Abstract:
A system, method and article of manufacture are provided for managing voice messages based on emotion characteristics of the voice messages. First, a plurality of voice messages that are transferred over a telecommunication network are received. Thereafter, such voice messages are stored on a storage medium. An emotion associated with voice signals of the voice messages is then determined. The voice messages are organized based on the determined emotion. Access to the organized voice messages is then permitted.
Abstract:
A system (8, 60, 500) for identifying an unidentified person (14, 510) includes a database (42) that contains utterance data (162) and an ambiguity-resolution criterion (114, 119, 121) corresponding to a known person. A processing system (10, 11, 502) is coupled to the database (42) and receives utterance information and an ambiguity-resolution identifier corresponding to the unidentified person (14, 510). The processing system (10, 11, 502) compares the utterance information with the utterance data (162) to identify the unidentified person (14, 510) as at least one known person. If the processing system (10, 11, 502) ambiguously identifies the unidentified person (14, 510) as more than one known person, the processing system (10, 11, 502) compares the ambiguity-resolution identifier with the ambiguity-resolution criterion (114, 119, 121) to identify the unidentified person (14, 510) as a particular known person. In response to identifying the person (14, 510), the processing system (10, 11, 502) may automatically retrieve stored information (104, 132, 162) corresponding to the known customer.
Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a “network file” that includes “voice clips” and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a “voice print file,” original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with a “authenticating” message (150).
Abstract:
A computer-based system (70) for identifying an unidentified caller (14) includes a database (42) that contains utterance data (162) corresponding to a known caller. A processing system (72) coupled to the database (42) receives utterance information corresponding to the unidentified caller (14) and compares the utterance information with the utterance data (162) to identify the unidentified caller (14) as the known caller. In response, the processing system (72) provides a call routing option (84). The call routing option (84) may include an accept option (86), a transfer option (90), or a disconnect option (89), and may be provided to a called party visually using a personal computer (50).
Abstract:
The server receives a response accepting a task from a device. The server assigns the task to a user of the device. The server transmits an indication that the task was assigned to the user of the device.
Abstract:
A computer-implemented method for providing an objective evaluation to a customer service representative regarding his performance during an interaction with a customer may include receiving a digitized data stream corresponding to a spoken conversation between a customer and a representative; converting the data stream to a text stream; generating a representative transcript that includes the words from the text stream that are spoken by the representative; comparing the representative transcript with a plurality of positive words and a plurality of negative words; and generating a score that varies according to the occurrence of each word spoken by the representative that matches one of the positive words, and/or the occurrence of each word spoken by the representative that matches one of the negative words. Tone of voice, as well as response time, during the interaction may also be monitored and analyzed to adjust the score, or generate a separate score.
Abstract:
Video-assisted presence detection is used to enhance a user experience in telephony communications. Image data, video data, or both, from a camera are used to determine whether a user is present at their device before a call is transferred to him or her. The video-assisted presence detection can be implemented based on a privacy setting. For example, one implementation allows a system to have partial access to a detector to detect user presence without capturing facial information, and without identifying that person. Another implementation allows the system to have partial access to the detector to detect user presence without having access to a video feed of the detector.
Abstract:
Techniques are disclosed for transmitting an announcement to one or more devices. In one example, a first device receives a first message that includes an announcement, the announcement associated with a voice that spoke the announcement. The first device may determine the announcement from the first message, and then identify one or more devices for receiving the announcement. The one or more devices may have a particular device type of a plurality of different device types comprising at least a mobile device. The first device may determine a network path through which a second message is transmitted based at least in part on the location of a second device. In accordance with a determination that the second device is located within a local area network associated with a home environment, the first device transmits the second message over the local area network. In accordance with a determination that the second device is located away from a local area network associated with a home environment, the first device transmits the second message over the wide area network.
Abstract:
A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.
Abstract:
Provided are a call deflection and response system and method, wherein a voice call from a caller device is received, a skill group is determined to resolve an issue associated with the call, and a text response to the issue is sent to the caller device, providing a context-based personalized response. A caller leaves a detailed voicemail explaining an issue needing resolution, which is electronically transcribed and then run through a classifier to determine concepts and intents associated with the call. Based on the concepts and intents, responsibility for the call and associated files are transferred to a particular skill group on a chat platform for resolution. A chat entity from the appropriate skill group determines and provides an issue response via text message to the caller device, e.g., to the caller's mobile phone.