摘要:
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user.
摘要:
A processor-implemented method, system, and/or computer program product retrieves a voice print of a caller to a call network. A processor generates a first voice print, a second voice print, and a third voice print of a caller who makes a call to a call network. The first voice print, the second voice print, and the third voice print are consolidated into a consolidated voice print. In response to a request for a particular voice print, the requested voice print is selectively retrieved from first voice print, the second voice print, and the third voice print in the consolidated voice print, and then sent to the requester.
摘要:
A method, a system, and an apparatus for permitting a user to remain in contact with at least one other person. The present invention provides a method, a system, and an apparatus that is capable of enabling a user to remain in contact with others through a service that checks contacts set up in a predetermined contact list. The contact list is then contacted and the user is contacted with the results. As such, the present invention permits the user to remain in contact with a significant number of entities while saving time and effort by ensuring the user is only contacted with certain information. The system and method also permits the user to remain in contact even when the user is unavailable.
摘要:
A system is presented for logging and recording a call to a call network. The system comprises a voice print logic for generating a voice print of a caller who is making a call to a call network. A telecom routing switch generates a correlated telecom router switch log file by appending the voice print of the caller to a telecom router switch log file for the call. A telecom software system generates a correlated telecom software system log file by appending the voice print of the caller to a telecom software system log file for the call. A contact center agent generates a correlated contact center agent log file by appending the voice print of the caller to a contact center agent log file for the call. The voice print is utilized to retrieve and to consolidate the correlated telecom router switch log file, the correlated telecom software system log file, and the correlated contact center agent log file into a single correlated file for the call.
摘要:
An administration method and system. The method includes receiving by a computing system, a telephone call from an administrator. The computing system presents an audible menu associated with a plurality of computers to the administrator. The computing system receives from the administrator, an audible selection for a computer from the audible menu. The computing system receives from the administrator, an audible verbal command for performing a maintenance operation on the computer. The computing system executes the maintenance operation on the computer. The computing system receives from the computer, confirmation data indicating that the maintenance operation has been completed. The computing system converts the confirmation data into an audible verbal message. The computing system transmits the second audible verbal message to the administrator.
摘要:
A method, a system and a computer program product for determining one or more characteristics of a caller, such as the mood, gender, age, and urgency of the caller, utilizing the biometric characteristics of the caller. One or more biometric characteristics are detected when a request to place an outgoing call to one or more destinations is received at a first telecommunication device. When the request to place an outgoing call is a verbal request, one or more biometric voice samples are obtained. The biometric voice samples comprise the biometric characteristics of the caller. The biometric characteristics are extracted from the biometric voice samples, encoded into a datagram, and transmitted from the first telecommunication device to the outgoing call destination (i.e. a second telecommunication device). When the biometric characteristics are analyzed at the second telecommunication device, a display is generated depicting the mood, gender, age, urgency or other characteristics of the caller associated with the incoming call.
摘要:
A method, system and computer-usable medium for optimizing retrieval of customer data needed to handle a call are presented. The method includes the steps of receiving a call at a data center; initiating a query for a business data related to the call; creating a key that identifies the business data related to the call; pre-fetching the business data using the key with a lookup table; caching the pre-fetched business data; attaching the key to the call; routing the call with the attached key to a desktop agent; receiving a request from the desktop agent for the pre-fetched business data; retrieving the cached pre-fetched business data; and transmitting the cached pre-fetched business data to the desktop agent.
摘要:
Conversational biometrics and speech recognition are used by an IVR contact/call center during call hold to affect call handling/routing. A caller's (user's) behavioral response, such as an utterance or other spoken reaction to being put on hold by the IVR contact/call center, etc., can be recognized, captured and analyzed. Business rules analyze the caller's behavior in real time during a caller hold period. Such business rules can be fed back into the call center system and this information can be used to provide opportunities to affect routing priorities for a particular caller based upon information learned by the data that is captured and analyzed.
摘要:
A system and method to select and retrieve contact center transactions from a set of transactions stored in a queuing mechanism. The system includes an interactive voice response system configured to accept at least one call and dynamically populate a web form with call data associated with the at least one call. The system also includes a queuing engine configured to allow a call agent to access the call data prior to the at least one call being connected to the call agent.
摘要:
A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user.