Abstract:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
Abstract:
A system for navigating includes an interface operable to receive position information of a first modality. The position information of the first modality is associated with a navigation unit. The interface is further operable to receive position information of a second modality. The position information of the second modality is associated with the navigation unit. The system also includes a processor coupled to the interface and operable to identify a destination. The system is further operable to navigate to the destination based on the position information of the first and second modalities by switching between the first modality and the second modality.
Abstract:
A method for audibly spelling a word in an audio file includes playing an audio file to a user, receiving a command to spell a word in the audio file from the user, identifying a textual word in a text file corresponding to the word, and audibly spelling the textual word. A text-to-speech system includes a memory and a text-to-speech module. The text-to-speech module generates an audio file from a text file, and stores in the memory locations for words in the audio file corresponding to locations of words in the text file.
Abstract:
A method for communicating an arrival notification includes receiving a first destination and determining a location of the first destination. The method further includes calculating an estimated time of arrival for a mobile endpoint to arrive at the location of the first destination and sending a notification message indicating the estimated time of arrival to a communication device associated with the first destination.
Abstract:
In one embodiment, a conference bridge receives a call initiated by a first caller endpoint. The conference bridge identifies a conference to which the call requests entry and determines whether the conference bridge has available resources to process the call. The conference bridge enables the call to join the conference via a second conference bridge associated with a second caller endpoint participating in the conference according to whether the conference bridge has available resources to process the call.
Abstract:
In one embodiment, a method includes capturing a facial image of a participant to a video conference session from a video stream of the video conference session. A database containing a plurality a stored facial images is then accessed in an attempt to match the facial image with one of the stored facial images. Each stored facial image is associated with information in the database associated with a person, the information being retrieved in the event of a match. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
Abstract:
In on embodiment, techniques for providing alerts to a user when a communication frequency pattern between a user and a contact has not occurred during a pre-determined amount of time are provided. Communication records between the contact and the user can be analyzed to determine if the communication frequency pattern with the contact during the pre-determined amount of time does not meet pre-determined criteria. For example, the criteria may be generate an alert if communications do not occur in the last month, generate an alert if less than five communications occur in the last six months, or any other communication pattern. Also, the content of a communication may be analyzed to determine if a certain topic has been discussed. If a certain topic has not been discussed during the pre-determined amount of time, an alert may also be generated reminding the user that the topic has not been discussed.
Abstract:
A method and apparatus is described to process an incoming telephone call. The method may comprise, at a recipient telephone system, receiving the incoming call including speech and identifying when a Do-Not-Disturb option is set. The Do-Not-Disturb option may identify that a user has requested not to receive telephone calls. Content analysis may be performed to identify content of the speech and a reference database may be interrogated based on the content to identify an associated rule. Thereafter, the Do-Not-Disturb option may be selectively overridden based on the associated rule. The content analysis may comprise performing speech recognition on the speech to obtain a reference word/phrase and interrogating the reference database with the word/phrase to identify the associated rule. A method of configuring a Do-Not-Disturb option in a telephone system is also described that allows a user to define reference words and associated rules.
Abstract:
A method for controlling operation of an integrated mobile communication and broadcast program reproduction device and of operating the device includes monitoring an occurrence of a trigger event at the device; and upon occurrence of the trigger event, recording a broadcast program signal received by the device. An integrated mobile communication and broadcast program reproduction device has a trigger event monitor and a broadcast program recorder for recording a broadcast program when a trigger event occurs. A trigger event may be receipt of an incoming call, the making of an outgoing call, the identification of predetermined content in a received program and the start of a predetermined program. Different trigger events may be prioritized. Recorded material may be reproduced, with broadcast material being received being recorded whilst previously recorded material is reproduced.
Abstract:
A method for reserving resources in a conferencing system includes receiving a conference reservation request for a first conference comprising at least one invitee. The method also includes reserving for the at least one invitee a conference resource to allow the at least one invitee to participate in the first conference using the conference resource. The conference resource is usable by the at least one invitee to participate in one or more additional conferences occurring simultaneously with the first conference.