摘要:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
摘要:
A method for providing a conference service using speaker selection includes hosting a conference between a plurality of endpoints and receiving from the plurality of endpoints a plurality of media streams. The plurality of media streams each include a power indicator. The method includes normalizing the power indicators to determine a normalized power indicator for each of the plurality of media streams and selecting, based on the normalized power indicators of the plurality of media streams, a first number of the plurality of media streams for processing into a conference stream. The method also includes processing the selected first number of the plurality of media streams into the conference stream and communicating the conference stream to at least some of the plurality of endpoints.
摘要:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
摘要:
A method for providing a conference service includes hosting a conference between a plurality of endpoints and communicating at least one media stream received from at least one of the plurality of endpoints to the remaining plurality of endpoints. The method also includes receiving a request to block communication of the at least one media stream to a first endpoint of the plurality of endpoints and blocking communication of the at least one media stream to the first endpoint.
摘要:
In one embodiment, a method for presence-based management in a communication network includes, using IM, discovering one or more network devices in a communication network. The network devices couple two or more endpoints to each other and enable communication between a first one of the endpoints and one or more second ones of the endpoints. The method also includes, using IM, obtaining presence information on the discovered network devices from the discovered network devices and, using the presence information on the discovered network devices from the discovered network devices, maintaining presence data associated with the discovered network devices.
摘要:
Disclosed are apparatus and techniques for escalating an instant messaging (IM) session between two or more users to an audio session so that a communication device (by one or more users) that will optimize the audio session is selectively and intelligently utilized. In one embodiment, if an IP (Internet Protocol) phone is connected to the computer on which an IM session is being escalated, the IP telephone may be used instead of the computer device's own soft telephone so as to maximize audio clarity and quality. In another embodiment, a user's cell phone may be utilized for a mobile user who is using a laptop that is not coupled to an IP telephone or who is communicating from a hotel room in which a telephone call is typically more expensive than a cell phone call. Numerous embodiments for optimizing such audio sessions are described herein.
摘要:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
摘要:
A method for granting access to secure information includes receiving from a caller a call for connection with one of a plurality of agents, distributing the call to the agent of the plurality of agents, initiating an active communication session between the caller and the agent for handling the call, and granting to the agent access to the secure caller information using a plurality of access authentication information that includes an active communication session between the caller and the agent.
摘要:
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals received by each of a plurality of mobile endpoints and receiving location information identifying locations of each of the plurality of mobile endpoints. The method also includes, based on the received signal quality information and the received location information, identifying a first region of an area, the first region having a first signal quality.
摘要:
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals received by each of a plurality of mobile endpoints and receiving location information identifying locations of each of the plurality of mobile endpoints. The method also includes, based on the received signal quality information and the received location information, identifying a first region of an area, the first region having a first signal quality.