摘要:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
摘要:
A system for navigating includes an interface operable to receive position information of a first modality. The position information of the first modality is associated with a navigation unit. The interface is further operable to receive position information of a second modality. The position information of the second modality is associated with the navigation unit. The system also includes a processor coupled to the interface and operable to identify a destination. The system is further operable to navigate to the destination based on the position information of the first and second modalities by switching between the first modality and the second modality.
摘要:
A method for audibly spelling a word in an audio file includes playing an audio file to a user, receiving a command to spell a word in the audio file from the user, identifying a textual word in a text file corresponding to the word, and audibly spelling the textual word. A text-to-speech system includes a memory and a text-to-speech module. The text-to-speech module generates an audio file from a text file, and stores in the memory locations for words in the audio file corresponding to locations of words in the text file.
摘要:
A system and method for reserving conference resources for a multipoint conference includes receiving a request for a multipoint conference reservation and a list of participants. Communication paths for a plurality of the participants may be predicted. A multipoint control unit resource requirement may be estimated. A first multipoint control unit may be selected to host the multipoint conference. The availability of the multipoint control unit resource requirement at approximately a scheduled start time of the multipoint conference may be determined. A second multipoint control unit may be selected to host the multipoint conference, if the first multipoint control unit does not have the multipoint control unit resource requirement available at the scheduled start time and for the duration of the conference.
摘要:
Disclosed are methods and apparatus for methods and apparatus for automatically contacting a service center for one or more particular products, as well as contacting other types of entities with respect to any type of item. In a first embodiment, each item includes a radio frequency identification (RFID) of the particular products that is used to automatically contact a service center or the like. In a second embodiment, the RFID of the particular product is automatically sent to the service center or the like. In the first embodiment, the RFID of each product contains contact information, such as a 1-800 telephone number, a URL address, or email address, for a particular service center or the like. In one implementation, an RFID reader is coupled with a communication device, such as a telephone or computer device, and the user uses the RFID reader to scan an RFID of a particular item (e.g., a malfunctioning product). The relevant service center or the like is then contacted based on the RFID scan. For example, the user is connected to an agent at the relevant service center via a telephone or computer network. In the second embodiment, when a service center (or the like) needs RFID tag data for a particular item, a user may select a “send” option (e.g., on the communication device or reader) to have such RFID tag data automatically transmitted to the service center or the like.
摘要:
A method and apparatus to provide speaker selection in a multi-party conference call is described. The method may comprise processing a speaker queue for at least one new speaker and monitoring when a number of active speakers is less than a predetermined number of active speakers. When less than the predetermined number, the method automatically, without human intervention, adds a new speaker from the speaker queue. A request for a new speaker may be received via a communication channel independent of a voice communication channel of the multi-party conference call. The request may be received from the conference endpoint via a voice communication channel of the multi-party conference call. In an example embodiment, new speakers in the speaker queue may be prioritized based a class of service associated with each new speaker. Priority may be given to a new speaker with a higher associated class of service.
摘要:
Techniques are provided for receiving multimedia from a plurality of endpoints participating in a conference session, including multimedia from an endpoint that was muted during the conference session. A muting state is detected at a particular endpoint during the conference session and the multimedia from the particular endpoint is recorded even though it is not forwarded and rendered to the other endpoints during the conference session. Information associated with the multimedia data for the conference session is stored to indicate the time period during which the muting state was detected at the particular endpoint. Techniques are also provided for granting access at a later time to the stored multimedia data for conference session, including access controls to the muted multimedia.
摘要:
Techniques are provided to automatically edit multimedia associated with call center sessions when producing monitoring and/or recording copies of the multimedia. Multimedia associated with a session between a caller and a call center agent is received. The multimedia from the session is analyzed to determine when sensitive information is to be revealed. The multimedia is edited to mask the sensitive information in a monitored and/or recorded copy of the multimedia.
摘要:
A method for caller association includes receiving from a user a first request for a number that may be called to reach the user and generating a first number that may be called to reach the user. The method includes communicating the first number to the user and receiving from the user a first identifier associated with the first number. The first identifier comprises an identifier of a first party. The method includes receiving a first call for the user at the first number and communicating the first call and the first identifier to the user. The method may include storing the first identifier associated with the first number in a memory and retrieving the first identifier associated with the first number from the memory upon receipt of the first call for the user at the first number.
摘要:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.