Abstract:
A computer-implemented system and method for individual record encryption is provided. A plurality of records associated with incoming calls to a call center are maintained. A unique encryption key is randomly generated for each record. The records are each encrypted using the encryption key generated for that record. The keys are stored in a location separate from the encrypted records.
Abstract:
A system and method for performing distributed speech recognition is provided. Audio data is received on a main recognizer and on each of a plurality of secondary recognizers. Secondary grammars are transmitted to each of the secondary recognizers. The secondary recognizers each perform speech recognition on the audio data using the secondary grammar for that secondary recognizer. A new grammar is constructed based on results of the speech recognition by each of the secondary recognizers. The main recognizer performs speech recognition on the audio data using the new grammar.
Abstract:
A system and method for transmitting voice messages to a discussion group is provided. Users signed-on to a voice message server are identified. Each signed-on user is associated with one or more discussion groups and a personal communication device. The voice message server receives a voice message from one of the signed-on users via the personal communication device associated with that signed-on user and a discussion group to which the voice message is to be sent. The voice message from the signed-on user is provided to the other signed-on users in the discussion group.
Abstract:
A system and method for user notification regarding detected events is provided. A plurality of messages are accessed from one or more sources. Those of the messages associated with one or more potential events are identified. The potential events are detected based on the messages. At least one of the potential events is identified as an event based on a number of messages associated with that potential event. Metadata regarding the event is extracted by from the messages associated with the event. Information regarding the event is obtained from a third party different from the one or more sources of the monitored messages. A message regarding the event is generated, the generated message comprising the extracted metadata and the information. At least one user associated with the event is identified, wherein the at least one user is notified of the event using the generated message.
Abstract:
A computer-implemented system and method for facilitating interactions via automatic agent responses is provided. Communication during an interaction between a user and an agent is monitored and a request from the user is identified during the interaction. A list of candidate responses to the request is compiled and provided to the agent. Time is measured upon providing the list to the agent and a predetermined amount of time is applied to the measured time. When the measured time exceeds the predetermined amount of time and the agent has failed to provide a response to the user, one of the candidate responses from the list is automatically selected and provided to the user.
Abstract:
A computer-implemented system and method for performing distributed speech recognition is provided. Audio data is collected. A main grammar and secondary grammars are simultaneously provided for the audio data. Each secondary grammar includes an independent grammar. Speech recognition is simultaneously performed on the audio data using each secondary grammar. A new grammar is constructed for the audio data based on the main grammar template using results of the speech recognition. Further speech recognition is performed on the audio data using the new grammar.
Abstract:
A system and method for providing agent guidance is provided. Speech communicated by a user to an agent is monitored during a call within a call center. Traits of the user are identified during the call based on the speech of the user. A determination is made as to how likely the user is to accept an offer provided by the agent based on the user traits. The user is classified as belonging to one of a plurality of stages of persuasion based on the likelihood determination, and guidance is provided to the agent based on classification of the user in at least one of the classes. The offer is provided to the user based on the guidance.
Abstract:
A system and method for identifying special information within a voice recording is provided. Training to identify a speaker is performed. A voice recording including utterances by at least two speakers is processed to identify segments of the voice recording provided by the speaker. Remaining segments of the voice recording are designated as provided by another speaker. A text element that corresponds to a request for information is identified in at least one of the segments of the voice recording provided by the speaker. A predetermined duration associated with the identified text element is applied to one of the segments of the voice recording of the other speaker occurring immediately after the segment of the voice recording from the regular speaker with the identified text element. The utterances from the other speaker occurring within the predetermined duration are identified as special information and rendered unintelligible.
Abstract:
Portions of a customer interaction recording that include sensitive information can be identified by performing character recognition on the images in the recording. Field identifiers identified through character recognition are compared to a list of known identifiers of fields for entry of sensitive information. Based on the comparison, field identifiers identified through character recognition can be recognized as sensitive information field identifiers. Images that include the sensitive information field identifiers can be blurred in the stored recording. Further, agent behavior in relation to the screens with fields for entry of sensitive information can be analyzed for purposes such as identifying potentially malicious agent behavior, an agent being in need of assistance, or a recurring customer issue.
Abstract:
A computer-implemented system and method for storing and retrieving sensitive information is provided. Segments of sensitive data each encrypted via a single use encryption key and associated with a reference code are maintained. The reference code is received for at least one of the segments of encrypted sensitive data and the encryption key is recreated based on the received reference code. The encrypted sensitive data segment is decrypted using the recreated encryption key and the decrypted sensitive data segment populates a field in a display.