Abstract:
A processor-implemented method, system, and/or computer program product retrieves a voice print of a caller to a call network. A processor generates a first voice print, a second voice print, and a third voice print of a caller who makes a call to a call network. The first voice print, the second voice print, and the third voice print are consolidated into a consolidated voice print. In response to a request for a particular voice print, the requested voice print is selectively retrieved from first voice print, the second voice print, and the third voice print in the consolidated voice print, and then sent to the requester.
Abstract:
A system is presented for logging and recording a call to a call network. The system comprises a voice print logic for generating a voice print of a caller who is making a call to a call network. A telecom routing switch generates a correlated telecom router switch log file by appending the voice print of the caller to a telecom router switch log file for the call. A telecom software system generates a correlated telecom software system log file by appending the voice print of the caller to a telecom software system log file for the call. A contact center agent generates a correlated contact center agent log file by appending the voice print of the caller to a contact center agent log file for the call. The voice print is utilized to retrieve and to consolidate the correlated telecom router switch log file, the correlated telecom software system log file, and the correlated contact center agent log file into a single correlated file for the call.
Abstract:
A computer-implemented method, system, and/or computer program product recognizes a voice input received by an interactive voice recognition system. An unintelligible voice input is received from a caller. The unintelligible voice input is unintelligible to a computer due to background noise at a caller environment of the caller. Upon determining that the unintelligible voice input does not match any entry from a lexicon of known voice inputs, the caller is prompted to transmit a non-verbal electronic input to clarify the unintelligible voice input. This non-verbal electronic input is used to match the unintelligible voice input with a specific known voice input from the lexicon of known voice inputs, which is updated with the unintelligible voice input. The updated lexicon is subsequently used in future phone calls from the user to match the unintelligible voice input to the user-requested activity for the caller.
Abstract:
A computer-implemented method, system, and computer program product for recognizing a voice input to an interactive voice recognition system is presented. An initial caller voice input is received from a caller. In response to determining that the initial caller voice input is a computer-unintelligible voice input that does not match any entry from a lexicon of known voice inputs, the caller is prompted to transmit a secondary input to clarify the computer-unintelligible voice input. The secondary input is utilized to match the computer-unintelligible voice input with a specific known voice input from the lexicon of known voice inputs. The lexicon of known voice inputs is then updated with the computer-unintelligible voice input.
Abstract:
A data base is created for storage of voice prints of requesters that are believed to be fraudulently attempting to access information for which they are not authorized to obtain. When a user opens an account a voice print is obtained and stored. The user also provides answers to security related questions. When a requester tries to access the information, they must be authenticated by providing a voice print and answers to the security questions. If the voice print and answers do not result in a satisfactory match based on predetermined criteria, access is denied and the voice print is stored as a possibly fraudulent voice print. Subsequent access attempts are compared to the stored possibly fraudulent voice print which is reclassified as a likely fraudulent voice print if matched. Thus, unauthorized access is less likely.
Abstract:
A computer-implemented method, system and/or program product update voice prints over time. A receiving computer receives an initial voice print. A determining period of time is calculated for that initial voice print. This determining period of time is a length of time during which an expected degree of change in subsequent voice prints, in comparison to the initial voice print, is predicted to occur. A new voice print is received after the determining period of time has passed, and the new voice print is compared with the initial voice print. In response to a change to the new voice print falling within the expected degree of change in comparison to the initial voice print, a voice print store is updated with the new voice print.
Abstract:
The need for realtime password resetting is providing by using a converged HTTP/SIP container. The container allows interaction between the different protocols of HTTP and SIP. When a user needs to reset a password that would normally require sending a new temporary password through the mail, the user can be appropriately authenticated and provided with a temporary key. After a temporary key is created and sent electronically to the user via the computer system which initiated the request, a telephony application calls the user. The user is prompted for authentication information and then enters the temporary key. The temporary key entered is compared with the temporary key created, and if matched, the user can reset the password in realtime.
Abstract:
A method includes storing a profile associated with a user of a telephone and, based upon the profile, presenting the user with an option to search, browse, subscribe to, or bookmark content provided by a plurality of IVR content providers.
Abstract:
A method, system and computer-readable medium for providing a Virtual Contact Center (VCC) to call-in customers is presented. In a preferred embodiment, the method includes the steps of: screening a plurality of service agents according to agent qualifications needed by a Virtual Contact Center (VCC); developing a network of pre-qualified service agents from the screening step, wherein each pre-qualified service agent is an independent contractor; receiving, at a Virtual Contact Center Portal (VCCP), a request for service call from a customer; and directing the request for service call through the VCCP to one of the pre-qualified service agents according to a nature of the request for service call.
Abstract:
The present invention discloses a chat tool including a chat window configured to permit a user to simultaneously receive chat messages for two or more different chat sessions, thereby permitting side discussions within a secondary chat session. Each of the different chat sessions can correspond to a session specific chat channel. Different chat sessions can include private and public sessions. The participants of a private chat session can be participants of the public chat session and/or can be able to view discussions occurring in the public chat session. Further, members of the public chat session can be unaware of the existence of the private chat session. Any number of private chat sessions can be spawned from a public chat session using an invitation option, which automatically establishes new private sessions for invited individuals.