to store a message sent to a user, the message having a selectable security attribute set to a one of a plurality of levels. A module associated with the unit operates to secure a voice channel used by the user to listen to the message when the selectable security level is set to a high level indicating encryption. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Abstract:
A method for providing a camp-on service for a network service includes detecting a request from a user for access to a network service and detecting that the network service is unavailable. The method includes subscribing the user to a camp-on service for the network service. The method includes detecting that the network service is available and notifying the user that the network service is available.
Abstract:
Multiple authors' voices can be used in a text-to-speech (TTS) conversion of an email thread so that each part of the thread is read in that author's voice. A tag is used to identify which text portion corresponds to which author. Voice characteristics can be originated from an author's sending device or can be centrally stored in a voice characteristic database at a unified messaging server and provided to a recipient of the email thread. A similar approach can be used in a single document such as a change-tracked document that is being edited by multiple authors. The different voice characteristics of authors corresponding to different parts of the document can be accessed for TTS conversion so that a person listening on an audio device (e.g., phone, VoIP phone, cell phone, etc.) can identify the author of a specific part without the use of text or other displayed information. Voice characteristics can be centrally stored and delivered to users of audio devices to be used with a variety of text communications.
Abstract:
The present invention includes methods and devices for providing. According to some implementations, radio frequency identification (“RFID”) tags are positioned at various locations throughout a building. Building locations can be determined from the RFID tags. Emergency service providers may be equipped with a portable device that includes at least one RFID reader for reading the RFID tags. Some implementations involve transmitting the RFID tag data to a control center from which the emergency services are coordinated. The emergency service workers' current and prior locations can be determined by the portable devices and/or at the control center. In preferred implementations, emergency service provider location information can be provided to control center personnel and to emergency service providers in real time.
Abstract:
A system and method for handling a call from a caller to a call center includes an automatic call distributor (ACD) to receive the call and to route the call to an agent. A module operates to compute a rate of speech of the caller, and a display graphically displays the rate of speech of the caller to the agent during the call session. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Abstract:
Techniques for scheduling a task include receiving task data and quorum data. Task data describes tasks to be performed by one or more participants. Quorum data indicates a participant set of one or more participants to perform each task. Current user data may also be received. Current user data describes a current task set of one or more tasks currently being performed by a particular participant. Either or both of the task data and the current user data describe interruptibility through a particular medium of a plurality of communications media. A particular time interval to schedule a particular task is determined based at least in part on the interruptibility of the task or the particular participant. These techniques allow either or both unscheduled tasks and previously scheduled tasks to be moved to time intervals that overlap other scheduled tasks, including tasks currently being performed by a participant.
Abstract:
A method for managing conference resources includes receiving from an endpoint of a user a call to join a multipoint conference between a plurality of participants. Each participant communicates on the multipoint conference through a respective endpoint. The method includes determining that an insufficient amount of resources exist to allow the user to communicate on the multipoint conference and determining participation instructions to enable the user to communicate on the multipoint conference. The method also includes communicating the participation instructions. Location information associated with the user and location information associated with at least one of the plurality of participants may be used to determine the participation instructions to enable the user to communicate on the multipoint conference.
Abstract:
A computer includes a sound card and a processor that runs one or more applications that cause the processor to generate audio signals coupled to the sound card. The processor is operable to execute code that provides a graphical user interface which allows a user to selectively mute the audio signals associated with a set of the one or more applications. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
Abstract:
Disclosed is an active or dynamic RFID tag that actively provides current status information regarding a particular item, as well as mechanisms for recognizing dynamic RFID information read from such RFID tag. Static identifying information regarding the particular item is provided either by the same active/dynamic RFID tag or by a different passive RFID tag. While the RFID tag may passively or actively provide general identification, the RFID actively provides status information that corresponds to changes in the corresponding item's status. In a first implementation, active RFID tags are positioned next to one or more components within a system so that each active RFID tag is powered and transmitting its RFID information when its corresponding component is operational. In contrast, each active RFID tag is positioned so that it is not powered and not transmitting its RFID information when its component is failing. Accordingly, an RFID reader can then know when a system has a failing component when a one of the component's corresponding active RFID tag is not transmitting its RFID information. In this first implementation, the active RFID either transmits or fails to transmit based on its component's status state. In a second implementation, a dynamic RFID is associated with a specific component, set of components, or system, and the dynamic RFID tag dynamically provides an RFID reader with RFID information that changes with its associated item's changing status state. The status state may correspond to any suitable parameter of the item or product that can change over time. Thus, the dynamic RFID provides different transmission frequencies based on different status states of its component or system.