摘要:
Disclosed is an active or dynamic RFID tag that actively provides current status information regarding a particular item, as well as mechanisms for recognizing dynamic RFID information read from such RFID tag. Static identifying information regarding the particular item is provided either by the same active/dynamic RFID tag or by a different passive RFID tag. While the RFID tag may passively or actively provide general identification, the RFID actively provides status information that corresponds to changes in the corresponding item's status. In a first implementation, active RFID tags are positioned next to one or more components within a system so that each active RFID tag is powered and transmitting its RFID information when its corresponding component is operational. In contrast, each active RFID tag is positioned so that it is not powered and not transmitting its RFID information when its component is failing. Accordingly, an RFID reader can then know when a system has a failing component when a one of the component's corresponding active RFID tag is not transmitting its RFID information. In this first implementation, the active RFID either transmits or fails to transmit based on its component's status state. In a second implementation, a dynamic RFID is associated with a specific component, set of components, or system, and the dynamic RFID tag dynamically provides an RFID reader with RFID information that changes with its associated item's changing status state. The status state may correspond to any suitable parameter of the item or product that can change over time. Thus, the dynamic RFID provides different transmission frequencies based on different status states of its component or system.
摘要:
A method for granting access to secure information includes receiving from a caller a call for connection with one of a plurality of agents, distributing the call to the agent of the plurality of agents, initiating an active communication session between the caller and the agent for handling the call, and granting to the agent access to the secure caller information using a plurality of access authentication information that includes an active communication session between the caller and the agent.
摘要:
The present invention includes methods and devices for providing. According to some implementations, radio frequency identification (“RFID”) tags are positioned at various locations throughout a building. Building locations can be determined from the RFID tags. Emergency service providers may be equipped with a portable device that includes at least one RFID reader for reading the RFID tags. Some implementations involve transmitting the RFID tag data to a control center from which the emergency services are coordinated. The emergency service workers' current and prior locations can be determined by the portable devices and/or at the control center. In preferred implementations, emergency service provider location information can be provided to control center personnel and to emergency service providers in real time.
摘要:
Disclosed is an active or dynamic RFID tag that actively provides current status information regarding a particular item, as well as mechanisms for recognizing dynamic RFID information read from such RFID tag. Static identifying information regarding the particular item is provided either by the same active/dynamic RFID tag or by a different passive RFID tag. While the RFID tag may passively or actively provide general identification, the RFID actively provides status information that corresponds to changes in the corresponding item's status. In a first implementation, active RFID tags are positioned next to one or more components within a system so that each active RFID tag is powered and transmitting its RFID information when its corresponding component is operational. In contrast, each active RFID tag is positioned so that it is not powered and not transmitting its RFID information when its component is failing. Accordingly, an RFID reader can then know when a system has a failing component when a one of the component's corresponding active RFID tag is not transmitting its RFID information. In this first implementation, the active RFID either transmits or fails to transmit based on its component's status state. In a second implementation, a dynamic RFID is associated with a specific component, set of components, or system, and the dynamic RFID tag dynamically provides an RFID reader with RFID information that changes with its associated item's changing status state. The status state may correspond to any suitable parameter of the item or product that can change over time. Thus, the dynamic RFID provides different transmission frequencies based on different status states of its component or system.
摘要:
A method for utilizing proxy designation in a call system includes receiving a call from a first user over a first connection with a first endpoint of the first user. The method includes receiving a proxy designation from the first user. The proxy designation comprises a proxy user designated to handle the call for the first user. The method also includes establishing a second connection with the proxy user and detecting the presence of the proxy user over the second connection.
摘要:
A method and apparatus for allocating call resources during a conference call are disclosed. A conference call between a plurality of clients is conducted on a first conference call. The clients communicate media streams to the first conference call for mixing. A media gateway identifies a second call resource to conduct the conference call and mix the media streams, and transfers the conference call from the first call resource to the second call resource without suspending a plurality of mixed media streams received by the clients.
摘要:
A method for handling calls at an automatic call distributor includes receiving from a first caller a first call for distribution to one of a plurality of agents and receiving from the first caller a first request associated with the first call. The method includes linking the first request to one or more additional requests associated with one or more additional calls from one or more additional callers. The method also includes distributing for handling to a first agent of the plurality of agents the first call and the one or more additional calls associated with the one or more additional requests linked to the first request.
摘要:
A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file.
摘要:
A system and method for providing fault tolerant IP services includes establishing a first communication session between an originating telephony device and an application server, through a primary call manager. Failure of the primary call manager may be detected. A second communication session between the application server and a destination telephony device may be established via a back-up call manager. The first communication and the second communication session may be coupled at the application server to establish two-way communication between the originating telephony device and the destination telephony device.
摘要:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.