Abstract:
A communication endpoint is configured to record content which may be audio content, video content, and/or other content and send the recorded content to an endpoint, such as a contact center. In one instance, the communication endpoint initiates content recording upon the detection of an outbound user initiated request, such as an emergency request, and transmits the recorded content when the communication session has been established. As another example, the communication endpoint may record content in a circular manner such that a latest content corresponding to a predetermine amount of time may be transmitted when the communication session has been established.
Abstract:
Verification of privacy of Web Real-Time Communications (WebRTC) media channels via corresponding WebRTC data channels, and related methods, systems, and computer-readable media are disclosed. In this regard, in one embodiment, a method for verifying privacy of a WebRTC media channel comprises establishing the WebRTC media channel between first and second WebRTC clients using a keying material. The method further comprises establishing a corresponding WebRTC data channel between the first and second WebRTC clients using the keying material, and negotiating, in the WebRTC data channel, a cryptographic key exchange. The method also comprises generating a first and a second Short Authentication String (SAS) based on the cryptographic key exchange in the WebRTC data channel. The method further comprises displaying the first SAS and the second SAS, such that a mismatch between the first SAS and the second SAS indicates an existence of a man-in-the-middle (MitM) attacker.
Abstract:
Back-to-back Web Real-Time Communication (WebRTC) virtual agents, and related methods, systems, and computer-readable media are disclosed herein. In one embodiment, a method for providing back-to-back virtual WebRTC agents comprises receiving, by a WebRTC server executing on a computing device, a WebRTC offer/answer exchange between first and second WebRTC clients. The method further comprises instantiating one or more virtual WebRTC agents. The method also comprises establishing a first WebRTC interactive flow between the first WebRTC client and one of the one or more virtual WebRTC agents, and a second WebRTC interactive flow between the second WebRTC client and one of the one or more virtual WebRTC agents. The method additionally comprises directing a content of the first WebRTC interactive flow to the second WebRTC interactive flow, and a content of the second WebRTC interactive flow to the first WebRTC interactive flow, via the one or more virtual WebRTC agents.
Abstract:
A network-connected access point is disclosed having a network access transceiver configured to provide access to a network for computing devices in communication therewith. The network access point also comprises one or more environmental sensors each configured to determine at least one environmental characteristic value that quantifies an environmental characteristic at a location distant from the network access point. Without limitation, environmental characteristics include temperature, humidity, sound, light, motion, and air quality, The network access point further comprises a sensor controller in communication with the at least one environmental sensor. The sensor controller may be separate from the network access transceiver, or may be part of the same component. The sensor controller is configured to receive the at least one environmental characteristic value from the at least one environmental sensor, and transmit information based on the at least one environmental characteristic value to a network.
Abstract:
Providing automated progress updates in a contact center including detecting an activity by a resource of the contact center related to a customer interaction occurring via a customer communications channel between the resource and a customer. The activity comprises an interaction between the resource and one or more additional resources associated with the contact center occurring via a second communications channel. In response to detecting the activity by the resource, a notification comprising a progress update related to the customer interaction is automatically generated. The notification is transmitted, via the customer communications channel, to a customer device associated with the customer interaction.
Abstract:
Embodiments disclosed provide access to Traversal Using Relays around Network Address Translation (TURN) servers using trusted single-use credentials, and related methods, systems, and computer-readable media. In one embodiment, a method comprises receiving, by a TURN authentication agent, a request for a TURN server credential. Responsive to determining that the request is authorized, the agent generates a trusted single-use credential and transmits it to the requestor. Using this trusted single-use credential allows untrusted clients to access a TURN server without exposing a userid/password combination. In another embodiment, a method comprises receiving, by the TURN server, a request for a TURN service. The server challenges the request, and receives a userid and a password. Responsive to determining that the userid and the password constitute a trusted single-use credential and responsive to determining that the request is authorized, the server provides the TURN service for the requestor.
Abstract:
Embodiments disclosed provide access to Traversal Using Relays around Network Address Translation (TURN) servers using trusted single-use credentials, and related methods, systems, and computer-readable media. In one embodiment, a method comprises receiving, by a TURN authentication agent, a request for a TURN server credential. Responsive to determining that the request is authorized, the agent generates a trusted single-use credential and transmits it to the requestor. Using this trusted single-use credential allows untrusted clients to access a TURN server without exposing a userid/password combination. In another embodiment, a method comprises receiving, by the TURN server, a request for a TURN service. The server challenges the request, and receives a userid and a password. Responsive to determining that the userid and the password constitute a trusted single-use credential and responsive to determining that the request is authorized, the server provides the TURN service for the requestor.
Abstract:
Application of enterprise policies to Web Real-Time Communications (WebRTC) interactive sessions using an enterprise Session Initiation Protocol (SIP) engine, and related methods, systems, and computer-readable media are disclosed. In one embodiment, a method comprises receiving, by session token converter of enterprise device, an incoming WebRTC session description token. The method comprises generating, by session token converter, outgoing SIP request message. The method comprises sending, by session token converter, outgoing SIP request message to enterprise SIP engine and applying, by enterprise SIP engine, enterprise policies based on outgoing SIP request message. The method comprises, responsive to applying enterprise policies, sending incoming SIP request message to enterprise device. The method comprises converting, by session token converter, incoming SIP request message into outgoing WebRTC session description token, and sending outgoing WebRTC session description token to a target device.
Abstract:
Selecting deployable resources based on personal information obtained from wearable devices is disclosed. A processor-based controller automatically determines a contact load parameter and a contact load threshold for a contact center. If the contact load parameter for the contact center exceeds the contact load threshold, the controller automatically selects one or more deployable resources from a resource pool by receiving personal information about each of the deployable resources in the resource pool via a respective wearable device configured to be worn by each deployable resource and comparing the personal information based on a selection criterion for each deployable resource. The controller selects one or more deployable resources based on the comparisons. The selected deployable resources are then notified to request their assistance with respect to the contact center.
Abstract:
Matching deployable resources with available tasks based on personal information obtained from wearable devices is disclosed. A processor-based controller receives permission from each of a plurality of deployable resources to receive personal information from the respective deployable resource. The controller next automatically receives personal information from each of the plurality of deployable resources via the wearable devices. The personal information is based on information determined by the respective wearable device while the wearable device is being worn by the respective deployable resource. The controller automatically compares the personal information received from one or more of the deployable resources to a selection criterion associated with a task. Based on the comparing, the controller selects one or more of the deployable resources, and notifies each of the selected deployable resources to request assistance with respect to the task.