Time filter

Source Type

Basking Ridge, NJ, United States

Avaya Inc. is a multinational corporation privately held which engineers, designs, manufactures, and sells as a global provider of business communications and collaboration systems. The international headquarters is in Santa Clara, California, United States. The company supplies contact centers, networking , SDN, unified communications , and video products services. Wikipedia.

An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.

Avaya | Date: 2015-04-20

A geo-spatial grammar comprises rules, syntax, and other means by which a data input is determined to have a meaning associated with a particular event. The event may then be provided to an application, such as a calendaring or messaging application. As a benefit, an input, such as a user speaking the phrase, Ill be there in an hour, may be interpreted, via the geo-spatial grammar, as an event (e.g., Ill be in the office, Ill join you for dinner, Ill be home, etc.). An application may then perform an action based upon the event (e.g., reschedule the meeting that starts in five minutes, present directions to the restaurant on the users cars navigation system, notify the users spouse, etc.).

Avaya | Date: 2015-04-20

Methods and apparatus are disclosed for authenticating a user based on the geo-location history of a geo-location-enabled wireless device (e.g., a GPS-enabled wireless telecommunications terminal, a smart card, an RFID tag, etc.). In a first illustrative embodiment, a user of a geo-location-enabled wireless telecommunications terminal (e.g., a GPS-enabled cell phone, a GPS-enabled notebook computer, etc.) who attempts to access a restricted resource is challenged with one or more questions that are generated from the terminals geo-location history. In a second illustrative embodiment, a user of a data-processing system who attempts to access a restricted resource is asked to provide a username Z. The user is then challenged with one or more questions that are generated from the geo-location history of a wireless device that is associated with username Z (e.g., a cell phone that belongs to the user whose username is Z, etc.).

A method, apparatus and computer program product for protecting privacy of a customer and an agent using face recognition in a video contact center environment is presented. A video call is initiated by a customer to a contact center. The customer video is muted while audio of the customer is provided to an agent of the contact center. A determination is made regarding whether a face is present in a video image of the customer. When a presence of a face is determined in the video image of the customer, then video of the customer is enabled. When a presence of a face is not present in the video image of the customer then the customer is notified so the customer can take appropriate action.

The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.

Discover hidden collaborations