Abstract:
Contact centers, such as outbound call centers, are provided with means by which they may attempt to contact individuals at a time and via a channel preferred by the contact. A history of prior contact interactions is used as one means to establish a preferred contact time and channel. With a preferred contact time and/or channel established, the contact center may attempt to reach the contact with a decreased likelihood of the attempt being consider a nuisance.
Abstract:
Contact centers, such as outbound call centers, are provided with means by which they may attempt to contact individuals at a time and via a channel preferred by the contact. A history of prior contact interactions is used as one means to establish a preferred contact time and channel. With a preferred contact time and/or channel established, the contact center may attempt to reach the contact with a decreased likelihood of the attempt being consider a nuisance.
Abstract:
To provide more secure access to a conference call, a request is received from a user to retrieve a one-time conference passcode; the request includes a personal verification code. In one embodiment, the personal verification code is a digital certificate. The personal verification code is validated. In response to the personal verification code being valid, the user is sent the one-time conference passcode. The user then requests to join the conference call by presenting the one-time conference passcode and a participant code. The one-time conference passcode and the participant code are verified. In response to verifying the one-time conference passcode and the participant code, the user is allowed to join the conference call. The user's name is then displayed in a list of conference participants. This overcomes the security problem of not knowing exactly who is participating in the conference call.
Abstract:
To provide more secure access to a conference call, a request is received from a user to retrieve a one-time conference passcode; the request includes a personal verification code. In one embodiment, the personal verification code is a digital certificate. The personal verification code is validated. In response to the personal verification code being valid, the user is sent the one-time conference passcode. The user then requests to join the conference call by presenting the one-time conference passcode and a participant code. The one-time conference passcode and the participant code are verified. In response to verifying the one-time conference passcode and the participant code, the user is allowed to join the conference call. The user's name is then displayed in a list of conference participants. This overcomes the security problem of not knowing exactly who is participating in the conference call.