An automated interaction processing system is deployed to automatically process an interaction transcription or content to generate response data in a manner that does not require intensive human manual effort.
Techniques and architectures for implementing a team of virtual assistants are described herein. The team may include multiple virtual assistants that are configured with different characteristics, such as different functionality, base language models, levels of training, visual appearances, personalities, and so on. The characteristics of the virtual assistants may be configured by trainers, end-users, and/or a virtual assistant service. The virtual assistants may be presented to end-users in conversation user interfaces to perform different tasks for the users in a conversational manner. The different virtual assistants may adapt to different contexts. The virtual assistants may additionally, or alternatively, interact with each other to carry out tasks for the users, which may be illustrated in conversation user interfaces.
A system and method use a trained transformer model to generate summaries of audio interactions based on keywords. Training the transformer model includes obtaining a transcription of an audio interaction, obtain keywords for summarizing the audio interaction, training a transformer model to generate a summary of the audio interaction based on the keywords and the transcription, where the transcription is an input to the transformer model and the keywords are injected between an encoder and a decoder of the transformer model, and deploying the trained transformer model to be used for generating summaries of subsequent audio interactions.
G06F 16/683 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
G06F 40/40 - Processing or translation of natural language
5.
SYSTEM AND METHOD FOR SUGGESTING AND GENERATING A CUSTOMER SERVICE TEMPLATE
The template generation system receives interaction data stored by the CEC from an interaction database and customer service templates (if any) from a template database. The template generation system processes interaction data and customer service templates to learn the domain language of CSR responses and the template responses within the CEC. The template generation system encodes the learned language and generates sentence vector embeddings for the CSR responses and template responses. Based on the learned language, the encoding, and the sentence vector embeddings, the template generation system processes CSR responses derived from the interaction data and customer service templates to predict the need for new customer service templates. Based on the predicted need for new customer service templates, the template generation system provides customer service template suggestions and may also auto-generate suggested customer service templates.
A system and method for updating computerized language models is provided that automatically adds or deletes terms from the language model to capture trending events or products, while maximizing computer efficiencies by deleting terms that are no longer trending and use of knowledge bases, machine learning model training and evaluation corpora, analysis tools and databases
An interactive voice response (IVR) system including iterative speech recognition with semantic interpretation is deployed to determine when a user is finished speaking, thus saving them time and frustration. The IVR system can repeatedly receive an audio input representing a portion of human speech, transcribe the speech into text, and determine a semantic meaning of the text. If the semantic meaning corresponds to a valid input or response to the IVR system, then the IVR system can determine that the user input is complete and respond to the user after the user is silent for a predetermined time period. If the semantic meaning does not correspond to a valid input to the IVR system, the IVR system can determine that the user input is not complete and can wait for a second predetermined time period before determining that the user has finished speaking.
An interactive voice response (IVR) system including iterative speech recognition with semantic interpretation is deployed to process an audio input in a manner that optimizes and conserves computing resources and facilitates low-latency discovery of start-of-speech events that can be used to support external processes such as barge-in operations. The IVR system can repeatedly receive an audio input at a speech processing component and apply an input-aware recognition process to the audio input. In response to generating a start-of-speech event, the IVR system can apply an input-unaware recognition process to the remaining audio input and determine a semantic meaning in relation to the relevant portion of the audio input.
A system for detecting fraudulent activity using account analytics obtains an interaction record for an interaction between a remote device and a user account via an interaction channel, where the interaction is an attempt to access the user account, obtains historical data relating to the user account and the interaction channel that includes one or more historical interaction records relating to the user account and activity records relating to the interaction channel, calculates a threat score for the user account based on the interaction record and the one or more historical interaction records that indicates a likelihood that the user account is subject to fraudulent activity, generates a database record based on the interaction record that includes the threat score, and initiates corrective action if the threat score exceeds a predetermined threshold.
The present disclosure describes methods and systems for suggesting responses generated from an entity's own published information with links to the source of that generated response should provide a quality starting point that is already accurate and brand compliant or, if not, quickly editable to become so. The published information is ingested by the system, and a question/answer transformation process is applied against the ingested data using training language data that is tagged and categorized by intent to generate suggested responses. The suggested response may be presented in a user interface with a link to the URL which was used to construct the response. The suggested responses may be edited if needed.
An intelligent virtual assistant (IVA) is deployed to place a call/chat to customer service on behalf of the customer, thus saving them time and frustration. The IVA contacts a specific company over one or more channels, for example, chat, phone call, Application Programming Interface (API), or email, in order to complete open-ended task(s) requested by its user. Before the IVA contacts the company, a specific user profile is injected into an IVA dialog state. The IVA contacts the company or agency and answers customer service agent (CSA) questions by using the specific user profile provided for the call. The IVA then stores the task outcome for the user to review. If something prevents the task from succeeding, the IVA alerts the user that either it needs more information or the user may need to perform some action before the task can be completed, such as filling out or emailing a form.
An intelligent virtual assistant (IVA) is deployed to place a call/chat to customer service on behalf of the customer, thus saving them time and frustration. The IVA contacts a destination entity over one or more channels, for example, chat, phone call, Application Programming Interface (API), or email, in order to complete open-ended task(s) requested by another computer. Before the IVA contacts the destination entity, a specific user profile is injected into an IVA dialog state. The IVA contacts the destination entity and answers customer service agent (CSA) questions by using the specific user profile inserted. The IVA then stores the task outcome for the user to review. If something prevents the task from succeeding, the IVA alerts the user that either it needs more information or the user may need to perform some action before the task can be completed, such as filling out, or emailing a form.
An intelligent virtual assistant (IVA) is deployed to place a call/chat to customer service on behalf of the customer, thus saving them time and frustration. The IVA contacts a specific company over one or more channels, for example, chat, phone call, Application Programming Interface (API), or email, in order to complete open-ended task(s) requested by its user. Before the IVA contacts the company, a specific user profile is injected into an IVA dialog state. The IVA contacts the company or agency and answers customer service agent (CSA) questions by using the specific user profile provided for the call. The IVA then stores the task outcome for the user to review. If something prevents the task from succeeding, the IVA alerts the user that either it needs more information or the user may need to perform some action before the task can be completed, such as filling out or emailing a form.
The segment analysis system analyzes survey data to determine the influence each custom question/response combination (segment) has on a given aggregate scored survey metric for a given date/date range. The system removes from consideration all surveys that do not include a scored survey metric and date that matche the aggregate scored survey metric and given date/date range. The system further removes from consideration all surveys not pertaining received user-defined filtering. Once the system has eliminated all extraneous surveys from consideration, the system segments each question/response combinations across the pool of surveys to generate an influence score for each question/response combination. The system identifies which segment has the greatest positive and negative influence on the aggregate scored survey metric for the given date/date range. The system generates reports for the segment analysis and stores all segment analyses for further comparative analysis.
Methods and systems for selecting a forecasting algorithm to use for a forecast for a time interval are provided. A class is a series of time intervals that is selected by an entity from time series data that relates to external data or is a series of time intervals from the time series data that corresponds to a motif. The time series data is processed by a computer to identify motifs, and classes are generated based on each identified motif. A user may further identify one or more classes in the time series data. For each class, the forecasting algorithm that best predicts the historical demand data for time intervals associated with the class is determined. Later, when the entity desires to receive a forecast for a future time interval, the class associated with the future time interval is determined. The forecasting algorithm determined to best predict demand for the determined class is then used.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06N 5/00 - Computing arrangements using knowledge-based models
The present disclosure describes methods and systems for selecting the forecasting algorithm to use for a prediction based on motifs. A motif is a pattern of interval values that is found to repeat in time series data. Time series data that includes historical demand data (e.g., average communication volume) for an entity at various time intervals in the past is received. The time series data is processed to identify motifs. For each identified motif, the forecasting algorithm that best predicts the historical demand data for time intervals associated with the motif is determined. Later, when the entity desires to receive a forecast for a future time interval, the motif associated with the future time interval is determined. The forecasting algorithm determined to best predict demand for the determined motif is then used to predict the demand for the future time interval.
The present invention allows text analysis and routing of an outgoing message. The system intercepts outgoing messages for analysis by a TAS software module. The module assigns an analytical score to the message, then compares the score to a threshold. If the score is below the threshold, the message is transmitted to its ultimate destination. If not, the message may be routed for correction by the message's composer or quality assurance staff. After such correction, the message new analytical score is generated and compared, and, if necessary, the process repeats again.
A realtime contextual event notification system that ingests events as streams from any authorized entity applies rules to the event streams, determines a context of an end-user who is a recipient of a targeted notification, and provides notifications to the end-user in accordance with the context. The event streams may come from multiple sources and rules may be applied to provide realtime contextual information associated with the end-user.
A real time contextual event notification system that ingests events as streams from any authorized entity applies rules to the event streams, determines a context of an end-user who is a recipient of a targeted notification, and provides notifications to the end-user in accordance with the context. The event streams may come from multiple sources and rules may be applied to provide real time contextual information associated with the end-user.
A real-time contextual event notification system ingests events as streams from any authorized entity, applies rules to the event streams, determines a context of an end-user who is a recipient of a targeted notification, and provides notifications to the end-user in accordance with the context. The event streams may come from multiple sources, and rules may be applied to provide real-time contextual information associated with the end user. One such event stream includes detected linguistic and/or acoustic events during a phone call between two or more persons.
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
An anomaly detection system using machine learning to generate predicted survey scores for a given duration and a given metric based on historic survey score data. The system compares a predicted survey score to the actual survey score and identifies anomalous actual survey scores. The anomaly detection system trains a plurality of survey score prediction models using historic survey score data. Each survey score prediction model is based on a specific survey score metric and a specific duration. The survey score prediction models generate expected survey score results for the given duration and the given metric. Based on the user-determined filtering and tolerances, the system determines if the actual survey score result is anomalous. The system generates reports for the detected anomalies and continually updates the survey score prediction models with newly obtained actual survey results, thereby improving the anomaly detection accuracy over time.
In an entity such as a call center, back office, or retail operation, external event data is recorded along with call volume information for a plurality of time intervals. Based on the recorded event data and call volume for the plurality of intervals, a model is trained to predict call (or other communication) volume for a specified time interval using the external event data. The external event data may include data about one or more events that may affect the demand received by the entity. When the predicted call volume is significantly above or below what would be predicted for the entity using historical data alone, an indicator may be displayed to a user or administrator that identifies the external event that is responsible for the lower or higher prediction. The call volume prediction may be used to schedule one or more agents (or other employees) to work during the specified time interval.
A realtime contextual event notification system that ingests events as streams from any authorized entity applies rules to the event streams, determines a context of an end-user who is a recipient of a targeted notification, and provides notifications to the end-user in accordance with the context. The event streams may come from multiple sources and rules may be applied to provide realtime contextual information associated with the end-user.
System and method for calibration of WFM system modeling parameters. A first mode M[D,S] of a modeler computes demand-shrinkage controlled service levels and an error metric e(M[D,S]) between the controlled and actual service levels. A user device iteratively adjusts each core parameter. When the user is satisfied that e(M[D,S]) is sufficiently small, calibration of the core parameters is complete. The same is done for calibrating the modeling factor, and then a final e(M[D,S])f is computed. A second mode M[D] computes, using the parameters just calibrated, demand-controlled service levels and an error metric e(M[D]) between the controlled service levels and actual levels. The user iteratively adjusts the shrinkage. When the user is satisfied that e(M[D]) is sufficiently small, calibration of the core parameters is complete.
Systems and methods are provided for dynamically adjusting a website of an entity using information that has been received, stored, gathered, and/or otherwise obtained about what people want to find on the entity's website. A website may be dynamically adjusted using trending information in response to determining that the usage of the monitored data source is greater than the baseline usage distribution or in response to determining that the usage of the monitored data source is not greater than the baseline usage distribution receiving NLP inputs of the user from the IVA and adjusting dynamic web content displayed on the website based on the NLP inputs.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06F 40/40 - Processing or translation of natural language
The present application includes a method and system for real-time predictive scheduling. The system receives information from at least one workload input and at least one personnel input, calculating an initial schedule based on the information and on analytics rules in a scheduling analytics engine. The system then allocates incoming workloads to customer service representatives according to the initial schedule, while monitoring adherence to the initial schedule by calculating deviation from schedule adherence. If the deviation from schedule adherence exceeds an acceptable deviation from schedule adherence within the analytics rules, the system calculates an updated schedule.
A system for generating wrap-up information is capable of learning how interactions are transformed into contact notes and outcome codes using natural language processing and can generate the contact notes and outcome codes for new incoming interactions by applying prediction models trained on interaction data, contact notes and outcome codes. The system for generating wrap-up information receives interaction data, including interaction audio data, interaction transcripts, associated contact notes and associated outcome codes. The interaction transcripts are generated from the previous interactions between agents and customers. The contact notes and outcome codes are generated by agents during the associated previous interactions. The system processes and uses the interaction data to train prediction models to analyze interaction audio data and interaction transcripts and predict appropriate contact notes and outcome codes for the interaction. Once trained the prediction model(s) can generate appropriate contact notes and outcome codes for new interactions.
Provided is a system and method for adapting analysis to user profiles to reduce bias in customer or user generated content, specifically a system and method that discounts or adjusts bias in sentiment data based on the channel from which the content was received and/or the demographic of the user. The system includes a means to detect bias for any product, service, or company across multiple channels of customer data; a means to construct models to quantize bias by specific demographics and channels; and a means to adjust model output to reduce inflation by biased groups.
A system for data recording across a network includes a session border controller connecting incoming data from the network to an endpoint recorder. A load balancer is connected to the network between the session border controller and the endpoint and receives the incoming data from the session border controller, wherein the load balancer comprises computer memory and a processor configured to parse the incoming data into video data and audio data according to identification protocols accessible by the processor from the computer memory. A recording apparatus includes recording memory that receives the incoming data from the load balancer, stores a duplicate version of the incoming data in the recording memory, and connects the incoming data to the endpoint.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 16/41 - Indexing; Data structures therefor; Storage structures
H04M 7/00 - Arrangements for interconnection between switching centres
G06F 16/61 - Indexing; Data structures therefor; Storage structures
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06F 16/71 - Indexing; Data structures therefor; Storage structures
H04L 67/1036 - Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers
Disclosed are a framework and method for selecting an anomaly detection method for each of a plurality of class of time series based on characteristics a time series example that represents an expected form of data. The method provides classification of a given time series into one of known classes based on expected properties of the time series, filtering the set of possible detection methods based on the time series class, evaluating the remaining detection methods on the given time series using the specific evaluation metric and selecting and returning a recommended anomaly detection method based on the specific evaluation metric.
To prevent intent classifiers from potentially choosing intents that are ineligible for the current input due to policies, dynamic intent classification systems and methods are provided that dynamically control the possible set of intents using environment variables (also referred to as external variables). Associations between environment variables and ineligible intents, referred to as culling rules, are used.
Certain aspects of the present disclosure provide techniques for generating multivariate time series data utilizing a variational auto-encoder (VAE) having an architecture for injecting custom temporal structures into the generated multivariate time series data. A method for generating multivariate time series data includes sampling a multivariate distribution forming a latent space vector, processing the latent space vector with an interpretable decoder of a variational auto-encoder, an architecture of the interpretable decoder comprising a plurality of blocks including one or more blocks configured to inject one or more temporal structures into multivariate time series data, and outputting, from the interpretable decoder, generated multivariate time series data comprising one or more temporal structures defined by the injected one or more temporal structures.
An analysis platform combines unsupervised and semi-supervised approaches to quickly surface and organize relevant user intentions from conversational text (e.g., from natural language inputs). An unsupervised and semi-supervised pipeline is provided that integrates the fine-tuning of high performing language models via a language models fine-tuning module, a distributed KNN-graph building method via a KNN-graph building module, and community detection techniques for mining the intentions and topics from texts via an intention mining module.
Embodiments described herein provide systems and methods for sharing encoder output of video streams. In a particular embodiment, a method provides determining video profiles for each of a plurality of devices. The method further provides determining if two or more of the video profiles are similar by determining if parameters associated with each video profile differ by less than a threshold value. The method further provides transmitting a video stream encoded in a single format to the devices if they have similar profiles and transmitting video streams encoded in different formats to the devices if they do not have similar profiles.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 7/52 - Systems for transmission of a pulse code modulated with one or more other pulse code modulated signals, e.g. an audio signal or a synchronizing signal
H04N 7/24 - Systems for the transmission of television signals using pulse code modulation
H04N 21/4402 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
Detecting fraudulent activity can be a complex, manual process. In this paper, we adapt statistical properties of count data in a novel algorithm to uncover records exhibiting high risk for fraud. Our method identifies shelves, partitioning data under the counts using a Student's t-distribution. We apply this methodology on a univariate dataset including cumulative results from phone calls to a customer service center. Additionally, we extend this technique to multivariate data, illustrating that the same method is applicable to both univariate and multivariate data.
The present invention allows text analysis and routing of an outgoing message. The system intercepts outgoing messages for analysis by a TAS software module. The module assigns an analytical score to the message, then compares the score to a threshold. If the score is below the threshold, the message is transmitted to its ultimate destination. If not, the message may be routed for correction by the message's composer or quality assurance staff. After such correction, the message new analytical score is generated and compared, and, if necessary, the process repeats again.
Detecting fraudulent activity can be a complex, manual process. In this paper, we adapt statistical properties of count data in a novel algorithm to uncover records exhibiting high risk for fraud. Our method identifies shelves, partitioning data under the counts using a Student's t-distribution. We apply this methodology on a univariate dataset including cumulative results from phone calls to a customer service center. Additionally, we extend this technique to multivariate data, illustrating that the same method is applicable to both univariate and multivariate data.
This disclosure describes techniques and architectures for evaluating conversations. In some instances, conversations with users, virtual assistants, and others may be analyzed to identify potential risks within a language model that is employed by the virtual assistants and other entities. The potential risks may be evaluated by administrators, users, systems, and others to identify potential issues with the language model that need to be addressed. This may allow the language model to be improved and enhance user experience with the virtual assistants and others that employ the language model.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
A scalable system provides automated conversation review that can identify potential miscommunications. The system may provide suggested actions to fix errors in intelligent virtual assistant (IVA) understanding, may prioritize areas of language model repair, and may automate the review of conversations. By the use of an automated system for conversation review, problematic interactions can be surfaced without exposing the entire set of conversation logs to human reviewers, thereby minimizing privacy invasion. A scalable system processes conversations and autonomously marks the interactions where the IVA is misunderstanding the user.
Detecting fraudulent activity can be a complex, manual process. In this paper, we adapt statistical properties of count data in a novel algorithm to uncover records exhibiting high risk for fraud. Our method identifies shelves, partitioning data under the counts using a Student's t-distribution. We apply this methodology on a univariate dataset including cumulative results from phone calls to a customer service center. Additionally, we extend this technique to multivariate data, illustrating that the same method is applicable to both univariate and multivariate data.
Systems and methods for handling dual modality communication between at least one user device and at least one server. The modalities comprise audio modalities and mechanical motion modalities. The server may be simultaneously connected to the user device via a data network and a voice network and simultaneously receive audio-based input and mechanical motion-based input.
A system for data recording across a network includes a session border controller connecting incoming data from the network to an endpoint recorder. A load balancer is connected to the network between the session border controller and the endpoint and receives the incoming data from the session border controller, wherein the load balancer comprises computer memory and a processor configured to parse the incoming data into video data and audio data according to identification protocols accessible by the processor from the computer memory. A recording apparatus includes recording memory that receives the incoming data from the load balancer, stores a duplicate version of the incoming data in the recording memory, and connects the incoming data to the endpoint.
A system and method for updating computerized language models is provided that automatically adds or deletes terms from the language model to capture trending events or products, while maximizing computer efficiencies by deleting terms that are no longer trending and use of knowledge bases, machine learning model training and evaluation corpora, analysis tools and databases.
G06F 40/289 - Phrasal analysis, e.g. finite state techniques or chunking
A61K 31/198 - Alpha-amino acids, e.g. alanine, edetic acid (EDTA)
A61K 31/215 - Esters, e.g. nitroglycerine, selenocyanates of carboxylic acids
A61K 31/216 - Esters, e.g. nitroglycerine, selenocyanates of carboxylic acids of acids having aromatic rings, e.g. benactizyne, clofibrate
A61K 31/401 - Proline; Derivatives thereof, e.g. captopril
A61K 31/41 - Heterocyclic compounds having nitrogen as a ring hetero atom, e.g. guanethidine or rifamycins having five-membered rings with two or more ring hetero atoms, at least one of which is nitrogen, e.g. tetrazole
Systems and methods are disclosed for scheduling a workforce. In one embodiment, the method comprises receiving a shift activity template; receiving an association between the shift activity template and at least one worker; and scheduling a plurality of schedulable objects. The scheduling is performed in accordance with a workload forecast and schedule constraints. Each of the schedulable objects is based on the shift activity template. The shift activity template describes a worker activity performed during a shift. The template has range of start times and a variable length for the activity. The activity is associated with a queue.
The present invention allows a user to review the routing of various communications. The system receives incoming communications for analysis by a smart routing engine (SRE) software module. The SRE module analyzes the communication at various system routing points, which is used by SRE to route the communication to an appropriate party. The SRE updates a routing log at each point to ensure a record of the reasons for routing the communication in a certain way. The routing log passes with the communication. This ensures that the ultimate recipient of the communication understands why they have received the communication and reduces the time required for a communication to be acted upon.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
H04L 45/302 - Route determination based on requested QoS
H04L 41/5061 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the interaction between service providers and their network customers, e.g. customer relationship management
H04L 41/5022 - Ensuring fulfilment of SLA by giving priorities, e.g. assigning classes of service
As described herein, a system for expanding contractions in electronically stored text includes expanding contractions having only on expanded form. For remaining contractions, a grammar check is performed for all possible expanded forms to determine if an expanded form can be selected based on context and grammar rules. If an expanded form is not evident from the first two steps, all possible expanded forms of the remaining contractions are converted to a vector representation along with the original text. A Word Movers Distance (WMD) for each possible expansion is calculated using the vectors for each possible expansion and the original text. An expanded form is chosen without human intervention based on the grammar score alone or the WMD and the grammar score.
An artificial intelligence (AI) application uses an external machine learning component from a different computing environment to develop context data for use by the AI application. The context data includes raw data outputs from the external machine learning component. An active machine learning component is executed with the context data and provides a suggested next step to a computer to implement as an automated output. A feedback loop adds the suggested next step from the active machine learning component to the context data and forms an augmented data set for providing context to the AI application. A context component selects a rule from a rules engine that corresponds to the augmented data set. The computer implements an automated output according to the rule that was selected.
System and method for calibration of WFM system modeling parameters. A first mode M[D,S] of a modeler computes demand-shrinkage controlled service levels and an error metric e(M[D,S]) between the controlled and actual service levels. A user device iteratively adjusts each core parameter. When the user is satisfied that e(M[D,S]) is sufficiently small, calibration of the core parameters is complete. The same is done for calibrating the modeling factor, and then a final e(M[D,S])f is computed. A second mode M[D] computes, using the parameters just calibrated, demand-controlled service levels and an error metric e(M[D]) between the controlled service levels and actual levels. The user iteratively adjusts the shrinkage. When the user is satisfied that e(M[D]) is sufficiently small, calibration of the core parameters is complete.
A non-ontological hierarchy for language models is based on established psycholinguistic and neuro-linguistic evidences. By using non-ontological hierarchies, a more natural understanding of user's inputs and intents improve toward a better potential for producing intelligent responses in a conversational situation.
A system and method for attributing the performance of an organization employee or team to events in the employees' career record and predicting future performance. The system acquires historical career record data comprising data of an employee or team of employees, including key performance indexes (KPIs) of the employee/team; finds at least one signpost—an individual data point or group of data points in the career record data having a comparatively high correlation with one of the KPIs of the employee/team or with increases/decreases of the KPI; monitors the career record for new occurrences of the signposts; predicts the KPI or whether the KPI will increase/decrease as a function of the occurrence of the signpost, and transmits the predicted KPI or increase/decrease thereof and its attribution to the occurrence of the signpost to a data consumer. In some embodiments, the system provides prescriptive measures for improving future performance.
An IVR and chatbot, or other system, employing a language model, the language model resulting from a method and computer product encoding the method is available for preparing a domain or subdomain specific glossary. The method included using probabilities, word context, common terminology and different terminology to identify domain and subdomain specific language and a related glossary updated according to the method.
Various embodiments are described for searching and retrieving documents based on a natural language input. A computer-implemented natural language processor electronically receives a natural language input phrase from an interface device. The natural language processor attributes a concept to the phrase with the natural language processor. The natural language processor searches a database for a set of documents to identify one or more documents associated with the attributed concept to be included in a response to the natural language input phrase. The natural language processor maintains the concepts during an interactive session with the natural language processor. The natural language processor resolves ambiguous input patterns in the natural language input phrase with the natural language processor. The natural language processor includes a processor, a memory and/or storage component, and an input/output device.
An architecture for assessing and identifying fraudulent contact with client contact systems, such as IVR, includes threshold and machine learning scoring and filtering of calls based on these criteria. The criteria may include behavioral, situational and reputational scoring.
Computer-implemented techniques are disclosed for presenting an in-page console on a website for reviewing interaction data captured during user interaction with one or more web pages of the website. The web browser activates the in-page console via an activation procedure. One or more of the web pages of the website are selected after activation of the in-page console. A feedback badge on the website can be replaced with a reporting badge upon activation of the in-page console and with the reporting badge displaying an indicator of interaction data captured for the selected web page. The in-page console is overlaid one or more of the selected web pages. The in-page console displays the interaction data, or recordings of user interaction, captured during user interaction with the selected web page to enable review of the captured interaction data for the selected web page overlaid on the selected web page.
Systems and apparatus for sensing and video capture include at least one camera with an optical sensor that captures video image data of a first sampling rate. An auxiliary sensor captures auxiliary data at a second sample rate. A processor is communicatively connected to the optical sensor and auxiliary sensor. The processor transmits video image data captured at the first sample rate auxiliary sensor data captured at the second sampling rate across a data connection to a centralized computer that receives the video image data and the auxiliary sensor data and operate to present the video image data and the auxiliary sensor data on a graphical display.
H04L 41/06 - Management of faults, events, alarms or notifications
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
56.
System and method of real-time automated determination of problem interactions
The present invention allows a CEC system to automatedly, and without human intervention, identify interactions that are likely in need of supervisor intervention. The system reviews all incoming and outgoing interactions for analysis by a metadata analytics service (MAS) software module. The MAS analyzes the interactions to generate interaction metadata, which is used by an interaction analysis engine (IAE) to score the quality of the interaction. If the quality of the interaction is not sufficient, the system marks the interaction as being a problem interaction and notifies a supervisor of the interaction. This ensures the intelligent and dynamic determination of interactions that require additional assistance and assures notification to a supervisor.
G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
57.
System and method of automated routing and guidance based on continuous customer and customer service representative feedback
The present invention is a system and method of routing incoming communications to a CSR and providing guidance to the CSR based on the incoming communication using feedback information such as sentiment feedback, survey feedback, and feedback from actions taken by CSRs based on skill level. A CEC system receives an incoming communication, analyzes the communication and creates metadata based off of the analysis. The metadata is used by the RAE routing module to route the communication to an appropriate party. The metadata is also used by the GAE guidance module to determine the guidance to provide to the CSR. The CSR then performs an action based on the guidance. The CEC system continues to monitor the interaction until the interaction is completed. The communication metadata, the communication, the guidance, and the CSRs action are all provided to a RAS rules analysis module wherein the RAS analyzes the data and automatedly updates the rules (RAR and GAR) according to the analysis.
In an entity such as a call center, back office, or retail operation, external event data is recorded along with call volume information for a plurality of time intervals. Based on the recorded event data and call volume for the plurality of intervals, a model is trained to predict call (or other communication) volume for a specified time interval using the external event data. The external event data may include data about one or more events that may affect the demand received by the entity. When the predicted call volume is significantly above or below what would be predicted for the entity using historical data alone, an indicator may be displayed to a user or administrator that identifies the external event that is responsible for the lower or higher prediction. The call volume prediction may be used to schedule one or more agents (or other employees) to work during the specified time interval.
Techniques and architectures for implementing a team of virtual assistants are described herein. The team may include multiple virtual assistants that are configured with different characteristics, such as different functionality, base language models, levels of training, visual appearances, personalities, and so on. The characteristics of the virtual assistants may be configured by trainers, end-users, and/or a virtual assistant service. The virtual assistants may be presented to end-users in conversation user interfaces to perform different tasks for the users in a conversational manner. The different virtual assistants may adapt to different contexts. The virtual assistants may additionally, or alternatively, interact with each other to carry out tasks for the users, which may be illustrated in conversation user interfaces.
Techniques for interacting with a portion of a content item through a virtual assistant are described herein. The techniques may include identifying a portion of a content item that is relevant to user input and causing an action to be performed related to the portion of the content item. The action may include, for example, displaying the portion of the content item on a smart device in a displayable format that is adapted to a display characteristic of the smart device, performing a task for a user that satisfies the user input, and so on.
The present invention is a system and method of routing incoming communications to a CSR and providing guidance to the CSR based on the incoming communication using feedback information such as sentiment feedback, survey feedback, and feedback from actions taken by CSRs based on skill level. A CEC system receives an incoming communication, analyzes the communication and creates metadata based off of the analysis. The metadata is used by the RAE routing module to route the communication to an appropriate party. The metadata is also used by the GAE guidance module to determine the guidance to provide to the CSR. The CSR then performs an action based on the guidance. The CEC system continues to monitor the interaction until the interaction is completed. The communication metadata, the communication, the guidance, and the CSRs action are all provided to a RAS rules analysis module wherein the RAS analyzes the data and automatedly updates the rules (RAR and GAR) according to the analysis.
H04M 3/523 - Centralised call answering arrangements requiring operator intervention with call distribution or queuing
G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
H04M 3/22 - Arrangements for supervision, monitoring or testing
Hybrid natural language understanding (NLU) systems and methods are provided that capitalize on the strengths of the rule-based models and the statistical models, lowering the cost of development and increasing the speed of construction, without sacrificing control and accuracy. Two models are used for intent recognition, one statistical and one rule-based. Both models define the same set of intents, but the rule-based model is devoid of any grammars or patterns initially. Each model may or may not be hierarchical in that it may be composed of a set of specialized models that are in a tree form or it may be just a singular model.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
63.
Contextual awareness from social ads and promotions tying to enterprise
Systems and methods for incorporating intelligent virtual assistants into advertisements on social networking platforms are provided. When a user interacts with a content item, an intelligent virtual assistant is selected and put into contact with the user. The intelligent virtual assistant is provided with a context that includes information about the user in the social networking platform, information about the user in a customer relationship management platform, and information about the product, service, or entity associated with the content item. The context allows the intelligent virtual assistant to converse with the user in a way that feels natural and relevant to the user and allows the intelligent virtual assistant to answer any questions about the product, service, or entity associated with the content item.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
Tracking of targets in video captured by a multi-camera surveillance system is often difficult due to incomplete camera coverage and due to the complexities associated with automated recognition in a dense and highly variable environment. The present disclosure embraces a system and method for target tracking in a multi-camera surveillance system that reduces the time required for a user to track a target by offering computer generated search results that include suggestions of candidates found in the video that match (to some degree) the target. When one of the candidates is selected by a user, the search is shifted to other cameras and continued. In this way, the target may be tracked quickly. Further, a playlist of video snippets of the target is accumulated during the search and can be played to show all captured video of the target moving about the facility.
G11B 27/28 - Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording
To allow the human customer service agents to specialize in the instances where human service is preferred, but to scale to the volume of large call centers, systems and methods are provided in which human agents and intelligent virtual assistants (IVAs) co-handle a conversation with a customer. IVAs handle simple or moderate tasks, and human agents are used for those tasks that require or would benefit from human compassion or special handling. Instead of starting the conversation with an IVA and then escalating or passing control of the conversation to a human to complete, the IVAs and human agents work together on a conversation.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
66.
System to detect and reduce understanding bias in intelligent virtual assistants
Disclosed is a system and method for detecting and addressing bias in training data prior to building language models based on the training data. Accordingly system and method, detect bias in training data for Intelligent Virtual Assistant (IVA) understanding and highlight any found. Suggestions for reducing or eliminating them may be provided This detection may be done for each model within the Natural Language Understanding (NLU) component. For example, the language model, as well as any sentiment or other metadata models used by the NLU, can introduce understanding bias. For each model deployed, training data is automatically analyzed for bias and corrections suggested.
The present invention allows a CEC system to automatedly track the use, storage, access, and modification of sensitive information/data in the system through desktop monitoring. Further, through desktop, video, and audio monitoring of CSRs the system can automatedly determine the improper use, access, storage, and modification of sensitive information by implementing sensitive data use rules that allow a system to be specialized for the user. Finally, the system can automatedly determine and implement violation actions for the improper use, storage, access, and manipulation of sensitive information. This provides an intelligent system capable of locating all sensitive data in the system and regulating the use, access, and storage of sensitive data in the system.
The present application includes a method and system for developing a common inquiry response. The system receives at least one customer contact formed by an inquiry and its response, analyzes the customer contact to determine the content of the inquiry and the response, and stores the inquiry and the response in a corresponding inquiry-response sub-database in an inquiry-response database. After analyzing at least one of the sub-databases, the system assigns a common inquiry-response (CIR) knowledge document to that inquiry-response sub-database for future use involving similar inquiries and responses. This allows a user to respond more quickly to inquiries with a reduced risk of incorrect or inconsistent information in the response.
A method for workforce scheduling by a computer system is provided. The method includes receiving a first workforce schedule describing initial assignments of a plurality of workers to a plurality of shifts, each shift comprising one or more work activities, each work activity comprising an activity and a time interval, and storing the first workforce schedule in a memory. The method also includes receiving a cell size associated with each activity, and determining a quantity of workers in each work activity associated with each activity in the first workforce schedule. The method further includes determining cell size violations by dividing the quantity of workers assigned to each work activity by the cell size for the activity associated with the work activity. The method also includes modifying the first workforce schedule to minimize cell size violations, resulting in a second workforce schedule, and storing the second workforce schedule in the memory.
The present application includes a method and system for gathering customer information through games. The system transmits offers to play games over the contact medium used by the customer. The games are selected to elicit information from the customer; information ranging from the customer's mood to marketing information to security information. The information so obtained can be used to update client profiles.
A63F 13/61 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor using advertising information
A63F 13/79 - Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
H04M 11/08 - Telephonic communication systems specially adapted for combination with other electrical systems specially adapted for optional reception of entertainment or informative matter
71.
Detection of relational language in human-computer conversation
Virtual assistants intelligently emulate a representative of a service provider by providing variable responses to user queries received via the virtual assistants. These variable responses may take the context of a user's query into account both when identifying an intent of a user's query and when identifying an appropriate response to the user's query.
A real-time conversation is monitored between a user and an intelligent virtual assistant (IVA). A visualization may be generated and displayed to the user on the user computing device based on one or more topics identified in the conversation. The conversation between the user and the IVA may continue and is continued to be monitored. The visualization can be updated as the conversation continues, e.g., based on further topics being identified.
Attention weights in a hierarchical attention network indicate the relative importance of portions of a conversation between an individual at one terminal and a computer or a human agent at another terminal. Weighting the portions of the conversation after converting the conversation to a standard text format allows for a computer to graphically highlight, by color, font, or other indicator visible on a graphical user interface, which portions of a conversation led to an escalation of the interaction from an intelligent virtual assistant to a human customer service agent.
A method for workforce scheduling by a computer system is provided. The method includes receiving a first workforce schedule describing initial assignments of a plurality of workers to a plurality of shifts, each shift comprising one or more work activities, each work activity comprising an activity and a time interval, and storing the first workforce schedule in a memory. The method also includes receiving a cell size associated with each activity, and determining a quantity of workers in each work activity associated with each activity in the first workforce schedule. The method further includes determining cell size violations by dividing the quantity of workers assigned to each work activity by the cell size for the activity associated with the work activity. The method also includes modifying the first workforce schedule to minimize cell size violations, resulting in a second workforce schedule, and storing the second workforce schedule in the memory.
Systems and methods are disclosed for scheduling a workforce. In one embodiment, the method comprises receiving a shift activity template; receiving an association between the shift activity template and at least one worker; and scheduling a plurality of schedulable objects. The scheduling is performed in accordance with a workload forecast and schedule constraints. Each of the schedulable objects is based on the shift activity template. The shift activity template describes a worker activity performed during a shift. The template has range of start times and a variable length for the activity. The activity is associated with a queue.
Real-time speech analytics (RTSA) provides maintaining real-time speech conditions, rules, and triggers, and real-time actions and alerts to take. A call between a user and an agent is received at an agent computing device. The call is monitored to detect in the call one of the real-time speech conditions, rules, and triggers. Based on the detection, at least one real-time action and/or alert is initiated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G10L 17/00 - Speaker identification or verification
G10L 17/06 - Decision making techniques; Pattern matching strategies
77.
System and method of sentiment modeling and application to determine optimized agent action
The present invention is a system and method of continuous sentiment tracking and the determination of optimized agent actions through the training of sentiment models and applying the sentiment models to new incoming interactions. The system receives conversations comprising incoming interactions and agent actions and determines customer sentiment on a micro-interaction level for each incoming interaction. Based on interaction types, the system correlates the determined sentiment with the agent action received prior to the sentiment determination to create and train sentiment models. Sentiment models include agent action recommendations for a desired sentiment outcome. Once trained, the sentiment models can be applied to new incoming interactions to provide CSRs with actions that will yield a desired sentiment outcome.
The present application includes a method and system for multi-channel interaction. A communication session is initiated between a customer service representative (CSR) and an end user. Multi-channel communication is used between the end user and the CSR. The multi-channel communication includes at least voice and data. Information is presented to the end user via a user interface, and the user can confirm the accuracy of the information using the user interface.
The present invention is a method and system for automatedly producing at least one desktop analytics trigger. Upon receiving at least one type of data input, the system analyzes the data input and produces at least one desktop analytics trigger based on the results of the analysis of the data input. The data input can include data on the programs, applications, or information a user utilizes during a task, to allow use of desktop process analytics. This process may be used to either generate a new desktop analytics trigger or update an existing desktop analytics trigger.
Conversation user interfaces that are configured for virtual assistant interaction may include contextual interface items that are based on contextual information. The contextual information may relate to a current or previous conversation between a user and a virtual assistant and/or may relate to other types of information, such as a location of a user, an orientation of a device, missing information, and so on. The conversation user interfaces may additionally, or alternatively, control an input mode based on contextual information, such as an inferred input mode of a user or a location of a user. Further, the conversation user interfaces may tag conversation items by saving the conversation items to a tray and/or associating the conversation items with indicators.
C07K 16/28 - Immunoglobulins, e.g. monoclonal or polyclonal antibodies against material from animals or humans against receptors, cell surface antigens or cell surface determinants
Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)—this gives a risk assessment event before a call gets to an agent; 2) fraud detection—the ability to identify, in real time, if a caller is part of a fraudster cohort' and alert the agent and escalate to the fraud team; 3) identity authentication—the ability to identify through natural language if the caller is who they say they are; and 4) two factor authentication—the ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud.
H04M 1/64 - Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
H04M 3/22 - Arrangements for supervision, monitoring or testing
G10L 17/04 - Training, enrolment or model building
G10L 17/06 - Decision making techniques; Pattern matching strategies
H04M 3/42 - Systems providing special services or facilities to subscribers
A method of determining influence of language elements in script to an overall classification of the script by perturbing the dataset representing a conversation. In some instances, for example, in the conversation, the language elements and turns within the conversation (e.g., in a chat bot) are analyzed for their influence in escalation or non-escalation of the conversation to a higher level of resolution, e.g., to a human representative or manager.
A computerized system for deriving expression of intent from recorded speech includes: a text classification module comparing a transcription of recorded speech against a text classifier to generate a first set of representations of potential intents; a phonetics classification module comparing a phonetic transcription of the recorded speech against a phonetics classifier to generate a second set of representations; an audio classification module comparing an audio version of the recorded speech with an audio classifier to generate a third set of representations; and a discriminator module for receiving the first, second and third sets of the representations of potential intents and generating one derived expression of intent by processing the first, second and third sets together; where at least two of the text classification module, the phonetics classification module, and the audio classification module are asynchronous processes from one another.
G10L 15/02 - Feature extraction for speech recognition; Selection of recognition unit
G10L 15/18 - Speech classification or search using natural language modelling
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
The present invention is a system and method of routing incoming communications to a CSR and providing guidance to the CSR based on the incoming communication using feedback information such as sentiment feedback, survey feedback, and feedback from actions taken by CSRs based on skill level. A CEC system receives an incoming communication, analyzes the communication and creates metadata based off of the analysis. The metadata is used by the RAE routing module to route the communication to an appropriate party. The metadata is also used by the GAE guidance module to determine the guidance to provide to the CSR. The CSR then performs an action based on the guidance. The CEC system continues to monitor the interaction until the interaction is completed. The communication metadata, the communication, the guidance, and the CSRs action are all provided to a RAS rules analysis module wherein the RAS analyzes the data and automatedly updates the rules (RAR and GAR) according to the analysis.
The present invention allows for the capture and sentiment analysis of text the customer inputs into a chat, but never actually sends to the customer service representative (ghost text). The system captures this ghost text with a ghost capture system (GCS) software module. The GCS module analyzes the ghost text to generate metadata. The ghost text and metadata are used by a sentiment analysis engine to apply appropriate sentiment to the ghost text. The sentiment and ghost text are routed to a customer service representative (CSR). This provides the customer service agent with additional detail and information about a customer's emotions during a text chat conversation, allowing the CSR to determine a court of interaction not only based on the customer's response, but also based on the ghost text and the sentiment from the ghost text.
The present invention is a system and method for projective channel hopping within a customer engagement center (CEC) system. The CEC system receives a customer through a system entry point and receives, from the customer, a communication in a current customer service representative (CSR) channel in the CEC system. The CEC system assesses its ability to connect the customer with a CSR on the current CSR channel using a smart routing engine (SRE), which also assesses its current ability to connect the customer with a CSR on other equivalent CSR channels. Using the SRE, the CEC system compares its ability to connect the customer with a CSR on current and equivalent CSR channels to determine if the customer should remain on their current CSR channel or transfer to a new one. In the latter case, the CEC system offers the customer a chance to change channels or remain on their current channel.
A conversation user interface enables patients to better understand their healthcare by integrating diagnosis, treatment, medication management, and payment, through a system that uses a virtual assistant to engage in conversation with the patient. The conversation user interface conveys a visual representation of a conversation between the virtual assistant and the patient. An identity of the patient, including preferences and medical records, is maintained throughout all interactions so that each aspect of this integrated system has access to the same information. The conversation user interface presents allows the patient to interact with the virtual assistant using natural language commands to receive information and complete task related to his or her healthcare.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
G06F 3/04886 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 50/50 - ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for simulation or modelling of medical disorders
G16H 10/20 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for electronic clinical trials or questionnaires
Virtual assistants intelligently emulate a representative of a service provider by providing variable responses to user queries received via the virtual assistants. These variable responses may take the context of a user's query into account both when identifying an intent of a user's query and when identifying an appropriate response to the user's query.
An architecture for assessing and identifying fraudulent contact with client contact systems, such as IVR, includes threshold and machine learning scoring and filtering of calls based on these criteria. The criteria may include behavioral, situational and reputational scoring.
A set of documents related to a particular topic, industry, or entity are received. Sentences are extract from each document. The sentences are grouped into tuples of one, two, or three consecutive sentences (i.e., short text sequences). The sentence tuples are clustered based on vector representations of the sentences. For each cluster, a set of tuples that best represents or best fits the cluster is selected. These sentence tuples are fed to an ontology to determine ontological entities associated with each tuple. These determined ontological entities are associated with the clusters corresponding to each tuple. The sentence tuples associated with each cluster are labeled based on the ontological entities associated with the cluster. The labeled sentence tuples may then be used for a variety of purposes such as training a model to determine the topic of short text sequences.
Techniques and architectures for implementing a team of virtual assistants are described herein. The team may include multiple virtual assistants that are configured with different characteristics, such as different functionality, base language models, levels of training, visual appearances, personalities, and so on. The characteristics of the virtual assistants may be configured by trainers, end-users, and/or a virtual assistant service. The virtual assistants may be presented to end-users in conversation user interfaces to perform different tasks for the users in a conversational manner. The different virtual assistants may adapt to different contexts. The virtual assistants may additionally, or alternatively, interact with each other to carry out tasks for the users, which may be illustrated in conversation user interfaces.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
A method of video operations includes generating derivative byproducts related to encoded video captured of a scene, initializing a first operation based on the encoded video, and initializing a second operation different from the first operation based on the derivative byproducts.
H04N 19/46 - Embedding additional information in the video signal during the compression process
H04N 19/85 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression
H04N 9/79 - Processing of colour television signals in connection with recording
G11B 27/32 - Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording on separate auxiliary tracks of the same or an auxiliary record carrier
H04N 5/77 - Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
H04N 9/804 - Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components
H04N 9/82 - Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback the individual colour picture signal components being recorded simultaneously only
H04N 19/48 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using compressed domain processing techniques other than decoding, e.g. modification of transform coefficients, variable length coding [VLC] data or run-length data
H04N 19/50 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding
H04N 19/60 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
H04N 19/61 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding in combination with predictive coding
93.
Computerized system for transforming recorded speech into a derived expression of intent from the recorded speech
A computerized system for transforming recorded speech into a derived expression of intent from the recorded speech includes: (1) a text classification module comparing a transcription of at least a portion of recorded speech against a text classifier to generate a first set of one or more of the representations of potential intents based upon such comparison; (2) a phonetics classification module comparing a phonetic transcription of at least a portion of the recorded speech against a phonetics classifier to generate a second set of one or more of the representations of potential intents based upon such comparison; (3) an audio classification module comparing an audio version of at least a portion of the recorded speech with an audio classifier to generate a third set of one or more of the representations of potential intents based upon such comparison; and a (4) discriminator module for receiving the first, second and third sets of the one or more representations of potential intents and generating at least one derived expression of intent by processing the first, second and third sets of the one or more representations of potential intents together; where at least two of the text classification module, the phonetics classification module and the audio classification module are asynchronous processes from one another.
G10L 15/18 - Speech classification or search using natural language modelling
G10L 15/02 - Feature extraction for speech recognition; Selection of recognition unit
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
In one embodiment, certain words or phrases spoken by customers during calls to a call center are used to identify or authenticate the user. Words or phrases such as a customer's name, or an account number or telephone number, are selected for a customer. Recordings of the selected words or phrases spoken by the customer during previous calls are used to generate voiceprints that are stored and associated with the customer. Later, when the customer calls the call center, instances of the customer speaking the selected words are extracted from the call (referred to herein as “audio-of-interest”) and are compared against the voiceprints stored for the customer. If the voiceprints match the audio-of-interest the customer is authenticated.
A system for data recording across a network includes a session border controller connecting incoming data from the network to an endpoint recorder. A load balancer is connected to the network between the session border controller and the endpoint and receives the incoming data from the session border controller, wherein the load balancer comprises computer memory and a processor configured to parse the incoming data into video data and audio data according to identification protocols accessible by the processor from the computer memory. A recording apparatus includes recording memory that receives the incoming data from the load balancer, stores a duplicate version of the incoming data in the recording memory, and connects the incoming data to the endpoint.
H04M 3/42 - Systems providing special services or facilities to subscribers
H04M 7/00 - Arrangements for interconnection between switching centres
G06F 16/71 - Indexing; Data structures therefor; Storage structures
G06F 16/61 - Indexing; Data structures therefor; Storage structures
G06F 16/41 - Indexing; Data structures therefor; Storage structures
H04L 67/1036 - Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Experiential parsing (EP) is a technique for natural language parsing that falls into the category of dependency parsing. EP supports applications that derive meaning from chat language. An experiential language model parses chat data, and uses documented experiences with language without using automatic natural language processing (NLP) methods. A descriptive grammar is built at word level rather than a prescriptive grammar at phrase level. The experiential model is designed to understand that word “A” associates with word “B” by function “C”. The experiential model understands the relationship between words, independent of whether or not the overall phrase structure is grammatical. A high accuracy of producing the syntactic roles (such as main verb, direct object, etc.) is attained even when confronted with a variety of agrammatical inputs.
The present invention allows a CEC system to automatedly, and without human intervention, identify interactions that are likely in need of supervisor intervention. The system reviews all incoming and outgoing interactions for analysis by a metadata analytics service (MAS) software module. The MAS analyzes the interactions to generate interaction metadata, which is used by an interaction analysis engine (IAE) to score the quality of the interaction. If the quality of the interaction is not sufficient, the system marks the interaction as being a problem interaction and notifies a supervisor of the interaction. This ensures the intelligent and dynamic determination of interactions that require additional assistance and assures notification to a supervisor.
G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
98.
System and method of sentiment modeling and application to determine optimized agent action
The present invention is a system and method of continuous sentiment tracking and the determination of optimized agent actions through the training of sentiment models and applying the sentiment models to new incoming interactions. The system receives conversations comprising incoming interactions and agent actions and determines customer sentiment on a micro-interaction level for each incoming interaction. Based on interaction types, the system correlates the determined sentiment with the agent action received prior to the sentiment determination to create and train sentiment models. Sentiment models include agent action recommendations for a desired sentiment outcome. Once trained, the sentiment models can be applied to new incoming interactions to provide CSRs with actions that will yield a desired sentiment outcome.
A system and method schedule work within a workflow with defined process goals. A plurality of work queues are defined that comprise work items. The plurality of work queues are associated with one or more links between a parent work queue and at least one child work queue to form at least one work process. At least one work process goal is defined for each work process. A work schedule to achieve the work process goals is generated.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
100.
Creating and updating workforce schedules using a personal communication system
A personal communication system generates a request for initial schedule information corresponding to an initial workforce schedule generated by an enterprise analysis system. The personal communication system transmits the request for initial schedule information to the enterprise analysis system and receives a response including the initial schedule information. The personal communication system then generates a view of the initial workforce schedule based on the initial schedule information and displays the view of the initial workforce schedule in a primary application running on the personal communication system. The personal communication system then monitors for schedule factors relevant to the initial workforce schedule and transmits the schedule factors for use by the enterprise analysis system in generating an updated workforce schedule.