US9270822B2 - Protecting privacy of a customer and an agent using face recognition in a video contact center environment - Google Patents

Protecting privacy of a customer and an agent using face recognition in a video contact center environment Download PDF

Info

Publication number
US9270822B2
US9270822B2 US13/585,780 US201213585780A US9270822B2 US 9270822 B2 US9270822 B2 US 9270822B2 US 201213585780 A US201213585780 A US 201213585780A US 9270822 B2 US9270822 B2 US 9270822B2
Authority
US
United States
Prior art keywords
customer
video
agent
face
contact center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US13/585,780
Other versions
US20140049593A1 (en
Inventor
Deep Subhash Pai
Jaydeep Deepak Bhalerao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avaya Inc
Original Assignee
Avaya Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avaya Inc filed Critical Avaya Inc
Priority to US13/585,780 priority Critical patent/US9270822B2/en
Assigned to AVAYA INC. reassignment AVAYA INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BHALERAO, JAYDEEP DEEPAK, PAI, DEEP SUBHASH
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A. SECURITY AGREEMENT Assignors: AVAYA, INC.
Assigned to BANK OF NEW YORK MELLON TRUST COMPANY, N.A., THE reassignment BANK OF NEW YORK MELLON TRUST COMPANY, N.A., THE SECURITY AGREEMENT Assignors: AVAYA, INC.
Publication of US20140049593A1 publication Critical patent/US20140049593A1/en
Priority to US14/971,073 priority patent/US9848165B2/en
Publication of US9270822B2 publication Critical patent/US9270822B2/en
Application granted granted Critical
Assigned to CITIBANK, N.A., AS ADMINISTRATIVE AGENT reassignment CITIBANK, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AVAYA INC., AVAYA INTEGRATED CABINET SOLUTIONS INC., OCTEL COMMUNICATIONS CORPORATION, VPNET TECHNOLOGIES, INC.
Assigned to AVAYA INC. reassignment AVAYA INC. BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 030083/0639 Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A.
Assigned to AVAYA INC. reassignment AVAYA INC. BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 029608/0256 Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A.
Assigned to OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL COMMUNICATIONS CORPORATION), VPNET TECHNOLOGIES, INC., AVAYA INTEGRATED CABINET SOLUTIONS INC., AVAYA INC. reassignment OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL COMMUNICATIONS CORPORATION) BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001 Assignors: CITIBANK, N.A.
Assigned to GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT reassignment GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AVAYA INC., AVAYA INTEGRATED CABINET SOLUTIONS LLC, OCTEL COMMUNICATIONS LLC, VPNET TECHNOLOGIES, INC., ZANG, INC.
Assigned to CITIBANK, N.A., AS COLLATERAL AGENT reassignment CITIBANK, N.A., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AVAYA INC., AVAYA INTEGRATED CABINET SOLUTIONS LLC, OCTEL COMMUNICATIONS LLC, VPNET TECHNOLOGIES, INC., ZANG, INC.
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION reassignment WILMINGTON TRUST, NATIONAL ASSOCIATION SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AVAYA INC., AVAYA INTEGRATED CABINET SOLUTIONS LLC, AVAYA MANAGEMENT L.P., INTELLISIST, INC.
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT INTELLECTUAL PROPERTY SECURITY AGREEMENT Assignors: AVAYA CABINET SOLUTIONS LLC, AVAYA INC., AVAYA MANAGEMENT L.P., INTELLISIST, INC.
Assigned to AVAYA MANAGEMENT L.P., AVAYA INTEGRATED CABINET SOLUTIONS LLC, AVAYA INC., AVAYA HOLDINGS CORP. reassignment AVAYA MANAGEMENT L.P. RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026 Assignors: CITIBANK, N.A., AS COLLATERAL AGENT
Assigned to WILMINGTON SAVINGS FUND SOCIETY, FSB [COLLATERAL AGENT] reassignment WILMINGTON SAVINGS FUND SOCIETY, FSB [COLLATERAL AGENT] INTELLECTUAL PROPERTY SECURITY AGREEMENT Assignors: AVAYA INC., AVAYA MANAGEMENT L.P., INTELLISIST, INC., KNOAHSOFT INC.
Assigned to CITIBANK, N.A., AS COLLATERAL AGENT reassignment CITIBANK, N.A., AS COLLATERAL AGENT INTELLECTUAL PROPERTY SECURITY AGREEMENT Assignors: AVAYA INC., AVAYA MANAGEMENT L.P., INTELLISIST, INC.
Assigned to INTELLISIST, INC., AVAYA INTEGRATED CABINET SOLUTIONS LLC, AVAYA MANAGEMENT L.P., AVAYA INC. reassignment INTELLISIST, INC. RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386) Assignors: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT
Assigned to INTELLISIST, INC., AVAYA MANAGEMENT L.P., AVAYA INC., AVAYA INTEGRATED CABINET SOLUTIONS LLC reassignment INTELLISIST, INC. RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436) Assignors: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT
Assigned to VPNET TECHNOLOGIES, INC., INTELLISIST, INC., AVAYA INC., HYPERQUALITY, INC., OCTEL COMMUNICATIONS LLC, CAAS TECHNOLOGIES, LLC, AVAYA INTEGRATED CABINET SOLUTIONS LLC, AVAYA MANAGEMENT L.P., HYPERQUALITY II, LLC, ZANG, INC. (FORMER NAME OF AVAYA CLOUD INC.) reassignment VPNET TECHNOLOGIES, INC. RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001) Assignors: GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT
Assigned to AVAYA LLC reassignment AVAYA LLC (SECURITY INTEREST) GRANTOR'S NAME CHANGE Assignors: AVAYA INC.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/51Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/51Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
    • H04M3/5183Call or contact centers with computer-telephony arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04N7/147Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06K9/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/50Telephonic communication in combination with video communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/25Aspects of automatic or semi-automatic exchanges related to user interface aspects of the telephonic communication service
    • H04M2203/251Aspects of automatic or semi-automatic exchanges related to user interface aspects of the telephonic communication service where a voice mode or a visual mode can be used interchangeably
    • H04M2203/252Aspects of automatic or semi-automatic exchanges related to user interface aspects of the telephonic communication service where a voice mode or a visual mode can be used interchangeably where a voice mode is enhanced with visual information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/30Aspects of automatic or semi-automatic exchanges related to audio recordings in general
    • H04M2203/306Prerecordings to be used during a voice call
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6009Personal information, e.g. profiles or personal directories being only provided to authorised persons

Definitions

  • Contact centers are systems in which a person can communicate to receive information. Such communication can include, but is not limited to, telephone calls, Internet access, email, and FAX.
  • a contact center can include one or more interactive voice response (IVR) systems.
  • the one or more IVRs provide automatic branching voice queries to which the caller responds with button pushes on a telephone keypad or with voice responses on a telephone.
  • the contact center may be provided having only the one or more IVR systems, or alternatively, it is also provided having human agents. For example, at the end of the IVR branching voice queries, the caller can be directed to press zero to speak to an agent.
  • agent is a person having a telephone to talk to the caller, hereafter referred to as an “agent telephone,” and a computer to access information about the caller, hereafter referred to as an “agent computer.” Note that though the agent telephone and the agent computer are often associated with one person, they correspond to distinct electronic systems and will be separately referred to herein
  • the contact center can also include one or more database server computers, one or more database storage areas, one or more web server computers, and one or more email server computers.
  • contact center actions include actions generated by agents within the contact center as well as actions by people outside of the contact center, for example telephone callers and web customers.
  • Video contact centers allow a customer to interact with an agent using a video enabled device such as a camera on a mobile device or a web phone using a web camera attached to the customer's computer.
  • the customer places a call into the contact center and where they will be served first by an automated Interactive Voice and Video System (IVVR) after which the customer will be added to a call/skill queue to wait for a certain period of time until an agent is available.
  • IVVR Interactive Voice and Video System
  • most contact centers are configured to auto-answer a call when the call lands at the agent's desktop. When a video call arrives at the agent, the system will automatically answer the call without any input from the agent.
  • One conventional solution is to use a shutter to block the video from being captured.
  • the use of a shutter requires manual action by the customer as they must remember to close the shutter before placing the call to the contact center and then manually open it up when they intend to send video.
  • the agent must remember to close the shutter before accepting the call and then manually open it up when they intend to send video.
  • Another conventional mechanism is to start the call with only the audio portion of the call enabled.
  • the contact center has difficulty in routing the calls due to the fact that video is required and is not available at the start of the call which is important for finding the designated video agent.
  • the agent In case of the agent escalating the call to video, the agent will not be aware of the capabilities of the customer's endpoint and if it supports video and will cause customer interaction issues in a contact center environment. The customer would expect to see a smiling face of an agent greeting him when the call is accepted rather than a muted video screen.
  • Embodiments of the invention significantly overcome such deficiencies and provide mechanisms and techniques that protect the privacy of a customer and an agent using face recognition in a video contact center environment.
  • the method includes initiating, by a customer, a video call to a contact center.
  • the method also includes muting video of the customer while providing audio of the customer to an agent of the contact center.
  • the method further includes determining whether a face is present in a video image of the customer. When a presence of a face is determined in the video image of the customer, then video of the customer is enabled. When a presence of a face is not present in the video image of the customer then the customer is notified so the customer can take appropriate action.
  • the appropriate may include, but is not limited to, manually starting the video or looking into the camera so that the presence of a face is recognized and the video of the customer can be enabled.
  • the method includes receiving, by an agent of a contact center, a video call from a customer.
  • the method further includes automatically answering the call by a system of the agent, however the agent's audio and video are not connected to the customer so the customer will continue to wait for the agent.
  • the method includes determining whether a face is present in a video image of the agent. When a presence of a face is determined in the video image of the agent, then audio & video of the agent is enabled. When a presence of a face is not present in the video image of the agent then the agent is notified so the agent can take appropriate action.
  • the appropriate action may include, but is not limited to, manually starting the audio & video or looking into the camera so that the presence of a face is recognized and the audio & video of the agent can be enabled.
  • FIG. 1 Other embodiments include a computer readable medium having computer readable code thereon for protecting the privacy of a customer and an agent using face recognition in a video contact center environment.
  • the computer readable medium includes instructions for initiating, by a customer, a video call to a contact center.
  • the computer readable medium also includes instructions for muting video of the customer and providing audio of the customer to an agent of the contact center.
  • the computer readable medium further includes instructions for determining whether a face is present in a video image of the customer.
  • the computer readable medium further includes instructions wherein when a presence of a face is determined in the video image of the customer, then video of the customer is enabled.
  • the computer readable medium additionally includes instructions wherein when a presence of a face is not present in the video image of the customer then the customer is notified so the customer can take appropriate action.
  • the appropriate may include, but is not limited to, manually starting the video or looking into the camera so that the presence of a face is recognized and the video of the customer can be enabled.
  • a computer readable medium for protecting the privacy of a customer and an agent using face recognition in a video contact center environment
  • the computer readable medium includes instructions for receiving, by an agent of a contact center, a video call form a customer.
  • the computer readable medium further includes instructions for automatically answering the call by a system of the agent.
  • the computer readable medium includes instructions for determining whether a face is present in a video image of the agent.
  • the computer readable medium further includes instructions wherein when a presence of a face is determined in the video image of the agent, then video of the agent is enabled.
  • the computer readable medium additionally includes instructions wherein when a presence of a face is not present in the video image of the agent then the agent is notified so the agent can take appropriate action.
  • the appropriate may include, but is not limited to, manually starting the video or looking into the camera so that the presence of a face is recognized and the video of the agent can be enabled.
  • Still other embodiments include a computerized device, configured to process all the method operations disclosed herein as embodiments of the invention.
  • the computerized device includes a memory system, a processor, communications interface in an interconnection mechanism connecting these components.
  • the memory system is encoded with a process that protect the privacy of a customer and an agent using face recognition in a video contact center environment as explained herein that when performed (e.g. when executing) on the processor, operates as explained herein within the computerized device to perform all of the method embodiments and operations explained herein as embodiments of the invention.
  • any computerized device that performs or is programmed to perform up processing explained herein is an embodiment of the invention.
  • a computer program product is one embodiment that has a computer-readable medium including computer program logic encoded thereon that when performed in a computerized device provides associated operations that protect the privacy of a customer and an agent using face recognition in a video contact center environment as explained herein.
  • the computer program logic when executed on at least one processor with a computing system, causes the processor to perform the operations (e.g., the methods) indicated herein as embodiments of the invention.
  • Such arrangements of the invention are typically provided as software, code and/or other data structures arranged or encoded on a computer readable medium such as an optical medium (e.g., CD-ROM), floppy or hard disk or other a medium such as firmware or microcode in one or more ROM or RAM or PROM chips or as an Application Specific Integrated Circuit (ASIC) or as downloadable software images in one or more modules, shared libraries, etc.
  • the software or firmware or other such configurations can be installed onto a computerized device to cause one or more processors in the computerized device to perform the techniques explained herein as embodiments of the invention.
  • Software processes that operate in a collection of computerized devices, such as in a group of data communications devices or other entities can also provide the system of the invention.
  • the system of the invention can be distributed between many software processes on several data communications devices, or all processes could run on a small set of dedicated computers, or on one computer alone.
  • the embodiments of the invention can be embodied strictly as a software program, as software and hardware, or as hardware and/or circuitry alone, such as within a data communications device.
  • the features of the invention, as explained herein, may be employed in data communications devices and/or software systems for such devices such as those manufactured by Avaya, Inc. of Basking Ridge, N.J.
  • FIG. 1 depicts a block diagram of a system for protecting the privacy of a customer and an agent using face recognition in a video contact center environment in accordance with embodiments of the invention
  • FIG. 2 depicts a block diagram of a customer/agent terminal in accordance with embodiments of the invention
  • FIG. 3 depicts a flow diagram of a first particular embodiment of a method for protecting the privacy of a customer and an agent using face recognition in a video contact center environment in accordance with embodiments of the invention.
  • FIG. 4 depicts a flow diagram of a second particular embodiment of a method for protecting the privacy of a customer and an agent using face recognition in a video contact center environment in accordance with embodiments of the invention.
  • System 10 includes a customer system 12 comprising a computer having a camera. While customer system 10 is shown as a desktop computer it should be appreciated that any type of computing device (including but not limited to a tablet, a smart phone, a laptop computer, and the like) could also be used.
  • Network 14 may be a telephone network such as the PSTN which is a worldwide telephone system that provides telephone call connections, including telephone connections to a contact center 14 .
  • the network 14 can be a computer network such as the Internet.
  • a private branch exchange (PBX) 16 is shown in communication with the network 14 .
  • the PBX 16 comprises a sub-system that can route incoming telephone calls or communications to intended recipients, or agents.
  • the PBX can be coupled to one or more interactive voice and video response systems (IVVRs) 18 .
  • IVVRs interactive voice and video response systems
  • the IVVR 18 can, among the selections offered, request that the customer provide identifying information, for example an account number. Identifying information can also be automatically provided by the PBX 16 without entry by the customer by a variety of methods, including dialed number identification service (DNIS) and automatic number identification (ANI). The identifying information is coordinated with “customer data,” for example account history associated with the customer. An application program can automatically provide a display of the caller data in a screen pop to the agent system 22 .
  • DNIS dialed number identification service
  • ANI automatic number identification
  • the IVVR 18 is in communication with a face recognition element 20 .
  • Face recognition element 20 monitors video (of the customer and/or the agent) and determines whether a face is present in the video.
  • agent computer system 22 is shown in communication with PBX 16 . While agent system 22 is shown as a desktop computer it should be appreciated that any type of computing device (including but not limited to a tablet, a smart phone, a laptop computer, and the like) could also be used.
  • the presently described invention is for a system that will detect that the customer and/or agent is not ready to send video and provide mechanisms to protect the privacy of the agent and/or customer and an automatic method and an override for starting to send video.
  • a customer will initiate a video communication from customer system 12 , through network 14 to PBX 16 .
  • the call will be presented to IVVR 18 and placed in a queue.
  • face recognition element 20 continuously monitors the video picture from the customer.
  • the system 10 will use the face recognition element 20 to determine if the web camera of customer computer system 12 is facing the customer and further if the customer is looking in the general direction of the web camera. If the system 10 determines that the above two conditions are not met, then system 10 will not transmit video of the customer to the agent.
  • the system will show a video picture using a text to video systems available in IVVRs that will notify the customer that his video is not being transmitted with instructions on how to start the video as shown in FIG.
  • the system 10 would behave in a slightly different manner.
  • the call may be auto answered, and will not send audio and video to the customer computer system 12 directly.
  • the system 10 will first determine if the agent is ready to accept the video call, again using face recognition techniques and using eye tracking and gazing techniques to ensure that the agent is looking into the camera of agent computer system 22 . Only when the system 10 determines that the agent is ready will the system 10 connect the audio and video call to the customer. If the system determines that the agent is not ready, it will show a similar message 58 .
  • the system will also use known methods to take necessary action such as altering the supervisor. In video contact centers, techniques such as hiding the camera behind a screen or using a beam splitter to ensure eye contact between an agent and a customer are performed, so it is a reasonable expectation to have the agent look into the camera to start a call.
  • the method mentioned above can be implemented directly in web based endpoints.
  • Such endpoints that use HTML5 technologies that can capture camera for audio & video streaming using WebRTC APIs and do image processing and face detection on the video stream using Canvas tags and JavaScript (http://apprtc.appspot.com/html/face.html).
  • the JavaScript application can provide a physical button instead of DTMF to override the privacy protection.
  • FIGS. 3 and 4 Flow diagrams of the presently disclosed methods are depicted in FIGS. 3 and 4 .
  • the rectangular elements are herein denoted “processing blocks” and represent computer software instructions or groups of instructions.
  • the diamond shaped elements are herein denoted “decision blocks,” and represent computer software instructions, or groups of instructions which affect the execution of the computer software instructions represented by the processing blocks.
  • the processing and decision blocks represent steps performed by functionally equivalent circuits such as a digital signal processor circuit or an application specific integrated circuit (ASIC).
  • ASIC application specific integrated circuit
  • the flow diagrams do not depict the syntax of any particular programming language. Rather, the flow diagrams illustrate the functional information one of ordinary skill in the art requires to fabricate circuits or to generate computer software to perform the processing required in accordance with the present invention. It should be noted that many routine program elements, such as initialization of loops and variables and the use of temporary variables are not shown. It will be appreciated by those of ordinary skill in the art that unless otherwise indicated herein, the particular sequence of steps described is illustrative only and can be varied without departing from the spirit of the invention. Thus, unless otherwise stated the steps described below are unordered meaning that, when possible, the steps can be performed in any convenient or desirable order.
  • Method 100 begins with processing block 102 which discloses initiating, by a customer, a video call to a contact center.
  • Contact centers are systems in which a person can communicate to receive information.
  • One type of contact center is referred to as a video contact center.
  • Video contact centers allow a customer to interact with an agent using a video enabled device such as a camera on a mobile device or a web phone using a web camera attached to the customer's computer.
  • Processing block 104 states the call is handled by an IVVR system and entered into a queue waiting for an agent.
  • a contact center can include one or more IVVR systems.
  • the one or more IVVRs provide automatic branching queries to which the caller responds.
  • the customer places a call into the contact center and where they will be served first by an automated Interactive Voice and Video System (IVVR) after which the customer will be added to a call/skill queue to wait for a certain period of time until an agent is available.
  • IVVR Interactive Voice and Video System
  • Processing block 106 recites the call is accepted by an agent, and that the video of the customer is muted. At this point in the call, only the audio of the customer is provided to the agent of the contact center. Video of the agent is sent to the customer.
  • agents most contact centers are configured to auto-answer a call when the call lands at the agent's desktop. When a video call arrives at the agent, the system will automatically answer the call without any input from the agent.
  • Processing block 108 discloses the system uses facial recognition to check for the presence of a face in the customer video. As shown in decision block 110 , a determination is made regarding whether a face is present in a video image of the customer. When the presence of a face is detected, then processing proceeds with processing block 112 , when the presence of a face is not found, processing continues with processing block 114 .
  • processing block 112 from decision block 110 the customer video is provided on the call, allowing the agent to view the customer.
  • processing block 114 When processing continues with processing block 114 from decision block 110 , the customer is notified that his or her video is muted and they need to take an action to start the video. As shown in processing block 116 , the customer can manually start the video. Alternately, as shown in processing block 118 , the customer can look into the camera so the facial recognition device can determine the presence of a face.
  • Method 200 begins with processing block 202 which discloses initiating, by a customer, a video call to a contact center.
  • Contact centers are systems in which a person can communicate to receive information.
  • One type of contact center is referred to as a video contact center.
  • Video contact centers allow a customer to interact with an agent using a video enabled device such as a camera on a mobile device or a web phone using a web camera attached to the customer's computer.
  • Processing block 204 states the call is sent to an agent and is auto answered by the agent system.
  • the system does not send audio or video of the agent yet.
  • Processing block 206 discloses the system uses facial recognition (which may include eye gazing algorithms) to check for the attentiveness of an agent.
  • facial recognition which may include eye gazing algorithms
  • processing proceeds with processing block 210 and when the agent is not attentive, processing continues with processing block 212 .
  • processing block 210 When processing continues with processing block 210 from decision block 208 , the agent audio and video is provided on the call, allowing the customer to hear and view the agent.
  • the agent When processing continues with processing block 212 from decision block 208 , the agent is notified that his or her audio and video are muted and they need to take an action to start the video. As shown in processing block 214 , the agent can manually start the video. Alternately, as shown in processing block 216 , the agent can look into the camera so the facial recognition device can determine the presence of a face.
  • the device(s) or computer systems that integrate with the processor(s) may include, for example, a personal computer(s), workstation(s) (e.g., Sun, HP), personal digital assistant(s) (PDA(s)), handheld device(s) such as cellular telephone(s), laptop(s), handheld computer(s), or another device(s) capable of being integrated with a processor(s) that may operate as provided herein. Accordingly, the devices provided herein are not exhaustive and are provided for illustration and not limitation.
  • references to “a microprocessor” and “a processor”, or “the microprocessor” and “the processor,” may be understood to include one or more microprocessors that may communicate in a stand-alone and/or a distributed environment(s), and may thus be configured to communicate via wired or wireless communications with other processors, where such one or more processor may be configured to operate on one or more processor-controlled devices that may be similar or different devices.
  • Use of such “microprocessor” or “processor” terminology may thus also be understood to include a central processing unit, an arithmetic logic unit, an application-specific integrated circuit (IC), and/or a task engine, with such examples provided for illustration and not limitation.
  • references to memory may include one or more processor-readable and accessible memory elements and/or components that may be internal to the processor-controlled device, external to the processor-controlled device, and/or may be accessed via a wired or wireless network using a variety of communications protocols, and unless otherwise specified, may be arranged to include a combination of external and internal memory devices, where such memory may be contiguous and/or partitioned based on the application.
  • references to a database may be understood to include one or more memory associations, where such references may include commercially available database products (e.g., SQL, Informix, Oracle) and also proprietary databases, and may also include other structures for associating memory such as links, queues, graphs, trees, with such structures provided for illustration and not limitation.
  • references to a network may include one or more intranets and/or the internet, as well as a virtual network.
  • References herein to microprocessor instructions or microprocessor-executable instructions, in accordance with the above, may be understood to include programmable hardware.
  • a computer usable medium can include a readable memory device, such as a hard drive device, a CD-ROM, a DVD-ROM, or a computer diskette, having computer readable program code segments stored thereon.
  • the computer readable medium can also include a communications link, either optical, wired, or wireless, having program code segments carried thereon as digital or analog signals.

Abstract

A method, apparatus and computer program product for protecting privacy of a customer and an agent using face recognition in a video contact center environment is presented. A video call is initiated by a customer to a contact center. The customer video is muted while audio of the customer is provided to an agent of the contact center. A determination is made regarding whether a face is present in a video image of the customer. When a presence of a face is determined in the video image of the customer, then video of the customer is enabled. When a presence of a face is not present in the video image of the customer then the customer is notified so the customer can take appropriate action.

Description

BACKGROUND
Contact centers are systems in which a person can communicate to receive information. Such communication can include, but is not limited to, telephone calls, Internet access, email, and FAX. A contact center can include one or more interactive voice response (IVR) systems. The one or more IVRs provide automatic branching voice queries to which the caller responds with button pushes on a telephone keypad or with voice responses on a telephone. The contact center may be provided having only the one or more IVR systems, or alternatively, it is also provided having human agents. For example, at the end of the IVR branching voice queries, the caller can be directed to press zero to speak to an agent. The agent is a person having a telephone to talk to the caller, hereafter referred to as an “agent telephone,” and a computer to access information about the caller, hereafter referred to as an “agent computer.” Note that though the agent telephone and the agent computer are often associated with one person, they correspond to distinct electronic systems and will be separately referred to herein
The contact center can also include one or more database server computers, one or more database storage areas, one or more web server computers, and one or more email server computers. As described above, contact center actions include actions generated by agents within the contact center as well as actions by people outside of the contact center, for example telephone callers and web customers.
One type of contact center is referred to as a video contact center. Video contact centers allow a customer to interact with an agent using a video enabled device such as a camera on a mobile device or a web phone using a web camera attached to the customer's computer. The customer places a call into the contact center and where they will be served first by an automated Interactive Voice and Video System (IVVR) after which the customer will be added to a call/skill queue to wait for a certain period of time until an agent is available. With respect to agents, most contact centers are configured to auto-answer a call when the call lands at the agent's desktop. When a video call arrives at the agent, the system will automatically answer the call without any input from the agent.
SUMMARY
From a customer's perspective, while a customer is waiting for an agent to become available and handle the customer's call, the customer might get distracted with some other work and will be looking away from the screen. If at this time the call lands on the agent's desktop and is accepted by the agent, the agent would be able to see what the customer is doing or will be able to see the customer's environment without the knowledge of the customer, unintentionally violating the customer's privacy.
From an agent's perspective, between calls, if there is a long wait, the agent could easily be distracted, e.g. talking with colleagues, drinking water, or busy with other work such as replying to an email. If during this time a video call lands on the agent's desktop and is auto answered by the agent computer system, then the customer will be able to see the agent for a few seconds before the agent realizes that his video is being transmitted and agent's privacy is unintentionally violated. More important is the fact that the customer would expect to see a smiling face of an agent greeting him when the call is accepted rather than catching the agent unaware in a possibly awkward situation.
Conventional mechanisms to handle such situations wherein the privacy of a customer or agent may be unintentionally violated suffer from a variety of deficiencies. One conventional solution is to use a shutter to block the video from being captured. The use of a shutter requires manual action by the customer as they must remember to close the shutter before placing the call to the contact center and then manually open it up when they intend to send video. For an agent, the agent must remember to close the shutter before accepting the call and then manually open it up when they intend to send video.
Another conventional mechanism is to start the call with only the audio portion of the call enabled. In case of starting with an audio-only call the contact center has difficulty in routing the calls due to the fact that video is required and is not available at the start of the call which is important for finding the designated video agent. In case of the agent escalating the call to video, the agent will not be aware of the capabilities of the customer's endpoint and if it supports video and will cause customer interaction issues in a contact center environment. The customer would expect to see a smiling face of an agent greeting him when the call is accepted rather than a muted video screen.
Embodiments of the invention significantly overcome such deficiencies and provide mechanisms and techniques that protect the privacy of a customer and an agent using face recognition in a video contact center environment.
In a first particular embodiment of a method for protect the privacy of a customer and an agent using face recognition in a video contact center environment the method includes initiating, by a customer, a video call to a contact center. The method also includes muting video of the customer while providing audio of the customer to an agent of the contact center. The method further includes determining whether a face is present in a video image of the customer. When a presence of a face is determined in the video image of the customer, then video of the customer is enabled. When a presence of a face is not present in the video image of the customer then the customer is notified so the customer can take appropriate action. The appropriate may include, but is not limited to, manually starting the video or looking into the camera so that the presence of a face is recognized and the video of the customer can be enabled.
In another particular embodiment of a method for protect the privacy of an agent using face recognition in a video contact center environment, the method includes receiving, by an agent of a contact center, a video call from a customer. The method further includes automatically answering the call by a system of the agent, however the agent's audio and video are not connected to the customer so the customer will continue to wait for the agent. Additionally the method includes determining whether a face is present in a video image of the agent. When a presence of a face is determined in the video image of the agent, then audio & video of the agent is enabled. When a presence of a face is not present in the video image of the agent then the agent is notified so the agent can take appropriate action. The appropriate action may include, but is not limited to, manually starting the audio & video or looking into the camera so that the presence of a face is recognized and the audio & video of the agent can be enabled.
Other embodiments include a computer readable medium having computer readable code thereon for protecting the privacy of a customer and an agent using face recognition in a video contact center environment. The computer readable medium includes instructions for initiating, by a customer, a video call to a contact center. The computer readable medium also includes instructions for muting video of the customer and providing audio of the customer to an agent of the contact center. The computer readable medium further includes instructions for determining whether a face is present in a video image of the customer. The computer readable medium further includes instructions wherein when a presence of a face is determined in the video image of the customer, then video of the customer is enabled. The computer readable medium additionally includes instructions wherein when a presence of a face is not present in the video image of the customer then the customer is notified so the customer can take appropriate action. The appropriate may include, but is not limited to, manually starting the video or looking into the camera so that the presence of a face is recognized and the video of the customer can be enabled.
In another particular embodiment of a computer readable medium for protecting the privacy of a customer and an agent using face recognition in a video contact center environment the computer readable medium includes instructions for receiving, by an agent of a contact center, a video call form a customer. The computer readable medium further includes instructions for automatically answering the call by a system of the agent. Additionally the computer readable medium includes instructions for determining whether a face is present in a video image of the agent. The computer readable medium further includes instructions wherein when a presence of a face is determined in the video image of the agent, then video of the agent is enabled. The computer readable medium additionally includes instructions wherein when a presence of a face is not present in the video image of the agent then the agent is notified so the agent can take appropriate action. The appropriate may include, but is not limited to, manually starting the video or looking into the camera so that the presence of a face is recognized and the video of the agent can be enabled.
Still other embodiments include a computerized device, configured to process all the method operations disclosed herein as embodiments of the invention. In such embodiments, the computerized device includes a memory system, a processor, communications interface in an interconnection mechanism connecting these components. The memory system is encoded with a process that protect the privacy of a customer and an agent using face recognition in a video contact center environment as explained herein that when performed (e.g. when executing) on the processor, operates as explained herein within the computerized device to perform all of the method embodiments and operations explained herein as embodiments of the invention. Thus any computerized device that performs or is programmed to perform up processing explained herein is an embodiment of the invention.
Other arrangements of embodiments of the invention that are disclosed herein include software programs to perform the method embodiment steps and operations summarized above and disclosed in detail below. More particularly, a computer program product is one embodiment that has a computer-readable medium including computer program logic encoded thereon that when performed in a computerized device provides associated operations that protect the privacy of a customer and an agent using face recognition in a video contact center environment as explained herein. The computer program logic, when executed on at least one processor with a computing system, causes the processor to perform the operations (e.g., the methods) indicated herein as embodiments of the invention. Such arrangements of the invention are typically provided as software, code and/or other data structures arranged or encoded on a computer readable medium such as an optical medium (e.g., CD-ROM), floppy or hard disk or other a medium such as firmware or microcode in one or more ROM or RAM or PROM chips or as an Application Specific Integrated Circuit (ASIC) or as downloadable software images in one or more modules, shared libraries, etc. The software or firmware or other such configurations can be installed onto a computerized device to cause one or more processors in the computerized device to perform the techniques explained herein as embodiments of the invention. Software processes that operate in a collection of computerized devices, such as in a group of data communications devices or other entities can also provide the system of the invention. The system of the invention can be distributed between many software processes on several data communications devices, or all processes could run on a small set of dedicated computers, or on one computer alone.
It is to be understood that the embodiments of the invention can be embodied strictly as a software program, as software and hardware, or as hardware and/or circuitry alone, such as within a data communications device. The features of the invention, as explained herein, may be employed in data communications devices and/or software systems for such devices such as those manufactured by Avaya, Inc. of Basking Ridge, N.J.
Note that each of the different features, techniques, configurations, etc. discussed in this disclosure can be executed independently or in combination. Accordingly, the present invention can be embodied and viewed in many different ways. Also, note that this summary section herein does not specify every embodiment and/or incrementally novel aspect of the present disclosure or claimed invention. Instead, this summary only provides a preliminary discussion of different embodiments and corresponding points of novelty over conventional techniques. For additional details, elements, and/or possible perspectives (permutations) of the invention, the reader is directed to the Detailed Description section and corresponding figures of the present disclosure as further discussed below.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
FIG. 1 depicts a block diagram of a system for protecting the privacy of a customer and an agent using face recognition in a video contact center environment in accordance with embodiments of the invention;
FIG. 2 depicts a block diagram of a customer/agent terminal in accordance with embodiments of the invention;
FIG. 3 depicts a flow diagram of a first particular embodiment of a method for protecting the privacy of a customer and an agent using face recognition in a video contact center environment in accordance with embodiments of the invention; and
FIG. 4 depicts a flow diagram of a second particular embodiment of a method for protecting the privacy of a customer and an agent using face recognition in a video contact center environment in accordance with embodiments of the invention.
DETAILED DESCRIPTION
Referring to FIG. 1 and FIG. 2, a system 10 is shown that is useful for protecting the privacy of a customer and an agent using face recognition in a video contact center environment. System 10 includes a customer system 12 comprising a computer having a camera. While customer system 10 is shown as a desktop computer it should be appreciated that any type of computing device (including but not limited to a tablet, a smart phone, a laptop computer, and the like) could also be used.
Customer system 12 is in communication with a network 14. Network 14 may be a telephone network such as the PSTN which is a worldwide telephone system that provides telephone call connections, including telephone connections to a contact center 14. Alternately the network 14 can be a computer network such as the Internet.
A private branch exchange (PBX) 16 is shown in communication with the network 14. The PBX 16 comprises a sub-system that can route incoming telephone calls or communications to intended recipients, or agents. The PBX can be coupled to one or more interactive voice and video response systems (IVVRs) 18.
The IVVR 18 can, among the selections offered, request that the customer provide identifying information, for example an account number. Identifying information can also be automatically provided by the PBX 16 without entry by the customer by a variety of methods, including dialed number identification service (DNIS) and automatic number identification (ANI). The identifying information is coordinated with “customer data,” for example account history associated with the customer. An application program can automatically provide a display of the caller data in a screen pop to the agent system 22.
The IVVR 18 is in communication with a face recognition element 20. Face recognition element 20 monitors video (of the customer and/or the agent) and determines whether a face is present in the video.
An agent computer system 22 is shown in communication with PBX 16. While agent system 22 is shown as a desktop computer it should be appreciated that any type of computing device (including but not limited to a tablet, a smart phone, a laptop computer, and the like) could also be used.
The presently described invention is for a system that will detect that the customer and/or agent is not ready to send video and provide mechanisms to protect the privacy of the agent and/or customer and an automatic method and an override for starting to send video.
In a first embodiment, a customer will initiate a video communication from customer system 12, through network 14 to PBX 16. The call will be presented to IVVR 18 and placed in a queue. When the agent at agent computer system 22 accepts the call, face recognition element 20 continuously monitors the video picture from the customer. The system 10 will use the face recognition element 20 to determine if the web camera of customer computer system 12 is facing the customer and further if the customer is looking in the general direction of the web camera. If the system 10 determines that the above two conditions are not met, then system 10 will not transmit video of the customer to the agent. The system will show a video picture using a text to video systems available in IVVRs that will notify the customer that his video is not being transmitted with instructions on how to start the video as shown in FIG. 2. An example of such a message “Your video is muted. Please look into the camera or press 1 to start video” 58, is displayed on the monitor 52 as an overlay text message in the remote video window 56. The customer at this point will realize that his call was answered as his audio with the agent would have started. The customer can then look into the camera or press a number on his keypad to start sending video to the agent. In such a manner the privacy of the customer placing the video call is protected.
On the agent side, the system 10 would behave in a slightly different manner. When the video call from the customer computer system 12 lands at the agent computer system 22, the call may be auto answered, and will not send audio and video to the customer computer system 12 directly. Instead the system 10 will first determine if the agent is ready to accept the video call, again using face recognition techniques and using eye tracking and gazing techniques to ensure that the agent is looking into the camera of agent computer system 22. Only when the system 10 determines that the agent is ready will the system 10 connect the audio and video call to the customer. If the system determines that the agent is not ready, it will show a similar message 58. The system will also use known methods to take necessary action such as altering the supervisor. In video contact centers, techniques such as hiding the camera behind a screen or using a beam splitter to ensure eye contact between an agent and a customer are performed, so it is a reasonable expectation to have the agent look into the camera to start a call.
Alternatively, the method mentioned above can be implemented directly in web based endpoints. Such endpoints that use HTML5 technologies that can capture camera for audio & video streaming using WebRTC APIs and do image processing and face detection on the video stream using Canvas tags and JavaScript (http://apprtc.appspot.com/html/face.html). In these types of endpoints, the JavaScript application can provide a physical button instead of DTMF to override the privacy protection.
Flow diagrams of the presently disclosed methods are depicted in FIGS. 3 and 4. The rectangular elements are herein denoted “processing blocks” and represent computer software instructions or groups of instructions. The diamond shaped elements are herein denoted “decision blocks,” and represent computer software instructions, or groups of instructions which affect the execution of the computer software instructions represented by the processing blocks.
Alternatively, the processing and decision blocks represent steps performed by functionally equivalent circuits such as a digital signal processor circuit or an application specific integrated circuit (ASIC). The flow diagrams do not depict the syntax of any particular programming language. Rather, the flow diagrams illustrate the functional information one of ordinary skill in the art requires to fabricate circuits or to generate computer software to perform the processing required in accordance with the present invention. It should be noted that many routine program elements, such as initialization of loops and variables and the use of temporary variables are not shown. It will be appreciated by those of ordinary skill in the art that unless otherwise indicated herein, the particular sequence of steps described is illustrative only and can be varied without departing from the spirit of the invention. Thus, unless otherwise stated the steps described below are unordered meaning that, when possible, the steps can be performed in any convenient or desirable order.
Referring now to FIG. 3, a particular embodiment of a method 100 for protecting the privacy of a customer and an agent using face recognition in a video contact center environment is shown. Method 100 begins with processing block 102 which discloses initiating, by a customer, a video call to a contact center. Contact centers are systems in which a person can communicate to receive information. One type of contact center is referred to as a video contact center. Video contact centers allow a customer to interact with an agent using a video enabled device such as a camera on a mobile device or a web phone using a web camera attached to the customer's computer.
Processing block 104 states the call is handled by an IVVR system and entered into a queue waiting for an agent. A contact center can include one or more IVVR systems. The one or more IVVRs provide automatic branching queries to which the caller responds. The customer places a call into the contact center and where they will be served first by an automated Interactive Voice and Video System (IVVR) after which the customer will be added to a call/skill queue to wait for a certain period of time until an agent is available.
Processing block 106 recites the call is accepted by an agent, and that the video of the customer is muted. At this point in the call, only the audio of the customer is provided to the agent of the contact center. Video of the agent is sent to the customer. With respect to agents, most contact centers are configured to auto-answer a call when the call lands at the agent's desktop. When a video call arrives at the agent, the system will automatically answer the call without any input from the agent.
Processing block 108 discloses the system uses facial recognition to check for the presence of a face in the customer video. As shown in decision block 110, a determination is made regarding whether a face is present in a video image of the customer. When the presence of a face is detected, then processing proceeds with processing block 112, when the presence of a face is not found, processing continues with processing block 114.
When processing continues with processing block 112 from decision block 110, the customer video is provided on the call, allowing the agent to view the customer.
When processing continues with processing block 114 from decision block 110, the customer is notified that his or her video is muted and they need to take an action to start the video. As shown in processing block 116, the customer can manually start the video. Alternately, as shown in processing block 118, the customer can look into the camera so the facial recognition device can determine the presence of a face.
Referring now to FIG. 4, a second particular embodiment of a method 200 for protecting the privacy of a customer and an agent using face recognition in a video contact center environment is shown. Method 200 begins with processing block 202 which discloses initiating, by a customer, a video call to a contact center. Contact centers are systems in which a person can communicate to receive information. One type of contact center is referred to as a video contact center. Video contact centers allow a customer to interact with an agent using a video enabled device such as a camera on a mobile device or a web phone using a web camera attached to the customer's computer.
Processing block 204 states the call is sent to an agent and is auto answered by the agent system. The system does not send audio or video of the agent yet.
Processing block 206 discloses the system uses facial recognition (which may include eye gazing algorithms) to check for the attentiveness of an agent. When the agent is attentive (decision block 208), then processing proceeds with processing block 210 and when the agent is not attentive, processing continues with processing block 212.
When processing continues with processing block 210 from decision block 208, the agent audio and video is provided on the call, allowing the customer to hear and view the agent.
When processing continues with processing block 212 from decision block 208, the agent is notified that his or her audio and video are muted and they need to take an action to start the video. As shown in processing block 214, the agent can manually start the video. Alternately, as shown in processing block 216, the agent can look into the camera so the facial recognition device can determine the presence of a face.
The device(s) or computer systems that integrate with the processor(s) may include, for example, a personal computer(s), workstation(s) (e.g., Sun, HP), personal digital assistant(s) (PDA(s)), handheld device(s) such as cellular telephone(s), laptop(s), handheld computer(s), or another device(s) capable of being integrated with a processor(s) that may operate as provided herein. Accordingly, the devices provided herein are not exhaustive and are provided for illustration and not limitation.
References to “a microprocessor” and “a processor”, or “the microprocessor” and “the processor,” may be understood to include one or more microprocessors that may communicate in a stand-alone and/or a distributed environment(s), and may thus be configured to communicate via wired or wireless communications with other processors, where such one or more processor may be configured to operate on one or more processor-controlled devices that may be similar or different devices. Use of such “microprocessor” or “processor” terminology may thus also be understood to include a central processing unit, an arithmetic logic unit, an application-specific integrated circuit (IC), and/or a task engine, with such examples provided for illustration and not limitation.
Furthermore, references to memory, unless otherwise specified, may include one or more processor-readable and accessible memory elements and/or components that may be internal to the processor-controlled device, external to the processor-controlled device, and/or may be accessed via a wired or wireless network using a variety of communications protocols, and unless otherwise specified, may be arranged to include a combination of external and internal memory devices, where such memory may be contiguous and/or partitioned based on the application. Accordingly, references to a database may be understood to include one or more memory associations, where such references may include commercially available database products (e.g., SQL, Informix, Oracle) and also proprietary databases, and may also include other structures for associating memory such as links, queues, graphs, trees, with such structures provided for illustration and not limitation.
References to a network, unless provided otherwise, may include one or more intranets and/or the internet, as well as a virtual network. References herein to microprocessor instructions or microprocessor-executable instructions, in accordance with the above, may be understood to include programmable hardware.
Unless otherwise stated, use of the word “substantially” may be construed to include a precise relationship, condition, arrangement, orientation, and/or other characteristic, and deviations thereof as understood by one of ordinary skill in the art, to the extent that such deviations do not materially affect the disclosed methods and systems.
Throughout the entirety of the present disclosure, use of the articles “a” or “an” to modify a noun may be understood to be used for convenience and to include one, or more than one of the modified noun, unless otherwise specifically stated.
Elements, components, modules, and/or parts thereof that are described and/or otherwise portrayed through the figures to communicate with, be associated with, and/or be based on, something else, may be understood to so communicate, be associated with, and or be based on in a direct and/or indirect manner, unless otherwise stipulated herein.
Although the methods and systems have been described relative to a specific embodiment thereof, they are not so limited. Obviously many modifications and variations may become apparent in light of the above teachings. Many additional changes in the details, materials, and arrangement of parts, herein described and illustrated, may be made by those skilled in the art.
Having described preferred embodiments of the invention it will now become apparent to those of ordinary skill in the art that other embodiments incorporating these concepts may be used. Additionally, the software included as part of the invention may be embodied in a computer program product that includes a computer useable medium. For example, such a computer usable medium can include a readable memory device, such as a hard drive device, a CD-ROM, a DVD-ROM, or a computer diskette, having computer readable program code segments stored thereon. The computer readable medium can also include a communications link, either optical, wired, or wireless, having program code segments carried thereon as digital or analog signals. Accordingly, it is submitted that that the invention should not be limited to the described embodiments but rather should be limited only by the spirit and scope of the appended claims.

Claims (12)

What is claimed is:
1. A computer-implemented method in which a computer system performs operations comprising:
initiating, by a customer, a video call to a contact center;
muting video of said customer and providing audio of said customer to an agent of said contact center;
determining whether a face is present in a video image of said customer;
enabling video of said customer when a presence of a face is determined in said video image of said customer; and
notifying said customer when a presence of a face is not present in said video image of said customer; wherein said notifying said customer when a presence of a face is not present in said video image of said customer comprises providing a message on a terminal of said customer.
2. The method of claim 1 further comprising enabling, by said customer, video of said customer, when said customer is prepared for said video of said call to be transmitted to said agent.
3. The method of claim 1 further comprising receiving, by said customer, video from said agent of said contact center.
4. The method of claim 1 wherein said determining whether a face is present in a video image of said customer comprises using facial recognition.
5. The method of claim 1 wherein said enabling video of said customer when a presence of a face is determined in said video image of said customer is done without customer intervention.
6. The method of claim 1 wherein said notifying said customer when a presence of a face is not present in said video image of said customer is done without customer intervention.
7. A non-transitory computer readable storage medium having computer readable code thereon for protecting privacy of a customer and an agent using face recognition in a video contact center environment, the medium including instructions in which a computer system performs operations comprising:
initiating, by a customer, a video call to a contact center;
muting video of said customer and providing audio of said customer to an agent of said contact center;
determining whether a face is present in a video image of said customer; enabling video of said customer when a presence of a face is determined in said video image of said customer; and
notifying said customer when a presence of a face is not present in said video image of said customer; wherein said notifying said customer when a presence of a face is not present in said video image of said customer comprises providing a message on a terminal of said customer.
8. The computer readable storage medium of claim 7 further comprising enabling, by said customer, video of said customer, when said customer is prepared for said video of said call to be transmitted to said agent.
9. The computer readable storage medium of claim 7 further comprising receiving, by said customer, video from said agent of said contact center.
10. The computer readable storage medium of claim 7 wherein said determining whether a face is present in a video image of said customer comprises using facial recognition.
11. The method of claim 7 wherein said enabling video of said customer when a presence of a face is determined in said video image of said customer is done without customer intervention.
12. The method of claim 7 wherein said notifying said customer when a presence of a face is not present in said video image of said customer is done without customer intervention.
US13/585,780 2012-08-14 2012-08-14 Protecting privacy of a customer and an agent using face recognition in a video contact center environment Active 2034-07-07 US9270822B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/585,780 US9270822B2 (en) 2012-08-14 2012-08-14 Protecting privacy of a customer and an agent using face recognition in a video contact center environment
US14/971,073 US9848165B2 (en) 2012-08-14 2015-12-16 Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/585,780 US9270822B2 (en) 2012-08-14 2012-08-14 Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/971,073 Continuation US9848165B2 (en) 2012-08-14 2015-12-16 Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Publications (2)

Publication Number Publication Date
US20140049593A1 US20140049593A1 (en) 2014-02-20
US9270822B2 true US9270822B2 (en) 2016-02-23

Family

ID=50099779

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/585,780 Active 2034-07-07 US9270822B2 (en) 2012-08-14 2012-08-14 Protecting privacy of a customer and an agent using face recognition in a video contact center environment
US14/971,073 Active US9848165B2 (en) 2012-08-14 2015-12-16 Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/971,073 Active US9848165B2 (en) 2012-08-14 2015-12-16 Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Country Status (1)

Country Link
US (2) US9270822B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9848165B2 (en) 2012-08-14 2017-12-19 Avaya Inc. Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9485459B2 (en) * 2012-12-14 2016-11-01 Biscotti Inc. Virtual window
US8914837B2 (en) 2012-12-14 2014-12-16 Biscotti Inc. Distributed infrastructure
US9654563B2 (en) 2012-12-14 2017-05-16 Biscotti Inc. Virtual remote functionality
JP2015106779A (en) * 2013-11-29 2015-06-08 ブラザー工業株式会社 Program, communication terminal device, and remote conference method
US9483997B2 (en) 2014-03-10 2016-11-01 Sony Corporation Proximity detection of candidate companion display device in same room as primary display using infrared signaling
US9696414B2 (en) 2014-05-15 2017-07-04 Sony Corporation Proximity detection of candidate companion display device in same room as primary display using sonic signaling
US10070291B2 (en) 2014-05-19 2018-09-04 Sony Corporation Proximity detection of candidate companion display device in same room as primary display using low energy bluetooth
EP3174271A4 (en) 2014-07-22 2017-07-19 Ricoh Company, Ltd. Control system, communication terminal, communication system, control method, and program
EP2981063B1 (en) 2014-07-31 2020-03-04 Samsung Electronics Co., Ltd Method of modifying image including photographing restricted element, and device for performing the method
WO2016114270A1 (en) * 2015-01-15 2016-07-21 株式会社リコー Control system, communication terminal, communication system, control method, and program
JP6536068B2 (en) 2015-02-19 2019-07-03 株式会社リコー Control system, communication system, control method, and program
CN108376236B (en) * 2018-01-18 2022-02-22 新开普电子股份有限公司 Face recognition display device
CN108427918B (en) * 2018-02-12 2021-11-30 杭州电子科技大学 Face privacy protection method based on image processing technology
CN110267095A (en) * 2019-05-05 2019-09-20 平安科技(深圳)有限公司 Video flowing intercept method, device and storage medium
CN112491924B (en) * 2020-12-09 2022-03-22 威创集团股份有限公司 Cross-platform face recognition login method, system and storage medium
US11711407B2 (en) * 2021-08-04 2023-07-25 Mitel Networks Corporation Automated pausing of audio and/or video during a conferencing session

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030053663A1 (en) * 2001-09-20 2003-03-20 Eastman Kodak Company Method and computer program product for locating facial features
US20080136895A1 (en) * 2006-12-12 2008-06-12 General Instrument Corporation Mute Function for Video Applications
US20080297588A1 (en) * 2007-05-31 2008-12-04 Kurtz Andrew F Managing scene transitions for video communication
US20120154509A1 (en) * 2010-12-16 2012-06-21 Mitel Networks Corporation Method and system for audio-video communications

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7397495B2 (en) 2003-06-20 2008-07-08 Apple Inc. Video conferencing apparatus and method
KR100640483B1 (en) * 2004-10-22 2006-10-30 삼성전자주식회사 Apparatus and method for automatic changing telephony mode of mobile terminal
US7564476B1 (en) * 2005-05-13 2009-07-21 Avaya Inc. Prevent video calls based on appearance
US20090027485A1 (en) 2007-07-26 2009-01-29 Avaya Technology Llc Automatic Monitoring of a Call Participant's Attentiveness
EP2258085A1 (en) * 2008-03-10 2010-12-08 Dilithium Holdings, Inc. Method and apparatus for video services
US9277173B2 (en) * 2008-08-28 2016-03-01 Kyocera Corporation Communication device
US20100079508A1 (en) * 2008-09-30 2010-04-01 Andrew Hodge Electronic devices with gaze detection capabilities
US20100124363A1 (en) 2008-11-20 2010-05-20 Sony Ericsson Mobile Communications Ab Display privacy system
US20120131646A1 (en) * 2010-11-22 2012-05-24 International Business Machines Corporation Role-based access control limited by application and hostname
US8917306B2 (en) * 2011-07-29 2014-12-23 Cisco Technology, Inc. Previewing video data in a video communication environment
US9031222B2 (en) * 2011-08-09 2015-05-12 Cisco Technology, Inc. Automatic supervisor intervention for calls in call center based upon video and/or speech analytics of calls
US9270822B2 (en) 2012-08-14 2016-02-23 Avaya Inc. Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030053663A1 (en) * 2001-09-20 2003-03-20 Eastman Kodak Company Method and computer program product for locating facial features
US20080136895A1 (en) * 2006-12-12 2008-06-12 General Instrument Corporation Mute Function for Video Applications
US20080297588A1 (en) * 2007-05-31 2008-12-04 Kurtz Andrew F Managing scene transitions for video communication
US20120154509A1 (en) * 2010-12-16 2012-06-21 Mitel Networks Corporation Method and system for audio-video communications

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9848165B2 (en) 2012-08-14 2017-12-19 Avaya Inc. Protecting privacy of a customer and an agent using face recognition in a video contact center environment

Also Published As

Publication number Publication date
US9848165B2 (en) 2017-12-19
US20160105638A1 (en) 2016-04-14
US20140049593A1 (en) 2014-02-20

Similar Documents

Publication Publication Date Title
US9848165B2 (en) Protecting privacy of a customer and an agent using face recognition in a video contact center environment
US11418643B2 (en) Enhanced Caller-ID information selection and delivery
US10313524B2 (en) System and method for web-based real time and out-of-band communications with contact centers
US9503581B2 (en) System and method for web-based real time communication with contact centers
US8774369B2 (en) Method and system to provide priority indicating calls
US20120237009A1 (en) Systems and methods for multimodal communication
US20150022616A1 (en) Method and system for routing video calls to a target queue based upon dynamically selected or statically defined parameters
US20130202101A1 (en) System and method for manual initiation of communications to members of a contact list
US9088661B2 (en) Hands-free voice/video session initiation using face detection
US9031205B2 (en) Auto-detection of environment for mobile agent
US11611721B2 (en) Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility
US8811588B2 (en) Method and system for managing multiple simultaneously placed calls
US8831192B1 (en) Telemarketer identity verification
US20120195236A1 (en) System for Multilocation Calling Line Identification Provisioning
JP2007159043A (en) Method and system for addressing prank call
US20130093830A1 (en) Systems and methods for accepting video calls on voice telephones at call centers or other locations
WO2010060013A3 (en) Systems and methods for handling telephone conference calls
WO2016033500A1 (en) Call center calling apparatus and method
US8515406B2 (en) Communication method and a communication system for tailored mobile communication
US20170214793A1 (en) Plug-in Extension to Integrate PMS/CRM System with Phone System
Kevoe-Feldman et al. The “Four-Second Rule” for identifying the active silent 911 caller
US8238952B1 (en) Facilitating a text message conversation using tele-links
US20160205248A1 (en) System, method and apparatus for mobile call centers
US20160299887A1 (en) Automated escalation agent system for language interpretation
KR20220022364A (en) System and method for integrating phone number based voice calls and web-based video calls into one video call

Legal Events

Date Code Title Description
AS Assignment

Owner name: AVAYA INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PAI, DEEP SUBHASH;BHALERAO, JAYDEEP DEEPAK;REEL/FRAME:028822/0349

Effective date: 20120813

AS Assignment

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., P

Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA, INC.;REEL/FRAME:029608/0256

Effective date: 20121221

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., PENNSYLVANIA

Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA, INC.;REEL/FRAME:029608/0256

Effective date: 20121221

AS Assignment

Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., THE,

Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA, INC.;REEL/FRAME:030083/0639

Effective date: 20130307

Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., THE, PENNSYLVANIA

Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA, INC.;REEL/FRAME:030083/0639

Effective date: 20130307

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: CITIBANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS INC.;OCTEL COMMUNICATIONS CORPORATION;AND OTHERS;REEL/FRAME:041576/0001

Effective date: 20170124

AS Assignment

Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL COMMUNICATIONS CORPORATION), CALIFORNIA

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531

Effective date: 20171128

Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNIA

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531

Effective date: 20171128

Owner name: AVAYA INC., CALIFORNIA

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 029608/0256;ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A.;REEL/FRAME:044891/0801

Effective date: 20171128

Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531

Effective date: 20171128

Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNI

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531

Effective date: 20171128

Owner name: AVAYA INC., CALIFORNIA

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531

Effective date: 20171128

Owner name: VPNET TECHNOLOGIES, INC., CALIFORNIA

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531

Effective date: 20171128

Owner name: AVAYA INC., CALIFORNIA

Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 030083/0639;ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A.;REEL/FRAME:045012/0666

Effective date: 20171128

AS Assignment

Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001

Effective date: 20171215

Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW Y

Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001

Effective date: 20171215

AS Assignment

Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045124/0026

Effective date: 20171215

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, MINNESOTA

Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA MANAGEMENT L.P.;INTELLISIST, INC.;AND OTHERS;REEL/FRAME:053955/0436

Effective date: 20200925

AS Assignment

Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT, DELAWARE

Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:AVAYA INC.;INTELLISIST, INC.;AVAYA MANAGEMENT L.P.;AND OTHERS;REEL/FRAME:061087/0386

Effective date: 20220712

AS Assignment

Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001

Effective date: 20230403

Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001

Effective date: 20230403

Owner name: AVAYA INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001

Effective date: 20230403

Owner name: AVAYA HOLDINGS CORP., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001

Effective date: 20230403

AS Assignment

Owner name: WILMINGTON SAVINGS FUND SOCIETY, FSB (COLLATERAL AGENT), DELAWARE

Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:AVAYA MANAGEMENT L.P.;AVAYA INC.;INTELLISIST, INC.;AND OTHERS;REEL/FRAME:063742/0001

Effective date: 20230501

AS Assignment

Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK

Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:AVAYA INC.;AVAYA MANAGEMENT L.P.;INTELLISIST, INC.;REEL/FRAME:063542/0662

Effective date: 20230501

AS Assignment

Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: CAAS TECHNOLOGIES, LLC, NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: HYPERQUALITY II, LLC, NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: HYPERQUALITY, INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: ZANG, INC. (FORMER NAME OF AVAYA CLOUD INC.), NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: VPNET TECHNOLOGIES, INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: OCTEL COMMUNICATIONS LLC, NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: INTELLISIST, INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: AVAYA INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622

Effective date: 20230501

Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023

Effective date: 20230501

Owner name: INTELLISIST, INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023

Effective date: 20230501

Owner name: AVAYA INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023

Effective date: 20230501

Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023

Effective date: 20230501

Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359

Effective date: 20230501

Owner name: INTELLISIST, INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359

Effective date: 20230501

Owner name: AVAYA INC., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359

Effective date: 20230501

Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359

Effective date: 20230501

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: AVAYA LLC, DELAWARE

Free format text: (SECURITY INTEREST) GRANTOR'S NAME CHANGE;ASSIGNOR:AVAYA INC.;REEL/FRAME:065019/0231

Effective date: 20230501