Many retailers, businesses, and other customer dependent entities often provide support networks, such as call centers, that allow customers to contact the entity. For example, many product manufacturers maintain call centers through which customers (e.g., businesses selling their products, customers using their products) can contact the company to obtain support. One of the difficulties with such support networks is in identifying the user or customer that is contacting the entity. For example, many support networks require customers to verify their identity by providing their name, mailing address, email address, etc. This can often be difficult for both the customer and the agent working in the support network due to the difficulty in spelling out the words necessary to complete verification.
The detailed description is set forth with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical items or features.
While implementations are described herein by way of example, those skilled in the art will recognize that the implementations are not limited to the examples or drawings described. It should be understood that the drawings and detailed description thereto are not intended to limit implementations to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope as defined by the appended claims. The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including, but not limited to.
This disclosure describes a system for associating user accounts with source identifiers included in communication requests received from users of those user accounts. For example, when a user contacts a support network, such as a call center, the source identifier (e.g., telephone number) may be identified. Once the user initiating the communication request is verified and the corresponding user account identified, the source identifier may be associated with the identified user account. By establishing and storing a relationship between the source identifier and the verified user account, if the user later again initiates a communication request that includes the same source identifier, that user's user account may be quickly identified to the agent, thereby simplifying verification. Rather than the user having the specifically spell out any of the verification information, and the agent provide that information to a computing system, the potential matches may be provided and the appropriate one visually verified by the agent.
In some implementations, multiple users may initiate communication requests that include the same source identifier. In other implementations, the source identifier may be associated with multiple user accounts. When a subsequent communication request is received that includes the source identifier, user account information from one or more of the associated user accounts may be provided to an agent to simplify verification and identification of the user.
By maintaining a relationship between source identifiers and user accounts of user's that have initiated communication requests from the source identifiers, agents may be provided with a simplified list of potential user accounts for any future communication request that includes the source identifier. In some implementations, if there are multiple user accounts associated with a source identifier, only a certain percentage (e.g., the most recent, most frequent) may be provided to the agent for verification. In other implementations, user account information for all user accounts associated with a source identifier may be provided.
In other implementations, a user, such as user 101-2, may initiate a communication request using a computing device, such as a desktop or laptop computer. For example, the user may provide a source identifier (e.g., telephone number) to the server system 102 and request that an agent 108 contact that user at the source identifier. In still other implementations, multiple users 101-3, 101-4, 101-5 may, at different times, initiate communication requests that utilize the same source identifier. For example the users 101-3-101-5 may all initiate communication requests from an office and the source identifier included in each communication request may be the office telephone number.
The contact management system 110 may receive communication requests from users and search one or more of a user data store 104 and/or a contact history data store 106 for user accounts associated with the corresponding source identifier. As discussed further below, the user data store 104 may include user account information provided by users. Such information may include a billing telephone number (source identifier) or delivery coordinates (source identifier). The contact history data store 106 may include a list of associations between source identifiers and user accounts from prior communication requests. For example, each time a communication request is received and a user account identified and verified to correspond with a user initiating the communication request, an association between the source identifier and the user account may be included in the contact history data store.
Based on the identified user accounts, the contact management system 110 may provide a list of potential user accounts to an agent 108 for use in identifying the user initiating the communication request. For example, if fifteen prior communication requests have been received that included the source identifier of the current communication request, ten of those prior communication requests had come from user A and five of those communication requests had come from user B, the contact management system 110 may provide to the agent 108 user account information for both user A's user account and user B's user account.
The agent, upon receiving an identification of potential user accounts may then utilize the provided information to simplify the verification of the user initiating the current communication request. For example, the agent 108 may ask the user initiating the communication request to provide a name, e-mail address and/or shipping address. When the user provides the information, rather than the agent 108 having to type in the information they can visually scan the provided potential user account information for a match. If a match is identified, the user can be verified and the appropriate user account provided to the agent 108. If the user cannot be verified based on the provided potential user account information, the agent 108 may then resort to searching for the user's information using traditional techniques.
The contact management system 110 may also include and/or be implemented on a server system 102. The server system 102 may be local to an agent 108, remote from the agent 108, or any combination thereof. Likewise, the server system 102 may be configured to communicate over a network with the user devices, agent devices and/or a combination thereof.
As illustrated, the server system 102 may be implemented as one or more servers 102(1), 102(2), . . . , 102(N) and may, in some instances form a portion of a network-accessible computing platform implemented as a computing infrastructure of processors, storage, software, data access, and so forth that is maintained and accessible by components/device of the contact management system 110 via a network such as the Internet. The server system 102 does not require end-user knowledge of the physical location and configuration of the system that delivers the services. Common expressions associated for these remote server systems 102 include “on-demand computing,” “software as a service (SaaS),” “platform computing,” “network-accessible platform,” “cloud services,” “data centers,” and so forth.
The network may utilize wired technologies (e.g., wires, USB, fiber optic cable, etc.), wireless technologies (e.g., RF, IR, NFC, cellular, satellite, Bluetooth, etc.), or other connection technologies. The network is representative of any type of communication network, including data and/or voice network, and may be implemented using wired infrastructure (e.g., cable, CAT5, fiber optic cable, etc.), a wireless infrastructure (e.g., RF, cellular, microwave, satellite, Bluetooth, etc.), and/or other connection technologies.
The server system 102 may also include a user data store 104, and/or a contact history data store 106. As discussed further below, the data stores may include lists, arrays, databases, and other data structures used to provide storage and retrieval of data. Likewise, while the disclosure describes multiple data stores, in some implementations, the data stores may be configured as a single data store or multiple data stores.
The user data store 104 may include information about users, such as user account information, purchase history, browse history, etc. Any type of information may be stored in the user data store 104. For example, user profile information, such as attributes, name, address, gender, purchase history, social networks and/or friends with which the user interacts, and the like may be stored in the user data store 104. User information may be provided directly by users, such as when they become employed, collected from users when interacting with the contact management system 110, etc.
The contact history data store 106 may include a list of associations between source identifiers and user accounts of users verified to be initiating the communication requests. For example the association may include the user account identification, the date and time of the communication request, the number of times the user has initiated a communication request that included the source identifier, etc.
In some implementations, the user data store 104 and/or contact history data store 106 may include one or more CD-RW/DVD-RW drives, hard disk drives, solid-state drives, tape drives, or other storage devices that are utilized to store digital content and information. The server system 102, separately or together with the user data store 104 and contact history data store 106 may provide a contact history management system 110.
The organization and operation of the environment 100 described above is given as an example. In other implementations, the environment 100 may be arranged differently and operate differently than described above.
In some implementations, additional information about the association, the user account 206 and/or the source identifier 204 may also be maintained in the contact history data store 106. For example, the date of the initiation of the communication request 212, time of the initiation of the communication request 214 and/or the frequency or count 216 of the number of times a communication request has been received from the source identifier for the user has been received. In other implementations, fewer, additional, and/or different information may be maintained in the contact history data store 106. For example, the duration of each communication request, the agent involved in each communication request, notes entered by an agent, and/or results of the communication request may also be maintained in the contact history data store 106.
Upon identifying the appropriate user account, the agent may be provided with additional user account information, such as order history, to assist in responding to the user. In some instances, the agent 108 may utilize some of the information to further verify the user. Once the identity of the user has been verified, the contact management system 110 may generate an association between the source identifier and the user account and store that information in the contact history data store 106.
If the agent 108 is not able to identify the appropriate user account based on the provided potential user account list, the agent 108 may select the “Show More” 320 control to view additional potential user accounts associated with the source identifier. As discussed further below, in some implementations, not all of the user accounts associated with the source identifier are initially displayed to the agent 108. Upon selecting the “Show More” 320 control, information for additional potential user accounts may be presented to the agent 108 via the user interface 300.
Likewise, the agent 108 may select to search for other user accounts by selecting the “Change Search” 322 control. Upon selecting the “Change Search” 322 control, the agent 108 may initiate a search for the user account using traditional techniques.
The computer-readable media may include non-transitory computer-readable storage media, which may include hard drives, floppy diskettes, optical disks, CD-ROMs, DVDs, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, flash memory, magnetic or optical cards, solid-state memory devices, or other types of storage media suitable for storing electronic instructions. In addition, in some implementations the computer-readable media may include a transitory computer-readable signal (in compressed or uncompressed form). Examples of computer-readable signals, whether modulated using a carrier or not, include, but are not limited to, signals that a computer system hosting or running a computer program can be configured to access, including signals downloaded through the Internet or other networks. Finally, the order in which the operations are described is not intended to be construed as a limitation, and any number of the described operations can be combined in any order and/or in parallel to implement the process.
The example process 400 begins upon receipt of a communication request that includes a source identifier, as in 402. The communication request may be received from any communication source, such as a land-line telephone, cellular telephone, Voice-over-Internet-Protocol (“VoIP”), etc. For example, the contact management system 110 may provide a contact number (e.g., toll-free telephone number) that a user can dial to initiate a communication request with the contact management system 110. When the communication request is received, a source identifier is included. For example, many communication networks provide a source identifier (e.g., source telephone number) in the communication request. In other implementations, other forms of source identifiers may be included in the communication request. For example, the source identifier may be a coordinate location, or a range (e.g., 100 yards) associated with the coordinate location. In still other examples, the communication request may include multiple source identifiers. For example, the communication request may include both a telephone number and an IP address.
Upon receiving a communication request, one or more potential user account(s) that have been associated with the source identifier are provided to an agent, as in 404. Identification of potential user accounts is discussed in further detail below with respect to
Once identified, the agent provides, and the process 400 receives, the identification of the user account of the user initiating the communication, as in 406. Upon receiving confirmation of the user account, and association between the source identifier and the confirmed user account is established and stored in the contact management data store, as in 408.
The example process 500 may search both the user data store 104 and the contact history data store 106 for the source identifier and any corresponding accounts may be identified. In alternative embodiments, only the contact history data store may be searched.
If it is determined that the source identifier does correspond with one or more candidate user accounts, a determination is made for a candidate user account as to whether it satisfies a threshold. A threshold may be established to limit the number of potential user accounts identified to an agent to only those that have a higher probability of being the user account for the user that is initiating the communication request. For example, the threshold may be established such that only user accounts associated with a particular percentage of the communication requests from the source identifier satisfy the threshold. To illustrate, the threshold may be established such that 30% or more of the communication requests for the source identifier are associated with the user account. If there are one hundred prior communication requests from the source identifier, 50 of which are associated with user account A, 30 with user account B, and 20 with user account C, the threshold may only be satisfied for user accounts A and B.
It will be appreciated that the threshold may be any percentage or number. Likewise, the threshold may vary depending on the number of user accounts identified, the agent, and/or any other factor. In some implementations, the threshold may only be applied if there are over a defined number of candidate user accounts identified. For example, the threshold may only be applied if more than ten candidate user accounts are identified. In still other implementations, the threshold may be zero (or not applied at all) such that all candidate accounts satisfy the threshold.
In still other implementations, the count may be weighted. For example, when determining if the threshold has been satisfied, more recent communication requests may be given more weight than older communication request. Likewise, more recent user account activity may also be considered. For example, if user A has recently ordered and item, that user's account may be given more weight than another account that has had no recent activity.
If the candidate user account satisfies the threshold, it is added to a potential user account list, as in 508. Upon adding the user account to the potential user account list, or if it is determined that the candidate user account does not satisfy threshold, a determination is made as to whether additional candidate user accounts exist for consideration, as in 510. If there are additional candidate user accounts to consider, the example process 500 returns to block 506 and continues. However, if all candidate accounts have been considered, a determination is made as to whether at least one user account has been added to the potential user account list, as in 512.
If at least one user account has been included in the potential user account list, the potential user account list is provided to an agent, as in 514. However, if it is determined that no potential user accounts were identified and/or if it is determined at decision block 504 that there are no user accounts and/or contact history data store entries for the source identifier, the example process 500 may instruct the agent to obtain account information and verify the user utilizing traditional techniques, as in 516.
In an alternative implementation, rather than processing the blocks 604-608, the example process may simply store an association of the source identifier and user account in the contact history data store, as in 610. In such an implementation, rather than maintaining a count for the association, each time the same user account initiates a communication request from the same source identifier it is added to the contact history data store. When future communication requests are received from the source identifier each entry is identified and a count determined.
The video display adapter 702 provides display signals to a local display (not shown in
The memory 712 generally comprises random access memory (RAM), read-only memory (ROM), flash memory, and/or other volatile or permanent memory. The memory 712 is shown storing an operating system 714 for controlling the operation of the server system 102. A binary input/output system (BIOS) 716 for controlling the low-level operation of the server system 102 is also stored in the memory 712.
The memory 712 additionally stores program code and data for providing network services that allow other computing devices to communicate with the contact management system 110. Accordingly, the memory 712 may store a browser application 718. The browser application 718 comprises computer executable instructions, that, when executed by the processor 700 generate or otherwise obtain configurable markup documents such as Web pages. The browser application 718 communicates with a data store manager application 720 to facilitate data exchange between the user data store 104 and the contact history data store 106.
As used herein, the term “data store” refers to any device or combination of devices capable of storing, accessing and retrieving data, which may include any combination and number of data servers, databases, data storage devices and data storage media, in any standard, distributed or clustered environment. The server system 102 can include any appropriate hardware and software for integrating with the data stores 104-106 as needed to execute aspects of one or more applications for the contact management system 110.
The data stores 104-106 can include several separate data tables, databases or other data storage mechanisms and media for storing data relating to a particular aspect. For example, the data stores 104-106 illustrated include mechanisms for user information, contact history information, etc. which can be used to generate and deliver information to agents 108 and/or users.
It should be understood that there can be many other aspects that may be stored in the data stores 104-106. The data stores 104-106 are operable, through logic associated therewith, to receive instructions from the server system 102 and obtain, update or otherwise process data in response thereto.
In addition to maintaining information about users and contact history, the contact history management system 110 may provide use information, such as contact history to the agents 108. For example, the contact history management system 110, through communication between the server system 102 and a computing device of an agent 108, may provide contact history information and/or user account information to an agent identifying potential user accounts of a user initiating a communication request.
The memory 712 may also include the contact history management system 110, discussed above. The contact history management system 110 may be executable by the processor 700 to implement one or more of the functions of the server system 102. In one implementation, the contact history management system 110 may represent instructions embodied in one or more software programs stored in the memory 712. In another implementation, the contact history management system 110 can represent hardware, software instructions, or a combination thereof.
The server system 102, in one implementation, is a distributed environment utilizing several computer systems and components that are interconnected via communication links, using one or more computer networks or direct connections. However, it will be appreciated by those of ordinary skill in the art that such a system could operate equally well in a system having fewer or a greater number of components than are illustrated in
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claims.
Number | Name | Date | Kind |
---|---|---|---|
5894511 | Jordan | Apr 1999 | A |
5956024 | Strickland | Sep 1999 | A |
6014647 | Nizzari | Jan 2000 | A |
6192123 | Grunsted | Feb 2001 | B1 |
6341160 | Tverskoy | Jan 2002 | B2 |
6553113 | Dhir | Apr 2003 | B1 |
6996227 | Albal | Feb 2006 | B2 |
7088809 | Gits | Aug 2006 | B1 |
7386510 | Degen | Jun 2008 | B2 |
7581112 | Brown et al. | Aug 2009 | B2 |
7839987 | Kirchhoff | Nov 2010 | B1 |
8234302 | Goodwin et al. | Jul 2012 | B1 |
8255304 | Lorenzo | Aug 2012 | B1 |
8300780 | Davis | Oct 2012 | B1 |
8867732 | Hoen, IV | Oct 2014 | B1 |
8923504 | Bracco | Dec 2014 | B1 |
8958542 | Kaufman | Feb 2015 | B1 |
9077828 | Koster | Jul 2015 | B1 |
9231942 | Pinkerton | Jan 2016 | B1 |
20010040949 | Blonder | Nov 2001 | A1 |
20030099332 | Parsa | May 2003 | A1 |
20030217005 | Drummond | Nov 2003 | A1 |
20040039846 | Goss | Feb 2004 | A1 |
20050013423 | Eversen | Jan 2005 | A1 |
20050032527 | Sheha et al. | Feb 2005 | A1 |
20060062205 | Doherty | Mar 2006 | A1 |
20060156389 | Brown | Jul 2006 | A1 |
20060188076 | Isenberg | Aug 2006 | A1 |
20070061193 | Libonati | Mar 2007 | A1 |
20080215961 | Altberg | Sep 2008 | A1 |
20090119194 | Chau | May 2009 | A1 |
20090248543 | Nihalani | Oct 2009 | A1 |
20090281904 | Pharris | Nov 2009 | A1 |
20090307775 | Brown et al. | Dec 2009 | A1 |
20100104083 | Berman | Apr 2010 | A1 |
20100191646 | Smith | Jul 2010 | A1 |
20100211996 | McGeehan | Aug 2010 | A1 |
20100216425 | Smith | Aug 2010 | A1 |
20100235276 | Smith | Sep 2010 | A1 |
20100291912 | Tafarrodi et al. | Nov 2010 | A1 |
20110038469 | Clark et al. | Feb 2011 | A1 |
20110110507 | Spiegel | May 2011 | A1 |
20110167440 | Greenfield | Jul 2011 | A1 |
20110178927 | Lindelsee | Jul 2011 | A1 |
20110258075 | Ciurea | Oct 2011 | A1 |
20110283347 | Bhuta | Nov 2011 | A1 |
20110287739 | Cajigas Bringas | Nov 2011 | A1 |
20120066065 | Switzer | Mar 2012 | A1 |
20120173348 | Yoo | Jul 2012 | A1 |
20120221437 | Yoo | Aug 2012 | A1 |
20120284017 | Begeja et al. | Nov 2012 | A1 |
20120289188 | Marcus | Nov 2012 | A1 |
20120297484 | Srivastava | Nov 2012 | A1 |
20120320905 | Ilagan | Dec 2012 | A1 |
20130073423 | Allen et al. | Mar 2013 | A1 |
20130156171 | Springer | Jun 2013 | A1 |
20130254857 | Bajenov | Sep 2013 | A1 |
20130262475 | Barak et al. | Oct 2013 | A1 |
20130272514 | Dragushan | Oct 2013 | A1 |
20130336170 | Broadworth et al. | Dec 2013 | A1 |
20130347113 | Yu | Dec 2013 | A1 |
20140057596 | Brill et al. | Feb 2014 | A1 |
20140067401 | Sanjeeva | Mar 2014 | A1 |
20140169230 | Arora | Jun 2014 | A1 |
20140188728 | Dheer et al. | Jul 2014 | A1 |
20140192969 | Brown | Jul 2014 | A1 |
20140330563 | Faians | Nov 2014 | A1 |
20140376705 | Layman | Dec 2014 | A1 |
20150026786 | Alexander | Jan 2015 | A1 |
Number | Date | Country |
---|---|---|
WO 2007023483 | Mar 2007 | WO |