摘要:
Disclosed in various embodiments are various systems, methods, and programs embodied on a computer readable medium for automated scoring of interactions. In one embodiment, an example of a method is provided that comprises the steps of storing a plurality of interactions in a memory, wherein a plurality of interactive factors are memorialized for each of the interactions, each of the interactive factors comprising an aspect of the interaction. The method also comprises the steps of applying a plurality of rules to each of the interactions to identify a plurality of events in each of the interactions, each of the rules defining at least one event that is associated with at least one of the interactive factors of a respective one of the interactions, and, generating a score in the computer system for each of the interactions based upon the rules defining the at least one event occurring in each of the interactions, respectively. The method further comprises the step of ranking at least a subset of the interactions relative to each other based upon the scores generated for the interactions.
摘要:
Systems and methods are disclosed for retrieving and playing back a secure, captured data in a customer center. In another embodiment, the method comprises: transmitting a request by a retrieval component to retrieve stored, encrypted data from a recording subsystem; establishing a secure communication between the retrieval component and the recording subsystem to retrieve the stored, encrypted data; receiving the stored, encrypted data by the retrieval component; transmitting a request to retrieve electronic keys for decrypting the stored, encrypted data; receiving the electronic keys by the retrieval component; decrypting the stored, encrypted data using the electronic keys; and playing back the decrypted data.
摘要:
Systems and methods are disclosed for providing electronic keys that are used to encrypt and decrypt secure, captured data in a customer center. In one embodiment, the method comprises the steps of: establishing a secure communication over a network between the key management system and a retrieval component; transmitting a duplicate copy of at least one electronic key to a cache that is electrically coupled to the retrieval component; receiving a request to retrieve the electronic keys; and transmitting the retrieved electronic keys for decrypting the stored data.
摘要:
Systems and methods are disclosed for providing electronic keys that are used to encrypt and decrypt secure, captured data in a customer center. In one embodiment, the method comprises the steps of: establishing a secure communication over a network between the key management system and a retrieval component; transmitting a duplicate copy of at least one electronic key to a cache that is electrically coupled to the retrieval component; receiving a request to retrieve the electronic keys; and transmitting the retrieved electronic keys for decrypting the stored data.
摘要:
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting the data; responsive to receiving the request, transmitting the electronic keys to the recording system; encrypting the data using the electronic keys; associating the electronic keys with the encrypted data; and storing the encrypted data in the recording system.
摘要:
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting the data; responsive to receiving the request, transmitting the electronic keys to the recording system; encrypting the data using the electronic keys; associating the electronic keys with the encrypted data; and storing the encrypted data in the recording system.
摘要:
Systems and methods are disclosed for retrieving and playing back a secure, captured data in a customer center. In another embodiment, the method comprises: transmitting a request by a retrieval component to retrieve stored, encrypted data from a recording subsystem; establishing a secure communication between the retrieval component and the recording subsystem to retrieve the stored, encrypted data; receiving the stored, encrypted data by the retrieval component; transmitting a request to retrieve electronic keys for decrypting the stored, encrypted data; receiving the electronic keys by the retrieval component; decrypting the stored, encrypted data using the electronic keys; and playing back the decrypted data.
摘要:
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting the data; responsive to receiving the request, transmitting the electronic keys to the recording system; encrypting the data using the electronic keys; associating the electronic keys with the encrypted data; and storing the encrypted data in the recording system.
摘要:
Included are embodiments for channel mapping. At least one embodiment of a system includes an initiating component configured to initiate a communication with a communications device, the communications device being coupled to a first extension. Some embodiments include a receiving component configured to receive recording data from a plurality of extensions at a plurality of recording resources, the plurality of extensions including the first extension and at least one other extension. Similarly, some embodiments include a first determining component configured to determine a channel that received the initiated communication.
摘要:
Included are embodiments for determining an extension-to-channel mapping. At least one embodiment includes determining, at a first time, a first extension-to-channel mapping configuration, the first extension-to-channel mapping configuration including an indication that at least one extension is coupled to a first recording channel. Similarly, some embodiments include determining, at a second time, a second extension-to-channel mapping configuration, the second extension-to-channel mapping configuration including an indication that the at least one extension is coupled to a second recording channel. Similarly, some embodiments include creating an extension-to-channel map, the extension-to-channel map indicating a configuration of the at least one extension, the first recording channel, and the second channel during a time period between the first time and the second time.