摘要:
A caller verification system and method include generating a challenge to be sent to a caller which requires a response from the caller prior to accepting a call. A response or lack thereof is determined from the caller, and the response is analyzed relative to an acceptable response to determine whether the caller is acceptable to communicate with. If the caller is acceptable, the call may be accepted.
摘要:
A caller verification system and method include generating a challenge to be sent to a caller which requires a response from the caller prior to accepting a call. A response or lack thereof is determined from the caller, and the response is analyzed relative to an acceptable response to determine whether the caller is acceptable to communicate with. If the caller is acceptable, the call may be accepted.
摘要:
A voice-over-internet protocol (VoIP) caller verification method includes generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller. A response or lack thereof is determined from the VoIP caller, and the response is analyzed relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with.
摘要:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
摘要:
The present invention provides a method, system and program product for enhancing communications between endpoints. Specifically, the present invention provides mechanisms (e.g., routing controllers either at a network or application layer) that negotiate and specify which network interface to use at each endpoint (both sending and receiving) in multi-homing interface environments. This approach allows the application traffic to be routed through these two specified network interfaces for the better end-to-end QoS. This network interfaces used can also be dynamic changed (e.g., in real-time) to adapt to changing conditions of the network links.
摘要:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
摘要:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
摘要:
A method for a contact center to provide information to one or more users in response to one or more inquiries from the one or more users is presented. For example, the method includes accessing, using at least one client adaptor, at least one agent group that includes at least one agent having knowledge regarding the one or more inquiries. The method further includes the at least one agent responding to the one or more inquiries using the at least one client adaptor. The at least one agent group has pre-existing communications infrastructure that is accessed by a computing platform of the contact center using the at least one client adaptor.
摘要:
A method for a contact center to provide information to one or more users in response to one or more inquiries from the one or more users is presented. For example, the method includes accessing, using at least one client adaptor, at least one agent group that includes at least one agent having knowledge regarding the one or more inquiries. The method further includes the at least one agent responding to the one or more inquiries using the at least one client adaptor. The at least one agent group has pre-existing communications infrastructure that is accessed by a computing platform of the contact center using the at least one client adaptor.
摘要:
A computer implemented method that analyzes and improves a dial plan. A dial plan design template system receives an existing dial plan. The dial plan design template system models the existing dial plan as a directed graph. The dial plan design template system analyzes the directed graph to determine compliance with a set of edge rules. The dial plan design template system analyzes the directed graph to determine compliance with a set of connectivity type rules.