The invention relates generally to contact centers and particularly to servicing incoming contacts in contact centers.
Contact centers, such as Automatic Call Distribution or ACD systems, are employed by many enterprises to service customer contacts. A typical contact center includes a switch and/or server to receive and route incoming packet-switched and/or circuit-switched contacts and one or more resources, such as human agents and automated resources (e.g., Interactive Voice Response (IVR) units), to service the incoming contacts. Contact centers distribute contacts, whether inbound or outbound, for servicing to any suitable resource according to predefined criteria. In many existing systems, the criteria for servicing the contact from the moment that the contact center becomes aware of the contact until the contact is connected to an agent are customer-specifiable (i.e., programmable by the operator of the contact center), via a capability called vectoring. Normally in present-day ACDs when the ACD system's controller detects that an agent has become available to handle a contact, the controller identifies all predefined contact-handling skills of the agent (usually in some order of priority) and delivers to the agent the highest-priority oldest contact that matches the agent's highest-priority skill. Generally, the only condition that results in a contact not being delivered to an available agent is that there are no contacts waiting to be handled. The term “contact” or “call” as used herein is intended to include not only telephone calls but also non-telephonic communications, such as data transmissions such as electronic mail, voice-over-IP, facsimile, etc., whether circuit switched or packet switched.
The primary objective of contact center management, including call-distribution algorithms, is to ultimately maximize contact center performance and profitability. This objective has been implemented using a myriad of contact routing, or work item distribution, algorithms. However as available contact media changes, established contact routing algorithms become obsolete and need to be changed.
Dropped wireless calls represent such an impetus for change, particularly given the increased use of mobile and battery operated communication devices. Dropped calls in a contact-center environment are particularly aggravating to wireless callers because of the time (and therefore expense) it takes to reach an agent prior to obtaining service and the caller's need to start over again in reaching and/or providing information to an agent. Dropped calls adversely impact agent satisfaction and contact center performance and profitability because the time spent with the caller often does not result in being able to close a work item efficiently. When the caller next calls the contact center, he or she must again use scarce processing resources, such as an Interactive Voice Response or IVR unit and a position in one or more call queues. Requeuing a dropped contact increases wait time not only for the dropped caller but also for other callers.
When the call is dropped after it has been delivered to an agent and before the servicing of the contact is completed, the contact center has additional problems. The thread between the dropped caller and agent is lost along with information respecting the state of servicing the customer before the contact was dropped. Often, the recorded state excludes significant information omitted by the agent. When the caller calls back, there is no guarantee, and typically a low probability, that the caller will be connected with the same agent before the information is irretrievably lost (i.e., forgotten by the agent).
Data-driven last-agent routing is a well known and implemented technique in contact center product offerings. This feature permits an existing contact center customer to be routed to an agent with whom the customer has had prior contact. The redirection is data-driven in that a set of data structures is maintained linking the customer with the agent. However, this feature is customer configurable and may or may not be activated. When activated, it is automatic. Agents therefore have no ability to invoke selectively the feature on an “as needed” basis.
These and other needs are addressed by the various embodiments and configurations of the present invention. The present invention is directed generally to providing preferential treatment to voluntarily and involuntarily abandoned contacts.
In a first embodiment of the present invention, a method is provided for servicing contacts that includes the steps of:
(a) receiving a queue bypass request for a specified first customer; and
(b) updating a set of data structures associated with the specified first customer to indicate that the first customer is entitled to bypass queue positions when the first customer again contacts the contact center.
In one configuration, once the identity of the caller is established (such as by data collection techniques (e.g., caller-identification, Dual Tone Multi-Frequency or DTMF entries by the caller) or prescreening by an agent), the call is associated with a customer record in the database of the contact center, and the customer record provides input to the contact routing algorithms. The invention adds information to the customer record signifying that the last agent has authorized an incoming call from the customer to be routed to the head of the queue assigned to that last agent. The authorization is placed in the customer record by the agent at the conclusion of the prior call, when the agent determined that the call ended prematurely. The authorization from queue bypass is time-limited providing a window of opportunity for the caller to re-establish the call using, perhaps, a different device. At the end of the time period, the authorization silently expires, and the call center reverts to routing calls from the customer in the normal fashion.
In one configuration when the agent is already busy on another call at the time the previous caller re-establishes the call, the caller, while waiting in first-in-queue for the last agent, hears an announcement that the contact center has given preferential treatment to the caller and placed the call next-in-line for the last agent. The caller also hears an option to opt-out to the next available agent instead of continuing to wait. Thus, the agent has offered and authorized preferential treatment, and the caller may accept or decline such treatment.
In one configuration, the embodiment allows a contact center agent, who experiences a dropped call, to activate temporarily last-agent queue-bypass routing on behalf of the caller so that, when a call back is received from the caller, the same agent can continue servicing the call. Dropped calls thus can have a much shorter time to reach the last agent than generally enqueued calls. Moreover, a contact center may have reasons not to implement last-agent routing for all incoming calls. This feature can be invoked by the agent on any condition that the agent deems warrants special treatment. Thus, the agent, who is handling the call and knows best what to do to preserve customer loyalty, is given authorization to invoke the feature.
In a second embodiment, a method is provided that includes the steps of:
(a) determining that an enqueued first contact from a first customer has been disconnected; and
(b) updating a set of data structures associated with the first customer to indicate that the first customer is entitled to preferential treatment when the first customer again contacts the contact center.
As in the case of the prior embodiment, this embodiment can protect against dropped calls. The dropped call protection is extended by the present embodiment to include calls dropped while in queue. Because both embodiments preferably keep call state in the database and not in the communications infrastructure, the preferential treatment is customer-specific and protocol and communication path independent. By providing dropped call protection, both embodiments can provide increased levels of customer loyalty and satisfaction.
These and other advantages will be apparent from the disclosure of the invention(s) contained herein.
As used herein, “at least one”, “one or more”, and “and/or” are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions “at least one of A, B and C”, “at least one of A, B, or C”, “one or more of A, B, and C”, “one or more of A, B, or C” and “A, B, and/or C” means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.
The above-described embodiments and configurations are neither complete nor exhaustive. As will be appreciated, other embodiments of the invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
The invention will be illustrated below in conjunction with an exemplary communication system. Although well suited for use with, e.g., a system having an ACD or other similar contact processing switch, the invention is not limited to use with any particular type of communication system switch or configuration of system elements. Those skilled in the art will recognize that the disclosed techniques may be used in any communication application in which it is desirable to provide improved contact processing.
The term “switch” or “server” as used herein should be understood to include a PBX, an ACD, an enterprise switch, or other type of communications system switch or server, as well as other types of processor-based communication control devices such as media servers, computers, adjuncts, etc.
Referring to
The switch 130 and/or server 110 can be any architecture for directing contacts to one or more communication devices. Illustratively, the switch and/or server can be a modified form of the subscriber-premises equipment disclosed in U.S. Pat. Nos. 6,192,122; 6,173,053; 6,163,607; 5,982,873; 5,905,793; 5,828,747; and 5,206,903, all of which are incorporated herein by this reference; Avaya Inc.'s Definity™ Private-Branch Exchange (PBX)-based ACD system; MultiVantage™ PBX, CRM Central 2000 Server™, Communication Manager™, S8300™ media server, and/or Avaya Interaction Center™. Typically, the switch/server is a stored-program-controlled system that conventionally includes interfaces to external communication links, a communications switching fabric, service circuits (e.g., tone generators, announcement circuits, etc.), memory for storing control programs and data, and a processor (i.e., a computer) for executing the stored control programs to control the interfaces and the fabric and to provide automatic contact-distribution functionality. The switch and/or server typically include a network interface card (not shown) to provide services to the serviced communication devices. Other types of known switches and servers are well known in the art and therefore not described in detail herein.
Referring to
Referring to
The first communication devices 134-1, . . . 134-N are packet-switched and can include, for example, IP hardphones such as the Avaya Inc.'s, 4600 Series IP Phones™, IP softphones such as Avaya Inc.'s, IP Softphone™, Personal Digital Assistants or PDAs, Personal Computers or PCs, laptops, packet-based H.320 video phones and conferencing units, packet-based voice messaging and response units, packet-based traditional computer telephony adjuncts, and any other communication device.
The second communication devices 138-1, . . . 138-M are time division multiplexed and/or circuit-switched. Each of the communication devices 138-1, . . . 138-M corresponds to one of a set of internal extensions Ext1, . . . ExtM, respectively. These extensions are referred to herein as “internal” in that they are extensions within the premises that are directly serviced by the switch. More particularly, these extensions correspond to conventional communication device endpoints serviced by the switch/server, and the switch/server can direct incoming calls to and receive outgoing calls from these extensions in a conventional manner. The second communication devices can include, for example, wired and wireless telephones, PDAs, H.320 video phones and conferencing units, voice messaging and response units, traditional computer telephony adjuncts, and any other communication device.
It should be noted that the invention does not require any particular type of information transport medium between switch or server and first and second communication devices, i.e., the invention may be implemented with any desired type of transport medium as well as combinations of different types of transport channels.
The packet-switched network 162 can be any data and/or distributed processing network, such as the Internet. The network 162 typically includes proxies (not shown), registrars (not shown), and routers (not shown) for managing packet flows.
The packet-switched network 162 is in communication with an external first communication device 174 via a gateway 178, and the circuit-switched network 154 with an external second communication device 180. These communication devices are referred to as “external” in that they are not directly supported as communication device endpoints by the switch or server. The communication devices 174 and 180 are an example of devices more generally referred to herein as “external endpoints.”
In a preferred configuration, the server 110, network 162, and first communication devices 134 are Session Initiation Protocol or SIP compatible and can include interfaces for various other protocols such as the Lightweight Directory Access Protocol or LDAP, H.248, H.323, Simple Mail Transfer Protocol or SMTP, IMAP4, ISDN, E1/T1, and analog line or trunk.
It should be emphasized that the configuration of the switch, server, user communication devices, and other elements as shown in
As will be appreciated, the central server 110 is notified via LAN 142 of an incoming contact by the communications component (e.g., switch 130, fax server, email server, web server, and/or other server) receiving the incoming contact. The incoming contact is held by the receiving communications component until the server 110 forwards instructions to the switch 130, which in turn forward instructions to the component to forward or route the contact to a specific contact center resource, such as the IVR unit 122, the voice mail server 118, and/or first or second communication device 134, 138 associated with a selected agent. The server 110 distributes and connects these contacts to communication devices of available agents based on the predetermined criteria noted above. When the central server 110 forwards a voice contact to an agent, the central server 110 also forwards customer-related information from databases 114 to the agent's computer work station for previewing and/or viewing (such as by a pop-up display) to permit the agent to better serve the customer. The agents process the contacts sent to them by the central server 110 and information respecting agent servicing of the contacts is stored in the database 114.
According to the invention, a queue bypass module 232 is provided. The module 232 is stored either in the main memory or in a peripheral memory (e.g., disk, CD ROM, etc.) or some other computer-readable medium of the center 100. The module 232 receives and configures data structures evidencing agent requests to provide customers with a queue bypass option that is valid for a queue bypass time period. The module 232 identifies incoming contacts from customers entitled to receive a queue bypass option, moves the contact to the head of a queue, and thereby effects direction of the incoming contact to an appropriate agent for servicing. The queue bypass option thus permits agents to provide customers, that are unable during the initial contact with the agent to receive full service, such as due to a dropped call or the need to perform an operation (such as turning on a computer in a computer service call, retrieving documents containing needed transaction identification information, and the like) as part of the servicing, with preferential treatment in a later contact respecting the same matter with the same or a different agent.
By storing the queue bypass flag and queue bypass period values in the customer's set of data structures in database 114, the module 232 is able to link the queue bypass option with the customer directly rather than only with his or her communication device. This permits the customer to call back using the same or a different communication device, whether using the same or a different communication mode or the same or different communication path or protocol, and receive preferential treatment via the queue bypass option. For example, if the battery in the customer's cellular telephone dies the customer can use a friend's cellular telephone to call back the contact center. Although the customer would not be identified by digit analysis, the IVR unit 122 would identify the customer through its interactive query/response menu and notify the queue bypass module 232 that the customer has called back. In the above example, the customer could also call back via a different communication medium, such as by a wired packet-switched or circuit-switched telephone, and, after identification by the IVR unit 122, receive preferential queue bypass treatment. In one configuration, the customer is given, such as by an electronic message or outbound automated voice call, a specific number or electronic address to use for the call back. By using this number, which can be varied by the contact center daily or weekly, the call back is readily identified as a call back eligible for queue bypass treatment.
When the queue bypass option is set by the agent, the agent may further set, or the module 232 select independently of the agent, the queue bypass period during which the corresponding customer can call back and access or exercise the queue bypass option. The length of the queue bypass period can depend on many factors. For example, it can depend upon the maximum amount of time that an average agent will remember details of the partially serviced interaction with the customer, the time required to call back the contact center by the selected media type, the type of communication pathway used in the call back (e.g., the time required to call back the contact center by a specific media type can vary), the time required to be identified by the automated response unit, and the reason for setting the queue bypass option (e.g., if a cellular phone call was dropped it could be because the cellular phone signal is too weak or the cellular phone battery died, either of which may require a longer queue bypass period, or if the customer, as part of a warranty call, has been asked to try an operation on a device and call back the contact center). For example, a live voice call back, the option period could be 15 minutes. For an instant messaging call back, the option period could be 20 minutes because of the need to type in responses to an automated interactive response unit, such as an IVR.
The queue bypass option may cause the call back customer to be connected to the same or a different agent. Upon call back, the customer can be queried whether or not he or she wishes to be connected with the same agent and advised of the corresponding wait time or whether or not he or she would wish to be connected with another or first available agent and advised of the corresponding wait time. In either case, the customer is moved to a higher position, or a position closer to the head of the queue, than he would otherwise be moved to in the absence of the queue bypass option. In one configuration, the contact proceeds immediately to the head of the queue and awaits servicing by a selected agent. In one configuration, the agent determines whether or not the customer is to be directed to him or her on call back or whether the customer can have the option to be directed to any agent on call back. This configuration reflects the fact that the agent servicing the customer knows best the reason for the call back and the state of servicing of the contact at the time of premature termination; thus, the agent knows best what to do with the call back.
By way of illustration, the customer, upon call back, can be provided with an audio and/or video notification that he or she is entitled to exercise the queue bypass option and what the option means. For example, the module could notify the customer using a notification such as:
The operation of the queue bypass module 232 will now be discussed with reference to
Referring to
In any event, the queue bypass module 232, in step 300, receives, from the agent's station, the queue bypass request for an identified customer. Customer identification by the agent, or association of the option with the customer, can be based on the electronic address of the contacting customer communication device and/or a unique customer identifier, such as a record locator, a social security number, a driver's license number, an account number, a customer's name, and the like. Because the agent is normally in the middle of data entry into the customer's record when the queue bypass request is generated, customer identification is normally done with reference to the customer's record locator or account number.
In step 304, the module 232, in response to the request, updates the customer record to reflect the queue bypass option. This step normally request the queue bypass option flag to be set in the customer's record along with a corresponding timestamp indicating when the option starts and/or when the option ends. In the former case, a queue bypass duration or time period is included in the record. Finally, the identifier of the agent making the request is included in the customer's record. In one configuration, a pointer or link to the agent's record is included in the customer's record.
Referring now to
In step 400, an incoming contact from the customer is received in step 400. The customer is initially identified, such as by digit analysis (e.g., using Automatic Number Identification or ANI digits, Dialed Number Identification Service (DNIS), or caller identification information) for a voice call or source address for a packet-switched communication (e.g., an instant message, an email, or a Voice over IP or VoIP call).
In decision diamond 404, the module 232 determines whether the incoming contact is entitled to a queue bypass option. If not, the module 232 proceeds to step 408 and determines the identity of the customer making the contact using an automated response unit, such as IVR unit 122.
In decision diamond 410, the module 232 again determines whether the incoming contact is entitled to the queue bypass option by virtue of being identified as a particular customer. As will be appreciated, the decision diamond is repeated because the customer may be calling back using someone else's communication device.
If the customer is entitled to use the queue bypass option in decision diamonds 404 or 410, the module 232, in decision diamond 412, determines, based on the customer's records, whether the queue bypass has expired. When the queue bypass option has expired or when the customer is not entitled to the queue bypass option in decision diamond 408, the agent and contact selector 220 performs normal contact processing/routing in step 416. In one configuration, the ability of the customer to exercise the queue bypass option further requires the agent giving the customer the option to be available within a selected wait time and/or to be on duty. If the agent will not be available within the selected wait time or is off duty, the customer contact is not entitled to the queue bypass option. The period, thus, often reflects the time at which the agent will be on or off duty.
If the queue bypass option has not expired in decision diamond 412, the module 232, in step 420, pushes the contact to the head of the queue and/or to the specified agent giving the customer the queue bypass option.
In decision diamond 424, the module 232 determines whether the specified agent is currently available. If so, the module 232 in step 428 delivers the contact to the specified agent.
If not, the module 232 in decision diamond 432 determines whether or not the customer is willing to be serviced by another agent. This can be done by providing the customer with the message quoted above, for example. If the customer elects to be serviced by the first available agent (even though that service may take longer than using the specified agent who is already familiar with the customer's needs), the module 232, in step 440, delivers the contact to the first (or next) available agent. If the customer does not want to be serviced by the first or next available agent, the module 232, in step 436, delivers the contact to the specified agent when that agent is available.
In another embodiment, the functionality of the module 232 is broadened to include preferential treatment for contacts abandoning while in queue. Abandonment of the contact can be for a variety of reasons, including customer frustration with queue wait times, the customer's immediate need to attend to a personal matter (such as changing a diaper on or otherwise assisting a child), and loss of connection. When an abandonment occurs, the module, rather than offering a complete queue bypass, could give the contactor the same queue position he had at the time of abandonment or put a placeholder in an advanced queue position reflecting the time progression of the contactor's queue position at the time of abandonment. This option would however only be given the contactor if he or she were to call back within a determined period of time. Alternatively, the module 232 could track accumulated time in queue for the contactor and provide him or her with the benefit of that accumulated time in queue if the contactor calls back within a determined period of time. The contactor would be placed in a queue position commensurate with the accumulated amount of actual wait time. For example, if the accumulated wait time is 10 minutes and queue position 5 has an accumulated wait time of 9.5 minutes while queue position 4 has an accumulated wait time of 10.2 minutes, the contactor would be given queue position 5 while the person currently having queue position 5 would be bumped to the next higher queue position, or queue position 6. In either event, the contactor would receive a higher queue position (or a queue position closer to the head of the queue) than he or she would otherwise receive in the absence of the option.
The operation of the queue bypass module 232 according to this embodiment will now be discussed with reference to
With reference to
With reference to
In decision diamond 604, the module 232 determines whether the incoming contact is entitled to queue priority. This is done by identifying the customer as noted above and determining from the customer's record whether a queue priority flag is set and/or whether a queue priority field is populated. The queue priority field records information such as a queue position at the time of abandonment, timestamps indicating when the abandoned contact was originally received, placed in the identified queue, and/or abandoned or an accumulated amount of time, and an cumulative amount of time the abandoned contact was in the identified queue before being abandoned. The module 232 further confirms whether or not the contactor has called back within a determined period of time. When the contact is not entitled to queue priority or would be entitled to queue priority but has failed to call back within the determined period of time, the module 232 in step 608 performs normal contact routing of the contact. When the contact is entitled to queue priority and the call back occurred within the determined period of time, the module 232 provides the contact with queue priority in step 612.
A number of variations and modifications of the invention can be used. It would be possible to provide for some features of the invention without providing others.
For example in one alternative embodiment, an outbound contact is initiated to the communication device that dropped the contact. The outgoing contact may be a voice call from the agent and/or a screen display advising the customer of the availability of the queue bypass option.
In yet another embodiment, dedicated hardware implementations including, but not limited to, Application Specific Integrated Circuits or ASICs, programmable logic arrays, and other hardware devices can likewise be constructed to implement the methods described herein. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
It should also be stated that the software implementations of the present invention are optionally stored on a tangible storage medium, such as a magnetic medium like a disk or tape, a magneto-optical or optical medium like a disk, or a solid state medium like a memory card or other package that houses one or more read-only (non-volatile) memories. A digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the invention is considered to include a tangible storage medium or distribution medium and prior art-recognized equivalents and successor media, in which the software implementations of the present invention are stored.
Although the present invention describes components and functions implemented in the embodiments with reference to particular standards and protocols, the invention is not limited to such standards and protocols. Other similar standards and protocols not mentioned herein are in existence and are considered to be included in the present invention. Moreover, the standards and protocols mentioned herein and other similar standards and protocols not mentioned herein are periodically superseded by faster or more effective equivalents having essentially the same functions. Such replacement standards and protocols having the same functions are considered equivalents included in the present invention.
The present invention, in various embodiments, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. Those of skill in the art will understand how to make and use the present invention after understanding the present disclosure. The present invention, in various embodiments, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease and\or reducing cost of implementation.
The foregoing discussion of the invention has been presented for purposes of illustration and description. The foregoing is not intended to limit the invention to the form or forms disclosed herein. In the foregoing Detailed Description for example, various features of the invention are grouped together in one or more embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the following claims are hereby incorporated into this Detailed Description, with each claim standing on its own as a separate preferred embodiment of the invention.
Moreover, though the description of the invention has included description of one or more embodiments and certain variations and modifications, other variations and modifications are within the scope of the invention, e.g., as may be within the skill and knowledge of those in the art, after understanding the present disclosure. It is intended to obtain rights which include alternative embodiments to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges or steps to those claimed, whether or not such alternate, interchangeable and/or equivalent structures, functions, ranges or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.
Number | Name | Date | Kind |
---|---|---|---|
4163124 | Jolissaint | Jul 1979 | A |
4567323 | Lottes et al. | Jan 1986 | A |
4737983 | Frauenthal et al. | Apr 1988 | A |
4797911 | Szlam et al. | Jan 1989 | A |
4894857 | Szlam et al. | Jan 1990 | A |
5001710 | Gawrys et al. | Mar 1991 | A |
5097528 | Gursahaney et al. | Mar 1992 | A |
5101425 | Darland | Mar 1992 | A |
5155761 | Hammond | Oct 1992 | A |
5164983 | Brown et al. | Nov 1992 | A |
5166974 | Morganstein et al. | Nov 1992 | A |
5185782 | Srinivasan | Feb 1993 | A |
5206903 | Kohler | Apr 1993 | A |
5210789 | Jeffus et al. | May 1993 | A |
5274700 | Gechter et al. | Dec 1993 | A |
5278898 | Cambray et al. | Jan 1994 | A |
5291550 | Levy et al. | Mar 1994 | A |
5299260 | Shaio | Mar 1994 | A |
5309513 | Rose | May 1994 | A |
5335268 | Kelly, Jr. et al. | Aug 1994 | A |
5335269 | Steinlicht | Aug 1994 | A |
5390243 | Casselman et al. | Feb 1995 | A |
5402474 | Miller et al. | Mar 1995 | A |
5436965 | Grossman et al. | Jul 1995 | A |
5444774 | Friedes | Aug 1995 | A |
5469503 | Butensky et al. | Nov 1995 | A |
5469504 | Blaha | Nov 1995 | A |
5473773 | Aman et al. | Dec 1995 | A |
5479497 | Kovarik | Dec 1995 | A |
5500795 | Powers et al. | Mar 1996 | A |
5504894 | Ferguson et al. | Apr 1996 | A |
5506898 | Costantini et al. | Apr 1996 | A |
5530744 | Charalambous et al. | Jun 1996 | A |
5537470 | Lee | Jul 1996 | A |
5537542 | Eilert et al. | Jul 1996 | A |
5544232 | Baker et al. | Aug 1996 | A |
5546452 | Andrews et al. | Aug 1996 | A |
5559878 | Keys et al. | Sep 1996 | A |
5592378 | Cameron et al. | Jan 1997 | A |
5592542 | Honda et al. | Jan 1997 | A |
5594726 | Thompson et al. | Jan 1997 | A |
5606361 | Davidsohn et al. | Feb 1997 | A |
5611076 | Durflinger et al. | Mar 1997 | A |
5627884 | Williams et al. | May 1997 | A |
5642515 | Jones et al. | Jun 1997 | A |
5657382 | Tamagawa et al. | Aug 1997 | A |
5684872 | Flockhart et al. | Nov 1997 | A |
5684964 | Powers et al. | Nov 1997 | A |
5689698 | Jones et al. | Nov 1997 | A |
5696811 | Maloney et al. | Dec 1997 | A |
5701295 | Bales et al. | Dec 1997 | A |
5703943 | Otto | Dec 1997 | A |
5713014 | Durflinger et al. | Jan 1998 | A |
5724092 | Davidsohn et al. | Mar 1998 | A |
5740238 | Flockhart et al. | Apr 1998 | A |
5742668 | Pepe et al. | Apr 1998 | A |
5742675 | Kilander et al. | Apr 1998 | A |
5748468 | Notenboom et al. | May 1998 | A |
5749079 | Yong et al. | May 1998 | A |
5751707 | Voit et al. | May 1998 | A |
5752027 | Familiar | May 1998 | A |
5754639 | Flockhart et al. | May 1998 | A |
5754776 | Hales et al. | May 1998 | A |
5754841 | Carino, Jr. | May 1998 | A |
5757904 | Anderson | May 1998 | A |
5790677 | Fox et al. | Aug 1998 | A |
5793861 | Haigh | Aug 1998 | A |
5794250 | Carino, Jr. et al. | Aug 1998 | A |
5796393 | MacNaughton et al. | Aug 1998 | A |
5802163 | Miloslavsky | Sep 1998 | A |
5802282 | Hales et al. | Sep 1998 | A |
5818907 | Maloney et al. | Oct 1998 | A |
5825869 | Brooks et al. | Oct 1998 | A |
5825870 | Miloslavsky | Oct 1998 | A |
5828747 | Fisher et al. | Oct 1998 | A |
5838968 | Culbert | Nov 1998 | A |
5839117 | Cameron et al. | Nov 1998 | A |
5867562 | Scherer | Feb 1999 | A |
5875437 | Atkins | Feb 1999 | A |
5880720 | Iwafune et al. | Mar 1999 | A |
5881238 | Aman et al. | Mar 1999 | A |
5884032 | Bateman et al. | Mar 1999 | A |
5889956 | Hauser et al. | Mar 1999 | A |
5897622 | Blinn et al. | Apr 1999 | A |
5903641 | Tonisson | May 1999 | A |
5903877 | Berkowitz et al. | May 1999 | A |
5915012 | Miloslavsky | Jun 1999 | A |
5926538 | Deryugin et al. | Jul 1999 | A |
5930786 | Carino, Jr. et al. | Jul 1999 | A |
5937051 | Hurd et al. | Aug 1999 | A |
5937402 | Pandilt | Aug 1999 | A |
5940496 | Gisby et al. | Aug 1999 | A |
5940497 | Miloslavsky | Aug 1999 | A |
5943416 | Gisby | Aug 1999 | A |
5948065 | Eilert et al. | Sep 1999 | A |
5960073 | Kikinis et al. | Sep 1999 | A |
5963635 | Szlam et al. | Oct 1999 | A |
5963911 | Walker et al. | Oct 1999 | A |
5970132 | Brady | Oct 1999 | A |
5974135 | Breneman et al. | Oct 1999 | A |
5974462 | Aman et al. | Oct 1999 | A |
5978465 | Corduroy et al. | Nov 1999 | A |
5982873 | Flockhart et al. | Nov 1999 | A |
5987117 | McNeil et al. | Nov 1999 | A |
5991392 | Miloslavsky | Nov 1999 | A |
5996013 | Delp et al. | Nov 1999 | A |
5999963 | Bruno et al. | Dec 1999 | A |
5999965 | Kelly | Dec 1999 | A |
6000832 | Franklin et al. | Dec 1999 | A |
6009157 | Bales et al. | Dec 1999 | A |
6011844 | Uppaluru et al. | Jan 2000 | A |
6021428 | Miloslavsky | Feb 2000 | A |
6038293 | Mcnerney et al. | Mar 2000 | A |
6044144 | Becker et al. | Mar 2000 | A |
6044205 | Reed et al. | Mar 2000 | A |
6044355 | Crockett et al. | Mar 2000 | A |
6049547 | Fisher et al. | Apr 2000 | A |
6049603 | Schwartz et al. | Apr 2000 | A |
6052723 | Ginn | Apr 2000 | A |
6055308 | Miloslavsky et al. | Apr 2000 | A |
6064730 | Ginsberg | May 2000 | A |
6064731 | Flockhart et al. | May 2000 | A |
6084954 | Harless | Jul 2000 | A |
6088441 | Flockhart et al. | Jul 2000 | A |
6115462 | Servi et al. | Sep 2000 | A |
6130933 | Miloslavsky | Oct 2000 | A |
6141328 | Nabkel et al. | Oct 2000 | A |
6151571 | Pertrushin | Nov 2000 | A |
6154769 | Cherkasova et al. | Nov 2000 | A |
6163607 | Bogart et al. | Dec 2000 | A |
6173053 | Bogart et al. | Jan 2001 | B1 |
6175564 | Miloslavsky et al. | Jan 2001 | B1 |
6178441 | Elnozahy | Jan 2001 | B1 |
6185292 | Miloslavsky | Feb 2001 | B1 |
6192122 | Flockhart et al. | Feb 2001 | B1 |
6215865 | McCalmont | Apr 2001 | B1 |
6223165 | Lauffer | Apr 2001 | B1 |
6226377 | Donaghue, Jr. | May 2001 | B1 |
6229819 | Darland et al. | May 2001 | B1 |
6230183 | Yocom et al. | May 2001 | B1 |
6230287 | Pinard et al. | May 2001 | B1 |
6233333 | Dezonmo | May 2001 | B1 |
6240417 | Eastwick | May 2001 | B1 |
6259786 | Gisby | Jul 2001 | B1 |
6259969 | Tackett et al. | Jul 2001 | B1 |
6263359 | Fong et al. | Jul 2001 | B1 |
6272544 | Mullen | Aug 2001 | B1 |
6275806 | Pertrushin | Aug 2001 | B1 |
6275812 | Haq et al. | Aug 2001 | B1 |
6275991 | Erlin | Aug 2001 | B1 |
6278777 | Morley | Aug 2001 | B1 |
6292550 | Burritt | Sep 2001 | B1 |
6295353 | Flockhart et al. | Sep 2001 | B1 |
6320956 | Cherry | Nov 2001 | B1 |
6353810 | Petrushin | Mar 2002 | B1 |
6356632 | Foster et al. | Mar 2002 | B1 |
6366668 | Borst et al. | Apr 2002 | B1 |
6389028 | Bondarenko et al. | May 2002 | B1 |
6389132 | Price | May 2002 | B1 |
6389400 | Bushey et al. | May 2002 | B1 |
6424709 | Doyle et al. | Jul 2002 | B1 |
6426950 | Mistry | Jul 2002 | B1 |
6427137 | Petrushin | Jul 2002 | B2 |
6430282 | Bannister et al. | Aug 2002 | B1 |
6434230 | Gabriel | Aug 2002 | B1 |
6449356 | Dezonno | Sep 2002 | B1 |
6449358 | Anisimov et al. | Sep 2002 | B1 |
6449646 | Sikora et al. | Sep 2002 | B1 |
6453038 | McFarlane et al. | Sep 2002 | B1 |
6463148 | Brady | Oct 2002 | B1 |
6463346 | Flockhart et al. | Oct 2002 | B1 |
6463415 | St. John | Oct 2002 | B2 |
6480826 | Pertrushin | Nov 2002 | B2 |
6490350 | McDuff et al. | Dec 2002 | B2 |
6535600 | Fisher et al. | Mar 2003 | B1 |
6535601 | Flockhart et al. | Mar 2003 | B1 |
6560330 | Gabriel | May 2003 | B2 |
6560649 | Mullen et al. | May 2003 | B1 |
6560707 | Curtis et al. | May 2003 | B2 |
6563920 | Flockhart et al. | May 2003 | B1 |
6597685 | Miloslavsky et al. | Jul 2003 | B2 |
6614903 | Flockhart et al. | Sep 2003 | B1 |
6636599 | Mullen | Oct 2003 | B1 |
6650748 | Edwards et al. | Nov 2003 | B1 |
6697457 | Petrushin | Feb 2004 | B2 |
6697858 | Ezerzer et al. | Feb 2004 | B1 |
6704409 | Dilip et al. | Mar 2004 | B1 |
6707903 | Burok et al. | Mar 2004 | B2 |
6724885 | Deutsch et al. | Apr 2004 | B1 |
6738353 | Chong | May 2004 | B2 |
6754333 | Flockhart et al. | Jun 2004 | B1 |
6766013 | Flockhart et al. | Jul 2004 | B2 |
6766014 | Flockhart et al. | Jul 2004 | B2 |
6798877 | Johnson et al. | Sep 2004 | B2 |
6934381 | Klein et al. | Aug 2005 | B1 |
6947543 | Alvarado et al. | Sep 2005 | B2 |
7012888 | Schoeneberger et al. | Mar 2006 | B2 |
7035927 | Flockhart et al. | Apr 2006 | B2 |
7124098 | Hopson et al. | Oct 2006 | B2 |
7215759 | Brown et al. | May 2007 | B2 |
7222075 | Petrushin | May 2007 | B2 |
7236583 | Beckstrom et al. | Jun 2007 | B2 |
7245711 | Margolis | Jul 2007 | B2 |
7260203 | Holt et al. | Aug 2007 | B2 |
7274787 | Schoeneberger | Sep 2007 | B1 |
7760867 | Walker et al. | Jul 2010 | B2 |
20030174830 | Boyer et al. | Sep 2003 | A1 |
20030177017 | Boyer et al. | Sep 2003 | A1 |
20030195753 | Homuth | Oct 2003 | A1 |
20040019808 | Devine et al. | Jan 2004 | A1 |
20040039846 | Goss et al. | Feb 2004 | A1 |
20040081311 | Thompson | Apr 2004 | A1 |
20040161097 | Henry | Aug 2004 | A1 |
20040184593 | Elsey et al. | Sep 2004 | A1 |
20040193475 | Hemm et al. | Sep 2004 | A1 |
20040203660 | Tibrewal et al. | Oct 2004 | A1 |
20040203878 | Thomson | Oct 2004 | A1 |
20040235509 | Burritt et al. | Nov 2004 | A1 |
20050089155 | Isenberg | Apr 2005 | A1 |
20050182672 | Hemm et al. | Aug 2005 | A1 |
20050238163 | Brown et al. | Oct 2005 | A1 |
20060177034 | Reding et al. | Aug 2006 | A1 |
20080037764 | Lee et al. | Feb 2008 | A1 |
Number | Date | Country |
---|---|---|
2143198 | Jan 1995 | CA |
2174762 | Mar 1996 | CA |
0501189 | Sep 1992 | EP |
0 701 358 | Mar 1996 | EP |
0 740 450 | Oct 1996 | EP |
0772335 | May 1997 | EP |
0829996 | Mar 1998 | EP |
0855826 | Jul 1998 | EP |
0863651 | Sep 1998 | EP |
0866407 | Sep 1998 | EP |
899673 | Mar 1999 | EP |
0 998 108 | May 2000 | EP |
1 120 729 | Jan 2001 | EP |
1091307 | Apr 2001 | EP |
1 081 930 | Jul 2001 | EP |
1150236 | Oct 2001 | EP |
1 564 977 | Aug 2005 | EP |
2273418 | Jun 1994 | GB |
2290192 | Dec 1995 | GB |
WO 9607141 | Mar 1996 | WO |
WO 9728635 | Aug 1997 | WO |
WO 9856207 | Dec 1998 | WO |
Entry |
---|
Virtual Hold® Technology “Solutions—WebConnect” (printed Oct. 9, 2003) available at http://www.virtualhold.com/webconnect.htm, 2 pages. |
Virtual Hold® Technology “Solutions—FAQ” (printed Oct. 9, 2003) available at http://www.virtualhold.com/solutionsfaq.htm, 2 pages. |
Virtual Hold® Technology “Solutions—Concierge” (printed Oct. 9, 2003) available at http://www.virtualhold.com/concierge.htm, 2 pages. |
Virtual Hold® Technology “Solutions—Overview” (printed Oct. 9, 2003) available at http://www.virtualhold.com/overview.htm, 2 pages. |
Virtual Hold® Technology “Solutions—Rendezvous” (printed Oct. 9, 2003) available at http://www.virtualhold.com/rendezvous.htm, 2 pages. |
NetCall Telecom “NetCall Directory™” (printed Oct. 9, 2003) available at http://www.netcall.com/solutions/directory.asp, 2 pages. |
NetCall Telecom “NetCall Alert™” (printed Oct. 9, 2003) available at http://www.netcall.com/solutions/alert.asp, 2 pages. |
NetCall Telecom “NetCall HotDesk™” (printed Oct. 9, 2003) available at http://www.netcall.com/solutions/hotdesk.asp, 2 pages. |
NetCall Telecom “NetCall NetCall800™” (printed Oct. 9, 2003) available at http://www.netcall.com/solutions/netcall800.asp, 1 page. |
NetCall Telecom “NetCall FAQs” (printed Oct. 9, 2003) available at http://www.netcall.com/solutions/queuebuster—faqs.asp, 3 pages. |
NetCall Telecom “NetCall QueueBuster” (printed Oct. 9, 2003) available at http://www.netcall.com/solutions/queuebuster.asp, 2 pages. |
NetCall USA Brochure entitled “QueueBuster™ Take Your Customers Off Hold” (undated), 6 pages. |
“The GM API—Table of Contents” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—toc.html, 1 page. |
“The GM API—Copyright Notice” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—1.html, 2 pages. |
“The GM API—About this Document” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—2.html, 2 pages. |
“The GM API—GM Overview” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—3.html, 2 pages. |
“The GM API—Definitions” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—4.html, 2 pages. |
“The GM API—Sending Messages” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—8.html, 2 pages. |
“The GM API—Receiving Messages” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—9.html, 7 pages. |
“The GM API—GM Constants and Macros” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—15.html, 1 page. |
“The GM API—Variable Index” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—19.html, 1 page. |
“The GM API—Token Reference” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—17.html, 2 pages. |
“The GM API—Glossary” (printed Oct. 9, 2003), available at http://www.myri.com/scs/GM/doc/gm—18.html, 2 pages. |
Fried, Jeff. “Skills-based routing leverages agents' strengths,” Telemarketing & Call Center Solutions, Feb. 1997 [Proquest]. |
Staples et al. “CTI evolution for the ‘self service’ customer,” Telecommunications, Dec. 1998 [Proquest]. |
DEFINITY Communications System Generic 3 Call Vectoring/Expert Agent Selection (EAS) Guide, AT&T publication No. 555-230-520 (Issue 4, Sep. 1995). |
“New Cicso ICM Integration Module for Avaya CONVERSANT” Spanlink, 2001, 2 pages. |
U.S. Appl. No. 09/489,722, filed Jan. 24, 2000, Thomson. |
U.S. Appl. No. 10/768,894, filed Jan. 29, 2004, Goringe et al. |
U.S. Appl. No. 11/518,096, filed Sep. 8, 2006, Brunson. |
U.S. Appl. No. 09/489,722, filed Jan. 24, 2000, Fisher et al. |
Background of the Invention for the above-captioned application (previously provided). |
Ahmed, Sarah, “A Scalable Byzantine Fault Tolerant Secure Domain Name System,” thesis submitted to Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, Jan. 22, 2001, 101 pages. |
Avaya, Inc. Business Advocate Options, at http://www.avaya.com, downloaded on Feb. 15, 2003, Avaya, Inc. 2003. |
Avaya, Inc. Business Advocate Product Summary, at http://www.avaya.com, downloaded on Feb. 15, 2003, Avaya, Inc. 2003, 3 pages. |
Avaya, Inc. CentreVu Advocate, Release 9, User Guide, Dec. 2000. |
Avaya, Inc., “Better Implementation of IP in Large Networks,” Avaya, Inc. 2002, 14 pages. |
Avaya, Inc., “The Advantages of Load Balancing in the Multi-Call Center Enterprise,” Avaya, Inc., 2002, 14 pages. |
Avaya, Inc., “Voice Over IP via Virtual Private Networks: An Overview,” Avaya, Inc., Feb. 2001, 9 pages. |
Bellsouth Corp., “Frequently Asked Questions—What is a registrar?,” available at https://registration.bellsouth.net/NASApp/DNSWebUI/FAQ.jsp, downloaded Mar. 31, 2003, 4 pages. |
Chavez, David, et al., “Avaya MultiVantage Software: Adapting Proven Call Processing for the Transition to Converged IP Networks,” Avaya, Inc., Aug. 2002. |
Coles, Scott, “A Guide for Ensuring Service Quality in IP Voice Networks,” Avaya, Inc., 2002, pp. 1-17. |
Dawson, “NPRI's Powerguide, Software Overview” Call Center Magazine (Jun. 1993), p. 85. |
Doo-Hyun Kim et al. “Collaborative Multimedia Middleware Architecture and Advanced Internet Call Center,” Proceedings at the International Conference on Information Networking (Jan. 31, 2001), pp. 246-250. |
E. Noth et al., “Research Issues for the Next Generation Spoken”: University of Erlangen-Nuremberg, Bavarian Research Centre for Knowledge-Based Systems, at http://www5.informatik.uni-erlangen.de/literature/psdir/1999/Noeth99:RIF.ps.gz, printed Feb. 10, 2003; 8 pages. |
Foster, Robin, et al., “Avaya Business Advocate and its Relationship to Multi-Site Load Balancing Applications,” Avaya, Inc., Mar. 2002, 14 pages. |
GEOTEL Communications Corporation Web site printout entitled “Intelligent CallRouter” Optimizing the Interaction Between Customers and Answering Resources., 1998, 6 pages. |
John H.L. Hansen and Levent M. Arsian, Foreign Accent Classification Using Source Generator Based Prosodic Features, IEEE Proc. ICASSP, vol. 1, pp. 836-839, Detroit USA (May 1995). |
L.F. Lamel and J.L. Gauvain, Language Identification Using Phone-Based Acoustic Likelihood, ICASSP-94, date unknown; 4 pages. |
Levent M. Arsian and John H.L. Hansen, Language Accent Classification in American English, Robust Speech Processing Laboratory, Duke University Department of Electrical Engineering, Durham, NC, Technical Report RSPL-96-7, revised Jan. 29, 1996. pp. 1-16. |
Levent M. Arsian, Foreign Accent Classification in American English, Department of Electrical Computer Engineering, Duke University, Thesis, pp. 1-200 (1996). |
MIT Project Oxygen, Pervasive, Human-Centered Computing (MIT Laboratory for Computer Science) (Jun. 2000) pp. 1-15. |
Presentation by Victor Zue, The MIT Oxygen Project, MIT Laboratory for Computer Science (Apr. 25-26, 2000) 9 pages. |
Stevenson et al.; “Name Resolution in Network and Systems Management Environments”; http://netman.cit.buffalo.edu/Doc/DStevenson/NR-NMSE.html; printed Mar. 31, 2003; 16 pages. |
“Applications, NPRI's Predictive Dialing Package,” Computer Technology (Fall 1993), p. 86. |
“Call Center Software You Can't Outgrow,” Telemarketing® (Jul. 1993), p. 105. |
“Domain Name Services,” available at http://www.pism.com/chapt09/chapt09.html, downloaded Mar. 31, 2003, 21 pages. |
“eGain's Commerce 2000 Platform Sets New Standard for eCommerce Customer Communications,” Business Wire (Nov. 15, 1999), 3 pages. |
“Internet Protocol Addressing,” available at http://samspade.org/d/ipdns.html, downloaded Mar. 31, 2003, 9 pages. |
“Product Features,” Guide to Call Center Automation, Brock Control Systems, Inc., Activity Managers Series™, Section 5—Company B120, p. 59, 1992. |
“Product Features,” Guide to Call Center Automation, CRC Information Systems, Inc., Tel-ATHENA, Section 5—Company C520, p. 95, 1992. |
“VAST™, Voicelink Application Software for Teleservicing®,” System Manager User's Guide, Digital Systems (1994), pp. ii, vii-ix, 1-2, 2-41 through 2-77. |
“When Talk Isn't Cheap,” Sm@rt Reseller, v. 3, n. 13 (Apr. 3, 2000), p. 50. |